Search Results for "encryption algorithm java" - Page 15

Showing 869 open source projects for "encryption algorithm java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Grafana: The open and composable observability platform Icon
    Grafana: The open and composable observability platform

    Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

    Grafana is the open source analytics & monitoring solution for every database.
    Learn More
  • 1
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    ...For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    sfxcompress
    The utility sfxcompress is a bash script used to pack and encrypt the current directory on a self-extracting file. It also includes the calculation of the MD5 function to check if the compressed file is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    java quickShort

    quick short in java

    This simple shorting large data from file using quickshort algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5

    SecurePassG

    Creates Secure Passwords

    ...Click "Files" and choose the Java or Windows version, whichever you prefer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ECG2HRV

    ECG2HRV

    import and store ECG, associate to clinical data, automatic HRV

    http://www.youtube.com/watch?v=AOzpNMC-FXU This multi-platform application will enable the user to import digital CSV ECGs at any sampling rate and store them in an encrypted local DB along with relevant clinical data of the patient. It also performs automatic QRS complex detection and RR interval classification showing the output in a visual chart that the user can edit to correct sources with artifacts or pats with bad detections. This project was developed using Netbeans 7.3...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    VIM cloud

    Web Based IaaS Cloud Controller (VimCloud)

    This is a pure IaaS cloud controller with all the basic functionality of IaaS Cloud Controller. This uses proposed “Trust Based Scheduling Algorithm and Load Balancing Algorithm”. It uses Cloud Architecture with Trust Management layer. It uses Qemu machine emulator and virtualizer as virtualization software at Host. It uses Libvirt driver [30] to interact with Qemu and to interact with its virtualization capabilities of a range of operating systems. Libvirt provides a common, generic and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    NeSSi2

    NeSSi2

    Network security simulator

    At the moment NeSSi² is not actively maintained anymore since we are planning a successor project. NeSSi² is a network simulation tool suite addressing in particular network security aspects. Sample capabilities are profile-based attack generation, traffic analysis and support for attack/malware detection algorithm plugins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    This software uses a genetic algorithm to "evolve" reactor designs for Schema's space-simulation game, Star-Made (http://star-made.org/). One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • North One Connected Banking Icon
    North One Connected Banking

    North One is a business banking app that integrates cash flow, payments, and budgeting to turn your North One Account into one 'Connected Bank Account

    Connect every part of your business to one bank account
    Learn More
  • 10
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info. * Ipv4 and Ipv6...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    MyZone Social Network

    peer to peer social network

    MyZone is a peer to peer social network that supports almost all features common in Facebook and Google+. In addition you can share unlimited mp3s and mp4s with your friends. MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The Java RTree project aims to maintain an Java version of the RTree spatial indexing algorithm. See http://jsi.sourceforge.net for more information, and http://github.com/aled/jsi for latest development code.
    Leader badge
    Downloads: 417 This Week
    Last Update:
    See Project
  • 13

    Fylogenetica

    Constructing level-1-networks consistent with a set of quartets

    This project is an implementation of an algorithm by J. Keijsper and R. Pendavingh. The goal of the algorithm is to construct a phylogenetic level-1-network that is consistent with a given set of quartets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Approximate Subgraph Matching Algorithm

    Approximate Subgraph Matching Algorithm for Dependency Graphs

    ...This Java implementation implements our ASM algorithm. See README file: https://sourceforge.net/projects/asmalgorithm/files/ If you use our ASM implementation to support academic research, please cite the following paper: Haibin Liu, Lawrence Hunter, Vlado Keselj, and Karin Verspoor. Approximate Subgraph Matching-based Literature Mining for Biomedical Events and Relations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    MathParser Java - Math Parser library

    MathParser Java - Math Parser library

    Mathematical Parser for Java

    This project gives a mathematical parser for converting a simple string expression into a result which can be managed for using in other calculations, all in Java. Using a couple lines of code, you'll be able to parse complex arithmetic expressions efficiently. This library is powered by Dijkstra's Shuting-yard algorithm. The library has no dependencies with other external libraries. Dependency <dependency> <groupId>com.google.code.mathparser-java</groupId> <artifactId>mathparser-java</artifactId> <version>1.0.0</version> </dependency> Expressions supported (Mar/09/2013) - Arithmetic operations. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    sudoku Solver

    sudoku Solver

    A sudoku solver project built with Java with a user friendly interface

    This project has been built to allow you solve any Sudoku problem in no time. The project built using Java programming language. It`s simple interface built using Swing technology. A smart algorithm has been designed to solve your problem. First, using the systematic human way of solving. If the human failed to solve, your problem will be passed to a stronger algorithm that based on Try and Fail techniques and possibilities. Enjoy, learn and develop.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Document Analysis and Exploitation
    The Document Analysis and Exploitation Platform is a Drupal based web interface to a cloud enabled Document Analysis resource set.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    jEncrypt

    jEncrypt is a command line file encryption archiver

    jEncrypt is a command line file encryption archiver designed to help you encrypt files and directories into a single file archive.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Anonymous File Transfer Network (AFTN)

    Send files securely and anonymously

    AFTN is a Peer to Peer network designed to allow its users to securely and anonymously transfer files to other members of the network by utilizing encryption and onion routing techniques. It is important to recognize that this is not a "File Sharing" network, nor is not intended as a means of distributing copyrighted or otherwise protected content illegally. Rather it is designed to provide anonymity, confidentiality and plausible deniability to those with a reasonable and legal need to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    ResultsDB

    Manage your algorithm results.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Semantic query optimization (SQO) is the process of finding equivalent rewritings of an input query given constraints that hold in a database instance. We present a Chase & Backchase (C&B) algorithm strategy that generalizes and improves on well-known methods in the field. The implementation of our approach, the pegasus system, outperforms existing C&B systems an average by two orders of magnitude. This gain in performance is due to a combination of novel methods that lower the complexity...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    DJDarwin

    DJDarwin

    A Genetic algorithm approach to creating beats.

    The program puts beats through evolution - survival, mutations, reproduction. The purpose, in the words of Africa Bambaataa - Looking for the perfect beat. Using a genetic­ algorithmic framework, the user's taste defines a Beat fitness function - she decides which beats survive and breed, and which join the choir invisible. In addition, the user can easily define an automatic fitness function, put the program on 'auto­pilot' mode, and let it speed up evolution. Different types of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Hide my message

    Hide my message

    Hide your secret message into any type of files

    Secrets is a Java application allow you to hide you message into any type of files either audio, video, text, dll or any type of files. It use a simple Cryptography algorithm to save the message in an secret way, so it can`t be read by any HexaReader. You can retrieve your message also in a very simple way by choosing the original file and click on Decode button.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    ORDO vers.1.0

    AES-128, Linux, OpenBSD, Assembly-Language

    Small cryptographic command line tool for LINUX and OpenBSD (x86) completely in 32-Bit Assembly Language. ORDO encrypt/decrypt files (max. size 2 GB) with AES-128-Algorithm (Rijndael) in CBC-Mode (Cipher-Block-Chaining). No libs are included, only system-calls are used. ORDO is under BSD License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Mouse Run

    Mouse Run

    Programming Game, A Practice Tool for Building Intelligent Things

    Mouse Run is a programming game where programmers can implement a mouse and let it run in a maze to hunt of cheese. It is a battle among programmers to test who can build the most intelligent mouse, given limited information during the game. Programmers need only implement one code file, extending from an abstract class that will contain the logic of the individual mouse. The game Host will gather all the mouse implementation and let them run in the maze. It is real fun for...
    Downloads: 0 This Week
    Last Update:
    See Project