Search Results for "encryption algorithm java" - Page 25

Showing 861 open source projects for "encryption algorithm java"

View related business solutions
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 1
    SJEA version 1.0 - Simple Java Encryption Algorithm. SJEA is a simple command-line binary encryption algorithm (symmetric block cipher) written in JAVA. It uses a password and a byte-vector array to scramble the input file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Java package to study a clustering model described in the paper \"Novel Clustering Algorithm Based Upon Games on Evolving Network\" by Q. Li, Z. Chen, Y. He and J-P. Jiang (in arxiv: http://arxiv.org/pdf/0812.5064v1), generalizations and similar issues.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Java API for implementing any kind of Genetic Algorithm and Genetic Programming applications quickly and easily. Contains a wide range of ready-to-use GA and GP algorithms and operators to be plugged-in or extended. Includes Tutorials and Examples.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A polynomial-time algorithm for constructing level-2 phylogenetic networks from dense sets of rooted triplets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 5
    Encryption application using one time pad algoritm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    j!com is a secure instant messaging system, featuring a classical AIM-like interface, and providing AES encryption for conversations and login.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This project covers an algorithm for face detection in color images. It was developed as a conclusion work in graduation of Computer Science at Pontifícia Universidade Católica de Minas Gerais by Breno Santos Araújo (brenopuc@gmail.com).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Java port of Mozilla&#39;s automatic charset detection algorithm. See... <a href="http://www.mozilla.org/projects/intl/chardet.html"> http://www.mozilla.org/projects/intl/chardet.html </a>for the details of the orginal code and Author.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    ClearPass (formerly BlowPass) is web based password storage system that uses the Blowfish algorithm and a Host-Proof design pattern.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    gaKnn(Genetic Algorithm Optimized K Nearest Neighbor Classification framework) is a frameowork for KNN optimization with a genetic algorithm. The genetic algothm used for this is JGAP (http://jgap.sourceforge.net/).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    ECSKernel is a multiagent coordination algorithm testbed, built on the RoboCupRescue disaster simulation platform. It is easily configurable and can be used with user-generated scenarios.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    IceNotes ME for Mobile Devices is an extremly usefull ;-) JAVA ME (J2ME) application to store all your important (text)notes on your mobile phone using "Twofish" encryption. Your notes are organized by assigning your own custom tags to your notes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    DiscriAlign implements a novel algorithm that aligns a set of biological interaction networks.It identifies both functionally conserved and dissimilar regions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This is an implementation of the Drop Dead loot management system used by the Elders kinship in the Lord of the Rings online. The algorithm is based on the Suicide Kings system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Evolve is a simulation written in java that uses the Genetic Algorithm to evolve intelligent agents acting in a rich environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    iScore measures the interestingness of news articles in a limited user environment. It is an online learning algorithm that combines a large set of disparate features to classify documents. To download the source code, please use subversion.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TBLTools is a set of GATE processing resources that implements the Fast Transformation Based Learning Algorithm. You can train it to learn rules for NLP tasks such as Named Entity Recognition and Shallow parsing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Semeir is a Encryption algorithm, Capable of block encryption. It is written in pure C. It is platform independent, and is promising for Embedded systems. Intended as an alternate, yet secure data encryption cipher.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Based on the classification algorithm coverage tools JCover,developed by java and it's open source.at present,it include field-cover and cross-cover.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This program is a replica of SafeSex by Nullsoft. Written from scratch on the .NET Framework 3.5. It allows you to keep useful notes in a safe manner, as it allows for encryption using the world renowned AES encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This is an algorithm to codify Spanish words to an equivalent phonetic code. That intends to be a substitute of Soundex algorithm that is not practical to use in Spanish. It is very useful for search engines based on text information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This program serves to keep track of different types of accounts (technically an infinity number of different types). Currently only bank and equity accounts are supported. Data is saved on the user's computer and encrypted using the DES-algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The Security Annotation Framework (SAF) is an instance-level access control framework and field-level encryption framework driven by Java 5 annotations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A disk based production quality RTree based upon Guttman’s quadratic split algorithm having following features: Buffering with dirty write, Index joins, Tree Seeding, Window and NN queries, Runtime STR Packing capability, Completely Thread safe.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.