Search Results for "encryption algorithm java" - Page 14

Showing 861 open source projects for "encryption algorithm java"

View related business solutions
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 1

    Levenshtein distance Java Libarary

    Java library implementing Levensh distnce

    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Mouse Rate

    Mouse Rate

    OS independent mouse rate checker written in Java.

    Tiny program written in Java, which provides OS - independent and clean algorithm to measure your mouse rate (mouse latency). Java 7u5 or higher needed to run version 1.1 and lower. Java 7u40 or higher needed to run version 1.2 and higher. **Version 1.3 changes - Fixed graphic artefacts appearing while program window is dragged. **Version 1.2 changes - Major code review & cleanup - Mouse watching algorithm optimized - Duplicate cursor statistics calculations removed & rewritten...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 3
    ijblob
    The IJBlob library indentifying connected components in binary images. The algorithm used for connected component labeling is: Chang, F. (2004). A linear-time component-labeling algorithm using contour tracing technique. Computer Vision and Image Understanding, 93(2), 206–220. doi:10.1016/j.cviu.2003.09.002 The ImageJ *Shape Filter Plugin* (see downloads) uses this library for flitering the blobs by its shape. If you are using IJBlob in a scientific publication, please cite...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Unsupervised TXT classifier

    Unsupervised TXT classifier

    Classify any two TXT documents, no training required - JAVA

    This program is made to address two most common issues with the known classifying algorithms. First, over-training and second, shortage of data for a training of categories. Instead, each TXT file is a category on its own, rather than an assigned category. In a way, this is similar to clustering but not really a clustering algorithm since there is some training involved. The summarizer from Classifier4J has been adjusted to accept two inputs (lets call them A and B). Then, the summarizer gets...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • 5

    WOLFSIM: Wideband Optical FDTD Simulator

    FDTD Electomagnetic Wave Simulation Software

    ... these publications for full details on the algorithm: http://www.ece.ncsu.edu/oleg/files-wiki/6/62/SPIE_12_Miskiewicz_wolfsim3D.pdf http://www.ece.ncsu.edu/oleg/files-wiki/1/13/OptExpress07_OH.pdf
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    gannu

    gannu

    Java API and tools for performing NLP and other AI tasks

    Java API and tools for performing a wide range of AI tasks such as: word sense disambiguation (released), optimization (5 Evolutionary Algorithms Implemented ETA February 2014), opinion mining (ETA November 2014) and text wikification (ETA July 2014). Gannu includes some graphical interfaces for scientific purposes. When using Gannu please cite: *Jiménez, F. V., Gelbukh, A. F. & Sidorov, G. (2013). Simple Window Selection Strategies for the Simplified Lesk Algorithm for Word Sense...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Java application for training and deploying text processing applications such as part-of-speech taggers, based on a re-implementation of Brill's algorithm in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Damerau Levenshtein

    Java Library for Damerau Levenshtein Algorithm

    Downloads: 0 This Week
    Last Update:
    See Project
  • Test your software product anywhere in the world Icon
    Test your software product anywhere in the world

    Get feedback from real people across 190+ countries with the devices, environments, and payment instruments you need for your perfect test.

    Global App Testing is a managed pool of freelancers used by Google, Meta, Microsoft, and other world-beating software companies.
    Try us today.
  • 10
    MyPasswords

    MyPasswords

    Personal Password Manager

    What you need for managing your passwords, including the passwords of your online accounts, bank accounts and ... with the corresponding URLs. The passwords are encrypted by AES. Can be used on almost all operating systems including Windows & Linux.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 11
    totp-me

    totp-me

    TOTP authenticator for Java ME

    Not only a Google authenticator for 2-step verification for Java ME enabled phones. This is MIDlet-1.0 implementation of RFC 6238 authenticator - TOTP: Time-Based One-Time Password Algorithm. It's quick, simple and it supports multiple profiles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    ... has a graphical user interface, an Enigma like subsystem must be devised for data whitening. For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13

    Cipher(StudentProject)

