Search Results for "encryption algorithm java" - Page 26

Showing 861 open source projects for "encryption algorithm java"

View related business solutions
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    Jala is a Java framework for algorithm performance measurement and comparison.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    HelloWorld is a decentralized social network based on OpenID, P2P and different JAVA encryption technologies. It will offer all the fundamental functionalities of a social network platform respecting the right of informational self-determination.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Brute is a brute force hash cracker, it allows the user to specify how many threads he want running simultaneously. It is fast, and modular, all the hash algorithm dependent code lies in a module (a shared library). Modules available: MD5; SHA256; SHA512
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    NetBeans, pure Java. The Cryppie can protect your files by encrypting its content, possibility to compress files before encryption. It's destination for keep information in safe on your flash drive or another storage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 5
    mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    The project will develop an in – memory object cache utilizing the LRU (least-recently-used) algorithm. The cache will store the objects that are most accessed within a fixed size memory pool. Thus system is keep statistics and calculates tradeoffs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    MC2 Java Multicast Chat is a serverless p2p chat based on multicast datagrams. Very useful if you want to quickly have a chat session in a Lan without having to do annoying setups. Supports file sharing / sending,multiple channel chat and data encryption
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Processes boolean functions which can be provided either as a list of 0s and 1s or which can be provided as a formula in first-order logic (using disjunctive or conjunctive normal forms). Internally the Quine McCluskey algorithm is used.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Free Version - Krytponite Free provides 2048 bit encryption on any type of file as text, pdf, mp3, etc. This implementation is platform independent and uses an apache-tomcat server, and runs all computers (Linux, PC, and Mac).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • 10
    Primarily applied in experimental psychology, where it is used to create experiment schedules. It even can be applied to other planning-activities that have to met boundary constraints. Rando uses a genetic-algorithm to construct a fulfilled schedule.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A 2D rigid physics simulator and set of genetic algorithm tools. Evolve cute little walking creatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Implementing and demonstrating the Dijkstra Algorithm for educational purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This is an academic project; the main objective is to generate an algorithm to parallelize a CNF formula and then feed the distributed parts to sequential SAT solvers, for this project we have choose to use Sat4J as the solver.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Mav.Crypt tool will be upgraded to many different encryption methods. At the Moment, the only method is ROT13, but we are developing some other technics and a new Algorithm. More Infos shortly at the Project Web Page.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    TrueSimpleCrypt is a Linux GUI for TrueCrypt, an open-source on-the-fly disk encryption software. Targeting the end-user, TrueSimpleCrypt's aim is to offer essential, everyday features in an intuitive graphical user interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    TACS (Trust Ant Colony System) is a Trust model for P2P, Ad-hoc and Wireless Sensor networks (also valid for multi-agent systems) based on the bio-inspired algorithm ACS (Ant Colony System).
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    A hierarchical representation language for music, which can be used as a human algorithmic composition tool or as a semi-automated composition tool using a genetic algorithm with human listeners as the fitness function.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Sorting algorithm performance testing using a generic test interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Java implementation of A* algorithm, that could be used in Roguelike games.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    With Tiger Envelopes you can stop snoops from reading your email. Same email client. No extra steps. One click to install on Windows and Linux. Configures Outlook, Thunderbird, and KMail. Supports GPG, PGP, Bouncy Castle encryption.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    The Decision Tree Learning algorithm ID3 extended with pre-pruning for WEKA, the free open-source Java API for Machine Learning. It achieves better accuracy than WEKA's ID3, which lacks pre-pruning.Info: http://bruno-wp.blogspot.com/search/label/Softwar
    Downloads: 6 This Week
    Last Update:
    See Project
  • 25
    Hermes FTP Server is a free, cross-platform FTP server adhering to RFC 959, RFC 2228, and RFC 2389. It is being developed in Java with a strong focus on security and extensibility.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.