Search Results for "encryption algorithm java" - Page 9

400 programs for "encryption algorithm java" with 1 filter applied:

  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Longest Common Subsequence Algorithm and Longest Increasing Subsequence Algorithm by Dynamic Programming by java
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    JMS/Joram implementation of the Bully election algorithm. It is a library to be used by a process' implementation to make it transparently manage coordinator's elections, while it carries out business logic. A sample application is included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    DazioAES is a password manager: it's an application protected by a single password that stores multiple other password or informations in an encrypted way. It uses Bouncycastle crypto library (classes from) and their AES encryption implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JEnigma is a java API to implement the Enigma cipher, as used by the Enigma encryption machine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 5
    weka outlier is an implementation of outlier detection algorithms for WEKA. CODB (Class Outliers: Distance-Based) Algorithm is the first algorithm developed using WEKA framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Reversi game with minimax algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This library provides two operations: one to wrap key data, and another to unwrap the key data. This code also includes a fairly comprehensive unit test library which ensures the implementation is verified against the vectors provided in RFC 3394.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud SQL for MySQL, PostgreSQL, and SQL Server Icon
    Cloud SQL for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Fully managed, cost-effective relational database service for PostgreSQL, MySQL, and SQL Server. Try Enterprise Plus edition for a 99.99% availability SLA and category-leading performance.
    Try it for free
  • 10
    ConTextKit is a Java-based implementation of Wendy Chapman's ConText algorithm for annotating the context of medical documents, specifically the negation, temporality, and experiencer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    AlViz is a research prototype for visual ontology alignment implemented as multiple-view plug-in for Protege using J-Trees and Graphs. Based on similarity measures of an ontology matching algorithm AlViz helps to assess and optimize the alignment results
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    MCS is a tool that exploits the Monte Carlo method and, with a complex algorithm based on the PERT (Program Evaluation and Review Technique), it estimates a project's time. MCS is a opensource project and it was devolped by Java Programming Language.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 14
    ROT-13 Encryptor/Decryptor. More functionality will be added as different updates are released.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Manentia Commons is a set of general purpose Java utility classes, including collection handling, configuration reading, date handling, logging wrappers, mail wrappers, database connection pooling manager, simple encryption wrappers and XML utilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    EMURA is a suite of Java applications that allows two users to send encrypted messages back and forth - as a chat. The encryption key is secure and generated using the Diffie-Hellman algorithm. Utilizes GNU-CRYPTO libraries
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    GAAF is a tool for analyzing Genetic Algorithms (GA for short). It allows to check the behavior of a particular GA resolving a particular problem so one can get empirical information to decide which GA best fits problem's conditions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    G.A.V. (Graph Algorithm Visualizer) is a tool that visualizes algorithms from graph theory. A step-by-step visualization from each different algorithm allows the user to understand the particular algorithm very easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The IEEE 1619 Committee open-source reference implementations of encryption algorithms, plus testing and certification suites, for each encryption algorithm included in the standard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    otp.el is a one-time-password implementation in emacs lisp, suitable for generating one time passwords with the MD5 algorithm. It's designed to be plugged in to tramp.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    MelodyBall generates a simulated array of soundmaking bars, on which a ball bounces and plays a melody (see www.melodyball.com). Need to fix Java/MIDI bugs and read MIDI files as source data for the algorithm to create alternate melodies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Encrypted Chat [synchronous encryption based on passkeys ( and maybe in the near future :) asynchronous encryption based on public/private keys) ] with a lot of smart features, perfectly suitable for developers to communicate in an insecure network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This is an implementation of Donald Knuth's Algorithm X ("dancing links"). This is primarily a sudoku generator and solver, though it can be used to solve other exact cover problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A very powerful and secure encryption supporting multilevel algorithm hierarchy encryption(bit level),supports infinite length keys and equation creation utility(secondary key) for the utmost security.Support for multiple algorithms.All OS support(ja
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.