Search Results for "encryption algorithm java" - Page 28

Showing 861 open source projects for "encryption algorithm java"

View related business solutions
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 1
    Wodka is the implementation of a genetic algorithm (GA) that can bread two dimensional structures that might be used as robots in sodarace competitions.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    This Project implements the mergesort algorithm in a MPICH2 (parallel programming -) environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The algorithm used by this MasterMind applet is very simple. Yet it is also very fast and it uses relatively few guesses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This project is a compression utility that supports different kinds of compression algorithm. For starters the following formats are supported (zip, jar, tar, gzip, bzip2). More compression format will be supported in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    RL HNFP is a neuro Fuzzy model which can automatic generate set of rule. So it can implement in domain although human don't have knowledge on it. This project implement that algorithm in Java so other people can use that for their application
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    wlfXchanger is a point-to-point communication software which enable developers to cooperate in a secure way, using an asymmetric encryption system (Public Key Cryptography).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    The project implements Dana Angluin's learning algorithm with intent to look into the possibility of computational learning of changing (shifting) information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    VeNCrypt adds TLS/X509 encryption and authentication to VNC. It is heavily based on the RealVNC Free Edition, thus being a single fork away from the original creators of VNC, and is fully compliant with the RFB protocol.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 9
    Type setting engine in Java. Uses an algorithm similar to Tex to layout text and images on a page and create a pdf output, supports multiple columns and images, which can be placed at arbitrary positions, spawm columns etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    A framework for utilising the Genetic Algorithm in the domain of Game Theory
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    anti spam tool. uses an active algorithm (not filtering).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Package for coding and decoding files with Matheos algorithm from commandline or console in Linux/Unix Environment. Based on Keys stored in files or as hardware locks (on devices). Fast and strong coding. Fast encoding.ONLY BINARY PACKAGES FOR NOW!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Project Tokaf is an general implementation of top-k algorithm. It provides interfaces for all modules that are needed. It also features user preferences module, for computing new preferences and manipulating existing ones.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    KNN-WEKA provides a implementation of the K-nearest neighbour algorithm for Weka. Weka is a collection of machine learning algorithms for data mining tasks. For more information on Weka, see http://www.cs.waikato.ac.nz/ml/weka/.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    DrPangloss is a python implementation of a three operator genetic algorithm, complete with a java swing GUI for running the GA and visualising performance, generation by generation
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    The main goal of OWLVE is to visualize graphically any OWL–lite file. Using powerful RCP and GEF technologies will improve the quality of graphics and diagrams.This project includes an algorithm for similarity calculus between two OWL files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A multithreaded GUI based encryption software that can encrypt any file on any platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Luky Library is a set of java classes which abstract complex operations. It comprises of classes for networking, event handling, encryption, database handling, snmp monitoring, queues, semaphores, parsers, XML handlers and much more
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The Eclipse XML-Security Plug-In allows you to experiment with the W3C recommendations on digital signatures and encryption and to learn all about their background. Arbitrary XML documents can be canonicalized, signed, verified and en- or decrypted.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This project intends to create an indexing search engine, for knowledge management. The primary object is to apply an information retrieval core. And implement a knowledge data discovery theory such as data mining algorithm, text mining.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Private-key, symmetrical (same password to encrypt and decode) file encryption with 8-bit to 2147483647-bit (2^3 to 2^31) encryption using my own algorithm and my own extension of MD5 (http://blog.robtoth.net/2009/06/tencryption-computer-programming.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A Java implementation of the NEAT algorithm as created by Kenneth O Stanley. Also provides a toolkit for further experiments to be created and can provide both local and distributed learning environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Convolutional Hashing Algorithm. Provably secure hashing algorithm based on worst case assumptions on cyclic-lattices.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Galapagos is a Genetic Algorithm framework written in Java 5 with the intended audience of undergraduates in an Artificial Intelligence class. The goal of Galapagos is usability: a competent student should be able to learn this library in an afternoon.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.