Search Results for "encryption algorithm java" - Page 9

Showing 756 open source projects for "encryption algorithm java"

View related business solutions
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    Intelligent Keyword Miner

    Intelligent Keyword Miner

    Intelligent SEO keyword miner and predicing tool

    ..., you can choose to reset or train it further. Programs that have similar idea are: Google AdWords, SERPWoo's Keyword Finder, Wordpot, and others. Difference is, this program is intelligent and it accepts your input data and then predicts keywords based on your likes or dislikes. As the main engine, it uses the SMOReg algorithm to analyze and map the keyword frequencies of your data. This can be a great SEO tool to help increase the traffic of any website featuring a product.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    OnAGUI - Ontology Alignment GUI

    Software to help automatic or manual realisation of ontologi alignment

    This project has moved to https://github.com/lmazuel/onagui - OnAGUI (Ontology Alignment Graphical User Interface) is a project of alignment helper and viewer. You can edit ontology (SKOS, OWL) and edit alignment between concept of these ontologies. In addition, you can make automatic discovery of alignment, using different kind of algorithm. This work was initiated by Jean Charlet (http://www.limics.fr/index.php/annuaire), designed and developped by Laurent Mazuel on a post-doctoral...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    MODLEM

    MODLEM

    rule-based, WEKA compatible, Machine Learning algorithm

    This project is a WEKA (Waikato Environment for Knowledge Analysis) compatible implementation of MODLEM - a Machine Learning algorithm which induces minimum set of rules. These rules can be adopted as a classifier (in terms of ML). It is a sequential covering algorithm, which was invented to cope with numeric data without discretization. Actually the nominal and numeric attributes are treated in the same way: attribute's space is being searched to find the best rule condition during rule...
    Leader badge
    Downloads: 24 This Week
    Last Update:
    See Project
  • 4
    CrypPic
    CrypPic is a free software application based on Java 8 which can be used to encrypt and manipulate the image.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • 5
    JDownloader Password Decryptor Portable

    JDownloader Password Decryptor Portable

    Decrypts JDownloader ejs files (works with Beta install too)

    JDownloader Password Decryptor Portable is the SecurityXploded's JDownloader Password Decryptor packaged with a PortableApps.com launcher as a portable app, so you can extract passwords from your JDownloader from this program on your iPod, USB flash drive, portable hard drive, etc. It has all the same features as JDownloader Password Decryptor, plus, it leaves no personal information behind on the machine you run it on, so you can take it with you wherever you go.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    gsg.networks

    gsg.networks

    A simple native java network library

    A simple native java network library containing ftp, smtp and port knocking clients. Designed to be easily extended or customized this library will adapt smoothly in any java project
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    An easy-to-implement library that can assist Java developers in using the GeoHash algorithm in order to create geocodes based on custom latitude and longitude values. With the help of jGeohash, software developers will be able to quickly and easily generate a geohash code using user-defined latitude and longitude values. By using the GeoHash algorithm, the space can be divided into multiple grid shapes. This library is a basic implementation from the GeoHash algorithm written in the java...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    WinRaidMonitor

    WinRaidMonitor

    Windows Software RAID Monitor

    This little utility monitors the health of your Windows software RAID. It's based on Java, but can easily be called periodically from Windows task scheduler, and/or at system startup (configuration and batch file is included). WinRaidMonitor can send emails to a specified email address (supports SSL connections to SMTP server and user/password authentication).
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    BONESA
    BONESA is an open source, user-friendly interface for tuning the numerical parameters of metaheuristics. This package includes a multi-objective parameter tuning algorithm and visualizations of the performance landscape.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • 10

    Enfomi

    Encryption App

    Enfomi is a cross-platform standalone password-based encryption/decryption program that supports 27 algorithm variants (including AES 256bit). Archives can be self-decrypting, thus making it perfect for mobile applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    AleHu

    AleHu

    Encrypting, anonymous, unlimited size message transfer system

    AleHu is an open source encrypted message transfer system that encompasses both server (PHP) and client software (Java). Give it a shot: You can try out AleHu by simply running the client using the preconfigured AleHu test server! For further details and instructions on how to quickly install and run AleHu, have a look at the documentation in the Wiki section.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    aprioriProcess

    Apriori is designed to operate on databases containing transactions.

