Showing 20 open source projects for "encryption algorithm java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    Java JWT

    Java JWT

    Java implementation of JSON Web Token (JWT)

    A Java implementation of JSON Web Token (JWT) - RFC 7519. This library requires Java 8 or higher. The last version that supported Java 7 was 3.11.0. The library implements JWT Verification and Signing using several algorithms. The Algorithm defines how a token is signed and verified. It can be instantiated with the raw value of the secret in the case of HMAC algorithms, or the key pairs or KeyProvider in the case of RSA and ECDSA algorithms. Once created, the instance is reusable for token...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 2
    google-java-format

    google-java-format

    Reformats Java source code to comply with Google Java Style

    google-java-format is a program that reformats Java source code to comply with Google Java Style. The formatter can act on whole files, on limited lines, on specific offsets, passing through to standard-out (default) or altered in-place. There is no configurability as to the formatter's algorithm for formatting. This is a deliberate design decision to unify our code formatting on a single format. The formatter can be used in software that generates java to output more legible java code. Just...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 3
    mendelson AS4

    mendelson AS4

    AS4 Solution for ENTSOG, e-SENS, ebMS, PEPPOL, ICS2, BDEW

    mendelson AS4 is a free JAVA-based open source AS4 solution. Contains a monitoring- and configuration GUI (SWING), supports PUSH and PULL messages, ENTSOG AS4, e-SENS AS4, ebMS AS4, BDEW AS4, PEPPOL AS4, ICS2 AS4, signatures (SOAP, payload), selectable profile per trading partner, encryption (SOAP, payload), UserNameToken, TLS, pluggable into any servlet container, trading partner management, compression, certificate management
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4
    MentDB Weak

    MentDB Weak

    Mentalese Database Engine

    Welcome to MentDB (Mentalese Database). The platform provides tools for AI, SOA, ETL, ESB, database, web application, data quality, predictive analytics, chatbot ..., in a revolutionary data language (MQL). The server is based on a new generation of AI algorithm, and on an innovative SOA layer to reach the WWD. Mentalese is the language of thought structuring the human brain. This language is able to accommodate different common languages and allows autonomy in a machine. WWD literally...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 5
    shadowsocks-libev

    shadowsocks-libev

    Bug-fix-only libev port of shadowsocks

    Shadowsocks-libev is a lightweight secured SOCKS5 proxy for embedded devices and low-end boxes. Shadowsocks-libev is written in pure C and depends on libev. It's designed to be a lightweight implementation of shadowsocks protocol, in order to keep the resource usage as low as possible. Snap is the recommended way to install the latest binaries. You can build shadowsocks-libev and all its dependencies by script. The latest shadowsocks-libev has provided a redir mode. You can configure your...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    JDS: Data Security

    JDS: Data Security

    JDS is a powerful data protection program

    JDS is a powerful tool for data protection. Documents are encrypted using a special algorithm. The data encryption algorithm is constantly updated to improve security. The program also provides other functions. Such as sending a file to a vault with password access, fast text encryption in 3 types, and much more. The program is easy to use and does not require special knowledge. The standard version has 2 languages (Russian and English) and 9 themes. You can download the language...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    XML2CSV-Generic-Converter

    XML2CSV-Generic-Converter

    Flatten XML into CSV to suit your mood

    Java XML to CSV (XML2CSV) generic conversion facility. Flattens one or more similar XML files into CSV projections. I made it in order to extract data from big XML files and gather them in files more easily opened with a spreadsheet because I didn't find anything adapted to my needs over the Internet when I needed to (Java + truly generic + self-contained algorithm + Unix like command line options + efficiency). It is packaged as an auto executable Jar for convenient command line...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    A P2P overlay construction toolkit, which supports routing algorithm researchers in addition to application developers. It provides multiple routing (DHT) algorithms such as Chord, Kademlia, Koorde, Pastry and Tapestry, and a distributed environment emu
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Similarity Algorithm based on WikipediA
    SAWA calculates a semantic similarity coefficient between two sentences. Coefficient is expressed between "0" and "1", where: 0 means there is not semantic similarity among them; 1 vice versa.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    remoteME

    remoteME

    Remote computer access through Android devices

    remoteME is a good-looking, extremely configurable and open source Android remote controller for your computers no matter what operation system you are using (Linux, MAC OS, or MS Windows). It offers you at least 11 remotes for the most frequent media players plus those which you create by yourself. Remotes for mouse, keyboard, presentation and power control are also included. Before using client application, please be sure you have a remoteME server running on your...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    MapPSO
    MapPSO is a tool for Ontology Alignment, which uses Discrete Particle Swarm Optimisation. A particle swarm is used to search for the optimal alignment. The algorithm is massively parallel and adapts naturally on parallel architectures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    A lossless audio codec that switches between predicive audio compressors block wise on the fly, always choosing the one with the best compression rate. It will be designed for near to optimum compression rate, and not consider coding/decoding speed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    AS2Secure - AS2 Php Lib
    AS2Secure is a PHP Lib to allow you to send and receive AS2 message from partners. Based on OpenSSL, documents are SIGNED and CRYPTED to build SMIME messages ready to be sent over HTTP connection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The project Jaulp is jet another utility library project written in Java. It contains utility classes for Date ,Calendar, Collections, Resources, Files, IO for Random data, and many more. This is the last version for this project.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Flash/PHP adaptation of the XTEA encryption algorithm. Allows encryption/decryption of sensitive data using 128-bit key. May be used for network data (HTTP) or offline for implementations like secure CD-ROM projects.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The iText based PDF sCramblEr allows you to encrypt a PDF using one or more public certificates of the addressees (one or more .cer files). For each .cer file, you can enforce specific PDF permissions: (dis)allow printing, (dis)allow modification,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    LineFold is a Java 6 implementation of the TeX paragraph line-breaking algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Web graph algorithm development and redestribution framework and tools
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.