Search Results for "encryption algorithm java" - Page 23

Showing 869 open source projects for "encryption algorithm java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • 1
    A particle swarm optimization demo written by students in the digital communication msc program (2010) at uni-kiel.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    weka outlier is an implementation of outlier detection algorithms for WEKA. CODB (Class Outliers: Distance-Based) Algorithm is the first algorithm developed using WEKA framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    DazioAES is a password manager: it's an application protected by a single password that stores multiple other password or informations in an encrypted way. It uses Bouncycastle crypto library (classes from) and their AES encryption implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    A small program written in java which helps you to manage your passwords in a secure way. Stores all your passwords so you only have to remember one single master password. You can create multiple profiles. 128 or 256 bit AES encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A GPS simulator created in java. It contains a graphical interface and the shortest path will be found using Dijkstra algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Maui is a multi-purpose automatic topic indexing algorithm. Given a document, Maui automatically identifies its topics. Depending on the task topics are tags, keywords, keyphrases, vocabulary terms, descriptors or Wikipedia titles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Reversi game with minimax algorithm
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Encrypt and decrypt text with my own encryption algorithm. (Executable included)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    A encryption library for C++ "DEL-X" that uses a 3d encryption algorithm. It can work with any key size from 8bit- 4096bit with a 512 byte block size.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This project is use full for student , project is developed by means of java swing ,here the cpu is stimulated by means of how it handles the multiple process at a time by means of different scheduling technique like FCFS,SJF,PSJF,RR etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Rinecrypt uses the Gladman implentation of the AES algorithm Rijndael and a SHA256 hash among other things, to encrypt/decrypt a file with a user supplied passsword.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    M.A.N.G.
    Marc's Awesome Name Generator is a Java based library to allow the easy and fast generation of random first, middle and last names based on user-definded criteria, such as culture of origin or contained letters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This library provides two operations: one to wrap key data, and another to unwrap the key data. This code also includes a fairly comprehensive unit test library which ensures the implementation is verified against the vectors provided in RFC 3394.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This is a reference implementation of snoBAC, a Bayesian Classifier designed to predict box H/ACA snoRNAs in Caenorhabditis nematode genomes. For details of algorithm and data, see Wang and Ruvinsky (2009) RNA in press.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This library implements Josh MacDonalds xdelta binary diff algorithm in java. More information on this algorithm can be found at http://sourceforge.net/projects/xdelta. Binary diff files are stored using the GDIFF file format for storing binary deltas.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    C/C++/Java XML parsers benchmarking toolset. Supported parsers: LibXML2, Xerces, Oracle XDK, Expat, RXP, QT, Sun Crismon. Benchmark Fields: Parsing (Native,SAX,DOM), DOM Manipulation, Schema Validation, XSL Transformation, XML Signature & Encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ConTextKit is a Java-based implementation of Wendy Chapman's ConText algorithm for annotating the context of medical documents, specifically the negation, temporality, and experiencer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ...Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ROT-13 Encryptor/Decryptor. More functionality will be added as different updates are released.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    EMURA is a suite of Java applications that allows two users to send encrypted messages back and forth - as a chat. The encryption key is secure and generated using the Diffie-Hellman algorithm. Utilizes GNU-CRYPTO libraries
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The IEEE 1619 Committee open-source reference implementations of encryption algorithms, plus testing and certification suites, for each encryption algorithm included in the standard.
    Downloads: 0 This Week
    Last Update:
    See Project