    The Apriori Algorithm is an influential algorithm for mining frequent itemsets for boolean association rules. Key Concepts : • Frequent Itemsets: The sets of item which has minimum support (denoted by Li for i th -Itemset). • Apriori Property: Any subset of frequent itemset must be frequent. • Join Operation: To find Lk , a set of candidate k-itemsets is generated by joining Lk-1 with itself.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SuperSync

    SuperSync

    A file synchronization/backup utility

    A file synchronization/backup utility. Designed to synchronize two folders. It can be used as a backup by synchronizing to a backup source. You can synchronize multiple computers to the same storage source. Includes FTP, SFTP and FTPS support.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    backdup

    backdup

    BackDup is a Duplicity front-end for MacOS and Linux

    BackDup is a Duplicity (http://duplicity.nongnu.org/) front-end for MacOS and Linux written in Java. Duplicity creates bandwidth-efficient backup using the rsync algorithm. Mac OS users: please install Duplicity via macports (https://www.macports.org/) Linux users: install Duplicity via your package manager as usual.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CrocodileNote

    CrocodileNote

    Protect your privacy!

    Take simple text notes. You can put them into folders to create your own quick, easy and robust file structure. CrocodileNote uses AES encryption. In encryption mode all data is encrypted using password-based encryption (PKCS#5) with AES-256. These are common industry-proven standards! Use encryption if you want to protect your data and your privacy!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ProvErr

    ProvErr

    System Level Statistical Fault Diagnosis using Dependency Model

    Code base moved to: https://github.com/Data-to-Insight-Center/ProvErr A statistical fault diagnosis tool that leverages an application's dependency model to automatically infer an o ending piece of software/system in event of failure
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CryptoPad v1.0

    CryptoPad v1.0

    AES-128 bit file encryptor

    CryptoPad is a Java based file encryptor ! It can encrypt every type of file. The icing on the cake is that it's 100% cross-platform. i.e. You can run the same .jar file on Windows, Mac OS, Linux and any OS capable of running JRE 8 :) CryptoPad uses AES-128 bit symmetric key encryption to secure your data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    MoccaCPU

    MoccaCPU

    Java based CPU stress testing tool

    MoccaCPU is a CPU stress testing tool written in Java. It uses the Monte-Carlo-Algorithm to calculate approximate values of π (Pi) during the test. Mutiple threads can be started to use the full capacity of all given CPU cores.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PetriOpti

    PetriOpti

    Petri network optimization with Martinez-Silva algorithm

    A simply application in order to demonstrate Martinez-Silva optimization algorithm on Petri networks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    A2y

    Automated Algorithm Synthesis

    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This project is an extended implementation of Knuth's "Dancing Links" algorithm and some use cases (e.g. Sudoku).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    SafePassDB

    SafePassDB

    Protect your personal data with SafePassDB.

    ... Encryption Standard) algorithm, which is a standard by U.S. National Institute of Standards and Technology (NIST), for protecting your personal data. IMPORTANT: In order to run SafePassDB you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    phenotemp

    phenotemp

    phenological trends using NOAA AVHRR time series

    Starting from GIMMS values as ascii data (each line will be treated as individual time series), the application can smooth the ts - values by applying different algorithm that are based on Fouriertransformation. Separation of seasonal figure as well as the detection of linear trends is possible. Possible breaks in longterm mean can be detected with a change-point analysis using CuSum algorithms. Phenological events such as start-of-season, day-of-max/day-of-min, end-of-season can be determined...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Java File Uploader
    Please update v 2.0 if you have downloaded before 16th Feb 2014! Simple java file uploader. The main goal to overcame 2GB browser limit. * Simple GUI * Upload unlimited file sizes from client to server via HTTP * Split uploading file to chunks * MD5 chunk verification on server. Final MD5 confirmation. * Http auth Adv: https://play.google.com/store/apps/details?id=org.vikulin.etherwallet
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.