Search Results for "encryption algorithm java" - Page 42

Showing 1081 open source projects for "encryption algorithm java"

View related business solutions
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • 1
    aVolve is an evolutionary/genetic algorithm designed to evolve single-cell organisms in a micro ecosystem. It currently uses the JGAP Genetic algorithm, but does include a primitive genetic algorithm written in Python.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Apriori Algorithm: http://www.codeproject.com/KB/recipes/AprioriAlgorithm.aspx Steps to Run included in Java file
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    An implementation of Java demonstrating the use of a genetic algorithm to produce skilled automated players.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A java command-line application where the main goal is to solve any simplex problem. It's a team-work school project. It can be usefull for other students who needs to understand the simplex algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights. Click to perfect your product now.
    Click to perfect your product now.
  • 5
    LineFold is a Java 6 implementation of the TeX paragraph line-breaking algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    An encryption algorithm and UI frontend written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    · A free chat server coded in java. · Supports secure connections via the Diffie-Hellman-Algorithm. · One java chat client available. · Other clients in production.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Java Chaotic Random Number Generator - Inspired by chaos theory, the intent of this generator is to produce unseeded, unpredictable numbers. The numbers will not follow a predictable sequence and will not rely on a pseudorandom algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    AresCode2008 is system to crypt files. System is used new cryptography algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 10

    Simple Encrypt

    Simple Encrypt combines RSA encryption with AES to encrypt text files.

    RSA (Rivest-Shamir-Adleman) is a public-key encryption algorithm with a typical key size of 1,024 to 4,096 bits. 2 large primes are required to generate the keys. AES (Advanced Encryption Standard) is based on Rijndael, secret-key encryption algorithm using a block cipher with key sizes of 128, 192, or 256 bits. Simple Encrypt will take a text file, generate keys and then encrypt it. The output is the ciphertext and keys. Note: Realistically, I will keep the algorithms simple(r...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Cryptographic-software

    Software that allows you to encrypt your data with a strong algoritm

    This project provides a robust tool for encrypting your files using the AES algorithm, supporting 128-bit, 196-bit, and 256-bit encryption. Built with Python and Kivy, this software ensures the security and integrity of your data with features like history tracking, backup, and recovery.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Distributed Cryptosystem

    Distributed cryptosystem based on Shoup’s threshold signature scheme

    In distributed cryptosystem a secret key is distributed among the participants of the system, in the way that only a group of some authorized users can perform any actions related to the secret key. A secret key is used to encrypt a session key, create a digital signature and to certify public keys. The system uses symetric encryption algorithm with a session key to encrypt messages. Shoup’s threshold signature scheme has been used for cooperative signing and also for cooperative decryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Encrypt Flash Drive in Windows 10

    One-click to encrypt flash drive, USB drive and hard disk in Windows.

    The flash drive encryption tool is the professional encryption software that encrypts USB drives. It uses the most common encryption algorithms such as AES 256-bit to encrypt flash drive in Windows 10. It encrypts the entire USB drive, the encrypted files will be hidden, and you will only be able to access them if you run the encryption program in the encrypted flash drive and enter the correct password. In addition to the USB drive, this software can also secure other removable storage drives...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BP-Tools

    BP-Tools

    Set of useful tools for payment service development

    The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components: - BP-CCALC: Cryptographic Calculator - BP-CardEdit: Thales P3 Input/Output file editor - BP-EMVT: EMV Tool - BP-HCMD: Thales HSM Commander
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This project is for developing stereo vision algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    SeedFill3D_

    My first sourceforge project. Plugin for ImageJ

    Plugin for ImageJ (Image Processing application). Maint target is develop 3D FloodFill tool for 3D stack images based on algorithm described in A rapid 3D seed-filling algorithm based on scan slice by Wei Wei You et al. Secondary targets is learn myself of Java, subversion and other.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Meergoose

    Meergoose

    Privacy Platform | Encrypt Locally | Secure Remotely

    Meergoose is a multi-use social suite of applications that allows users to setup a portal on their personal computing platform that encrypts and stores files locally and synchronizes encrypted files with a secure cloud. MeerCrypt is a component of Meergoose and is opensource. The vision is simple: Encrypt Locally. Share Remotely. YOU remain in control of your security, your keys, your data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Dungeon generator ported to Java from a Ruby version of the algorithm found at http://donjon.bin.sh/dungeon/about/. The ruby version was written by Carl Ellis and can be found at https://github.com/carl-ellis/Dungeon.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    j2me version of icHerbert - game used in first round of algorithm competition http://imaginecup.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Open Source Encryption and digital signature libraries for JMS. These librararies are writen in java and are to support secure integration through middelware/ISB/ESB
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This project is an implementation of a BML realizer using ROS. The algorithm uses an event-driven architecture, based on Petri nets, to ensure synchronization constraints for robots.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A software implementation of hardware-based code scheduling methods such as Scoreboarding and Tomasulo's algorithm for MIPS64 instructions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Porter Stemmer

    Java version of Porter's Stemming algorithm

    The Stemmer class transforms a word into its root form. The input word is provided from the add() methods. The stem() method will return the stem as will toString() after stem() has been called). The clear() method will wipe the Stemmer buffer and allow a new word to be input. This version extends Martin Porter's original stemming algorithm by allowing capital letters to exist in words. This version should also be plugged in wherever the old algorithm is used with few accommodations...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Creating an automated 3D enviroment for the transport of containers. This will be done by using a server-client method. The project goal is to create a fast algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    KiSS, Kilobyte SOAP Security, is a J2ME library that provides WS-Security for kSOAP2. It supports the WSS Username Token Profile and a subset of the XML Encryption and Processing recommendation.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.