    A simple encryption project for java

    A simple encryption project for java written for a school project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Java generic Iterator implementation to generate permutations and combinations. Uses the algorithm described here http://en.wikipedia.org/wiki/Steinhaus%E2%80%93Johnson%E2%80%93Trotter_algorithm#Even.27s_speedup and the clear description of that algorithm here: http://www.cut-the-knot.org/Curriculum/Combinatorics/JohnsonTrotter.shtml
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    J! Secure Password Hashes
    J! Secure Password Hashes provided an easy access to all Joomla! password hash algorithms and the Drupal 7 SHA-512 hashing algorithm. Compatible: Joomla! 2.5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    sfxcompress
    The utility sfxcompress is a bash script used to pack and encrypt the current directory on a self-extracting file. It also includes the calculation of the MD5 function to check if the compressed file is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    sqlite3fish

    Another encryption solution (with Blowfish algorithm) for SQLite3

    The sqlite3fish is another encryption solution for sqlite3. It is based on some source code of botansqlite3(https://github.com/OlivierJG/botansqlite3) . But it does not need Botan library, it uses Blowfish algorithm to encrypt/decrypt the database file. This library only depends on the source code(no-modify) of SQLite3, it is clean and easy to compile. But currently it only supports the version 3.7.0 of SQLite3 (http://www.sqlite.org/sqlite-amalgamation-3_7_0.zip) .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The Java RTree project aims to maintain an Java version of the RTree spatial indexing algorithm. See http://jsi.sourceforge.net for more information, and http://github.com/aled/jsi for latest development code.
    Leader badge
    Downloads: 1,455 This Week
    Last Update:
    See Project
  • 19

    Approximate Subgraph Matching Algorithm

    Approximate Subgraph Matching Algorithm for Dependency Graphs

    ..., the total worst-case algorithm complexity is O(m^n * n(n-1)/2 * km * log m). This Java implementation implements our ASM algorithm. See README file: https://sourceforge.net/projects/asmalgorithm/files/ If you use our ASM implementation to support academic research, please cite the following paper: Haibin Liu, Lawrence Hunter, Vlado Keselj, and Karin Verspoor. Approximate Subgraph Matching-based Literature Mining for Biomedical Events and Relations. PLOS ONE, 8:4 e60954, 2013.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ECG2HRV

    ECG2HRV

    import and store ECG, associate to clinical data, automatic HRV

    http://www.youtube.com/watch?v=AOzpNMC-FXU This multi-platform application will enable the user to import digital CSV ECGs at any sampling rate and store them in an encrypted local DB along with relevant clinical data of the patient. It also performs automatic QRS complex detection and RR interval classification showing the output in a visual chart that the user can edit to correct sources with artifacts or pats with bad detections. This project was developed using Netbeans 7.3...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 21

    java quickShort

    quick short in java

    This simple shorting large data from file using quickshort algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    NeSSi2

    NeSSi2

    Network security simulator

    At the moment NeSSi² is not actively maintained anymore since we are planning a successor project. NeSSi² is a network simulation tool suite addressing in particular network security aspects. Sample capabilities are profile-based attack generation, traffic analysis and support for attack/malware detection algorithm plugins.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info. * Ipv4 and Ipv6 Supoort...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24

    VIM cloud

    Web Based IaaS Cloud Controller (VimCloud)

    This is a pure IaaS cloud controller with all the basic functionality of IaaS Cloud Controller. This uses proposed “Trust Based Scheduling Algorithm and Load Balancing Algorithm”. It uses Cloud Architecture with Trust Management layer. It uses Qemu machine emulator and virtualizer as virtualization software at Host. It uses Libvirt driver [30] to interact with Qemu and to interact with its virtualization capabilities of a range of operating systems. Libvirt provides a common, generic and stable...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    MyZone Social Network

    peer to peer social network

    MyZone is a peer to peer social network that supports almost all features common in Facebook and Google+. In addition you can share unlimited mp3s and mp4s with your friends. MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking platform...
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.