Search Results for "encryption algorithm java" - Page 17

Showing 869 open source projects for "encryption algorithm java"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    My Text is Treasure
    It is a simple password manager for your PC and Smartphone. It works like a text editor and uses a strong cryptography algorithm to generate the end file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Hanasu

    Hanasu

    A P2P Messenger which uses JXTA. It provides secure RSA/AES end-to-end

    Does not work because there is no master server! A P2P Messenger which uses JXTA. It provides secure RSA/AES end-to-end encryption and VoIP-Capabilities.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3

    TextComparer

    Small Java program to compare two texts

    ...Probably very much can be done to improve this program and the algorithm which it uses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    JCrypTool - Eclipse based Crypto Toolkit
    JCrypTool moved to GitHub! See https://groups.google.com/d/topic/jcryptool-developers/nauEXL6vsbk/discussion for more information and visit our new project home at https://github.com/jcryptool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Tetrumble

    Tetrumble is encryption tool.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This a NetBeans project developed to create a small Hexagon map library with a few basic functionalities. It is possible to measure distance between tiles's centres and calculate the best path between two of them (if any). It is possible to define tiles where it is not possible to pass (or reenabling them) by right clicking on them (they will become red), creating therefore obstacles that can help testing the path finding algorithm. This library is licences under GPL licence.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Java Random Numbers - Random.Org API

    Offers Random numbers API for your programs written in Java.

    Very lightweight and easy to use library that allows you to generate truly random numbers by means of Random.Org service. Library offers optimized algorithms for obtaining single random number or more random numbers at once, sequences of numbers, random strings etc. Also allows you to check quota. It provides algorithm to generate unspecified number of random numbers of certain total value. This algorithm still keeps server load low by sending as large requests as possible, yet all...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Stegno

    This project is created for providing basic stegnography concept.

    ...RUN Decryptor.CLASS (WITH APPROPRIATE JAVA ENV.) 2. PROVIDE APPROPRIATE PARAMETERS. • file_name : (NAME OF FILE i.e. output_file_name in ENCRYPTION process) • logical_file_name : (NAME OF LOGICAL FILE i.e. target_file_name in ENCRYPTION process, file extension matters not name) e.g. java hidden.mp3 hideme.mp3 [output_file_name] [target_file_name]
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Original Buy Center Software. Icon
    The Original Buy Center Software.

    Never Go To The Auction Again.

    VAN sources private-party vehicles from over 20 platforms and provides all necessary tools to communicate with sellers and manage opportunities. Franchise and Independent dealers can boost their buy center strategies with our advanced tools and an experienced Acquisition Coaching™ team dedicated to your success.
    Learn More
  • 10
    Welcome to the Algorithm Development Kit, the associated code repository to the "Algorithms in a Nutshell" book published by O'Reilly Media, Inc. http://oreilly.com/catalog/9780596516246. This repository is freely available for you to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    HTML Encrypter

    HTML Encrypter

    Java based HTML encrypter and decrypter

    An encryption and decryption application developed in Java. The application uses a number of algorithms to encrypt and decrypt the HTML source code: Blowfish, AES, TEA, Rabbit, MARC 4, Escape/Unescape functions. In addition to the encryption and decryption functions, the application also returns the source code of a website. The user has the ability to upload the encrypted file, using the FTP transfer feature, to his or hers personal website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    JAVA Arabic Stemmer

    A JAVA class with a small functionality that is stemming Arabic words

    A JAVA Arabic stemmer that is based on Shereen Khoja algorithm. This java class offers a function called stemWrod which takes an arabic word and return the stem of it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    spantus
    Spantus - signal(speech) analytical tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15

    Dinapter:

    Generate adaptation contracts between incompatible services

    Dinapter automatically generates a mapping between methods of incompatible components/services based on their public interfaces and behaviors. It uses a combination of expert system and A* algorithm. Dinapter is the prototype resulting from a couple of research papers: * J.A. Martín, E. Pimentel. Automatic Generation of Adaptation Contracts, FOCLASA'08, ENTCS, 2008 - http://goo.gl/21iJZ * J.A. martín, E. Pimentel. Dinapter: Automatic Adapter Specification for Software Composition,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Here are implementations of the Dual Contouring algorithm (SIGGRAPH 2002, see http://www1.cse.wustl.edu/~taoju/research/dualContour.pdf). The C++ code was co-developed by Tao Ju and Scott Schaefer, and Java port is done by Jean-Denis Boudreault.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Sudoku Cracker

    Sudoku Cracker

    Sudoku puzzle cracker with User Interface (Java)

    Sudoku cracking algorithm with a convenient user interface with drop down options to fill up the grid. (Java platform)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A library written in Java and C# for crypt,encrypt and generate key pairs using the ElGamal algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A cross platform steganography software written completely in java, with a juicy AES support. The project is pretty extensible, so new smarter steganography algorithms's are fully implementable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    NitroCache

    Extremely fast, scalable, concurrent, pure Java In-memory cache

    One of the fastest, 100% Pure Java In-memory cache. Its aimed at providing very fast, light, highly scalable cache with high concurrency. The fetch operation from cache are always in constant time, O(c), irrespective of the number of threads accessing the cache or cache size. NitroCache uses unique custom algorithm inspired by Btree, skiplist and hashing to deliver a constant time cache with lock-less fetches.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    RSAmake

    RSAmake

    An Cryptography software with RSA algorithm

    An Cryptography software with RSA algorithm RSAmake using Python and WxPython written
    Downloads: 2 This Week
    Last Update:
    See Project
  • 22

    Genetic Basis

    A general genetic algorithm framework

    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Galois sub-hierarchy builder

    Visualize Galois sub-hierarchy of 2d matrix

    GSH builder is a free Galois Sub-Hierarchy visualization tool. The algorithm for calculating GSH is called Pluton and the present Java realization is based on two articles. "Efficiently computing a linear extension of the sub-hierarchy of a Concept Lattice" by Anne Berry, Marianne Huchard, Ross M. McConnell, Alain Sigayret and Jeremy P. Spinrad. "Performances of Galois Sub-hierarchy-building algorithms" by Gabriela Arevalo, Anne Berry, Marianne Huchard, Guillaume Perrot and Alain Sigayret In you're in need of other GSH algorithms or their realizations in C++, you might want to investigate a project called Galicia on sourceforge. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    WiFi Location Tracking

    Location tracks objects based on SSID strength in 2D environments

    This simple algorithm gives an example of location tracking in indoor environment using WiFi signals strengths sent to a local sever machine which then determines the clients location.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    KonEncriptación

    KonEncriptación

    Encryption tool for Dropbox

    It's a new, free distribution encryption software that provides Dropbox users with additional security for their sensitive information. Encrypt and securely share your files with other KonEncriptación users via Dropbox. KonEncriptación is fully integrated with Dropbox and is easy to use, thus allowing you to exploit all its features from the start.
    Downloads: 0 This Week
    Last Update:
    See Project