Search Results for "encryption algorithm java" - Page 27

Showing 869 open source projects for "encryption algorithm java"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    TrueSimpleCrypt is a Linux GUI for TrueCrypt, an open-source on-the-fly disk encryption software. Targeting the end-user, TrueSimpleCrypt's aim is to offer essential, everyday features in an intuitive graphical user interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A hierarchical representation language for music, which can be used as a human algorithmic composition tool or as a semi-automated composition tool using a genetic algorithm with human listeners as the fitness function.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    TACS (Trust Ant Colony System) is a Trust model for P2P, Ad-hoc and Wireless Sensor networks (also valid for multi-agent systems) based on the bio-inspired algorithm ACS (Ant Colony System).
    Downloads: 1 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Sorting algorithm performance testing using a generic test interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Pseudo Random Number Generator (PRNG) frontend using libtomcrypt. It simply writes pseudorandom data (using sober-128, fortuna, yarrow or rc4 algorithm) on standard output. The output may be encoded to base64, base85 or hex or just left binary.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Java implementation of A* algorithm, that could be used in Roguelike games.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Figaro's Password Manager (FPM) is a GNOME application that allows you to securely store & categorize your passwords, which are encrypted using the blowfish algorithm. It can launch applications using the host names, user names, and passwords you supply.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    Hermes FTP Server is a free, cross-platform FTP server adhering to RFC 959, RFC 2228, and RFC 2389. It is being developed in Java with a strong focus on security and extensibility.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    Email client & server with clustering support. Program focuses on data processing and management – the archiving, sending, receiving and encryption of e-mail messages with the related management of accounts. Functionality divided into server and client
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    JNSGA2 is a Java library with an implementation of the multi-objective genetic algorithm NSGA-II published by Deb et al.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A discretization algorithm based on the Minimum Description Length. Implemented as a filter according to the standards and interfaces of WEKA, the Java API for Machine Learning. More Info: http://bruno-wp.blogspot.com/search/label/Software
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Decision Tree Learning algorithm ID3 extended with pre-pruning for WEKA, the free open-source Java API for Machine Learning. It achieves better accuracy than WEKA's ID3, which lacks pre-pruning.Info: http://bruno-wp.blogspot.com/search/label/Softwar
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    JPowerGraph is a Java library for creating directed graphs for both Swing and SWT. It supports graph movement, selection, context menus, tooltips and dynamic edge creation. JPowerGraph has a spring layout algorithm based on that used in TouchGraph.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This is a java based encryption program that can encrypt any file you point it to.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    With Tiger Envelopes you can stop snoops from reading your email. Same email client. No extra steps. One click to install on Windows and Linux. Configures Outlook, Thunderbird, and KMail. Supports GPG, PGP, Bouncy Castle encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A small application which should be a notepad for your desktop, you can put new notes in a list and there are special features like encryption for private notes oder a bookmarkmanager and some other features
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Automatic test generation tool for Java, based on genetic algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    XinDiff is a diff utility implementing WinDiff like GUI by an improved LCS algorithm. The key feature in addition to WinDiff is in-place comments for code review.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    epacrypt is a tool to encrypt and decrypt plaintext and binary data using different encryption algorithms which can be chosen from a list.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Tools and documentations for algorithm competitions. 1) Luvlipse Eclipse plugin, providing the quick fixes which helps Java coding in program contest such as TopCoder. 2) documentations about algorithm competitions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    JSerpent is an easy to use Java implementation of the powerful Serpent cryptography algorithm. It can be easily implemented into any project, and is complete with ECB, padding, and a simple API.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    JFish is a simple Java implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes.
    Downloads: 0 This Week
    Last Update:
    See Project