Showing 8 open source projects for "sms sender receiver"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • All-in-One Payroll and HR Platform Icon
    All-in-One Payroll and HR Platform

    For small and mid-sized businesses that need a comprehensive payroll and HR solution with personalized support

    We design our technology to make workforce management easier. APS offers core HR, payroll, benefits administration, attendance, recruiting, employee onboarding, and more.
  • 1
    Zcash

    Zcash

    A privacy-protecting, digital currency built on strong science

    Zcash is the future of money-- digital, decentralized and private. It is an implementation of the "Zerocash" protocol; a digital currency based on Bitcoin's code, but with a higher standard of privacy. Like Bitcoin, Zcash transaction data is posted to a public blockchain. However unlike Bitcoin, your personal and transaction data stay completely private. Thanks to a sophisticated zero-knowledge proving scheme, transactions can be verified without showing any information at all about the sender...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GameNetworkingSockets

    GameNetworkingSockets

    Reliable & unreliable messages over UDP

    GameNetworkingSockets is a basic transport layer for games. A reliability layer significantly more sophisticated than a basic TCP-style sliding window. It is based on the "ack vector" model from DCCP (RFC 4340, section 11.4) and Google QUIC and discussed in the context of games by Glenn Fiedler. The basic idea is for the receiver to efficiently communicate to the sender the status of every packet number (whether or not a packet was received with that number). By remembering which segments were...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3

    Secure Protocol Format

    Generic binary protocol library that prevents injection attacks

    Injection attacks can occur when transmitted data is not interpreted the same way by both the sender and the receiver. Guaranteeing equivalence in data interpretation by both the sender and the receiver is called operational congruity. There is a simple technique for achieving guaranteeing operational congruity: separating fields of data on the basis of their length. When the length of the data is known in advance, there is no risk of misinterpreting it on the basis of spaces or other text...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Covert Channels Evaluation Framework

    Covert Channels Evaluation Framework

    Network steganography / covert channels evaluation tool

    ... be used in real networks with real overt traffic (e.g in research testbeds), but can also simulate covert channels using overt traffic from trace files (e.g. evaluation on a single host). CCHEF is designed for evaluating covert channels and not for (mis)using them for actual covert communication. CCHEF's sender or receiver are normal user space applications that are not disguised in any way and do not contain any malware-like code, e.g. they do not illegally acquire superuser privileges etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Manage your IT department more effectively Icon
    Manage your IT department more effectively

    Streamline your business from end to end with ConnectWise PSA

    ConnectWise PSA (formerly Manage) allows you to stop working in separate systems, and helps you build a more profitable business. No more duplicate data entries, inefficient employees, manual invoices, and the inability to accurately track client service issues. Get a behind the scenes look into the award-winning PSA that automates processes for each area of business: sales, help desk, support, finance, and HR.
  • 5
    The Micro C++ Library (libmicxx) is a small set of portable and easy to use classes providing core features commonly used in modern applications. It is based completely on the Standard C++ Template Library (STL).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    10.1109/icc.2011.5962704

    10.1109/icc.2011.5962704

    Cooperative Retransmissions Through Collisions

    Interference in wireless networks is one of the key capacity-limiting factors. Recently developed interference-embracing techniques show promising performance on turning collisions into useful transmissions. However, the interference-embracing techniques are hard to apply in practical applications due to their strict requirements. In this paper, we consider utilising the interference-embracing techniques in a common scenario of two interfering sender-receiver pairs. By employing opportunistic...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This project will allow your applications to send or receive GSM messages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Turtle is a peer-to-peer architecture for safe sharing of sensitive data with full sender and receiver anonymity.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next