Search Results for "encryption algorithm java" - Page 13

Showing 741 open source projects for "encryption algorithm java"

View related business solutions
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • 1
    sfxcompress
    The utility sfxcompress is a bash script used to pack and encrypt the current directory on a self-extracting file. It also includes the calculation of the MD5 function to check if the compressed file is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The Java RTree project aims to maintain an Java version of the RTree spatial indexing algorithm. See http://jsi.sourceforge.net for more information, and http://github.com/aled/jsi for latest development code.
    Leader badge
    Downloads: 1,779 This Week
    Last Update:
    See Project
  • 3
    ECG2HRV

    ECG2HRV

    import and store ECG, associate to clinical data, automatic HRV

    http://www.youtube.com/watch?v=AOzpNMC-FXU This multi-platform application will enable the user to import digital CSV ECGs at any sampling rate and store them in an encrypted local DB along with relevant clinical data of the patient. It also performs automatic QRS complex detection and RR interval classification showing the output in a visual chart that the user can edit to correct sources with artifacts or pats with bad detections. This project was developed using Netbeans 7.3...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4

    Approximate Subgraph Matching Algorithm

    Approximate Subgraph Matching Algorithm for Dependency Graphs

    ..., the total worst-case algorithm complexity is O(m^n * n(n-1)/2 * km * log m). This Java implementation implements our ASM algorithm. See README file: https://sourceforge.net/projects/asmalgorithm/files/ If you use our ASM implementation to support academic research, please cite the following paper: Haibin Liu, Lawrence Hunter, Vlado Keselj, and Karin Verspoor. Approximate Subgraph Matching-based Literature Mining for Biomedical Events and Relations. PLOS ONE, 8:4 e60954, 2013.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    NeSSi2

    NeSSi2

    Network security simulator

    At the moment NeSSi² is not actively maintained anymore since we are planning a successor project. NeSSi² is a network simulation tool suite addressing in particular network security aspects. Sample capabilities are profile-based attack generation, traffic analysis and support for attack/malware detection algorithm plugins.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    F-Talk P2P Encrypted Secure Voip

    F-Talk P2P Encrypted Secure Voip

    F-Talk cross-platform p2p encrypted secure voip software

    This project connect to two peers directly ( using without any central server, stun server ) together with 128bit encrypted secure voip communication. http://ftalk.armanasci.com/guide Spefications * Peer to peer direct connection without using any central dedicated server. ( First basic part of the security ) * 128bit AES Symmetric end-to-end encryption PCM datas. ( Second basic part of the security ) * 64bit Base64 Encoding transferred server side info. * Ipv4 and Ipv6 Supoort...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7

    VIM cloud

    Web Based IaaS Cloud Controller (VimCloud)

    This is a pure IaaS cloud controller with all the basic functionality of IaaS Cloud Controller. This uses proposed “Trust Based Scheduling Algorithm and Load Balancing Algorithm”. It uses Cloud Architecture with Trust Management layer. It uses Qemu machine emulator and virtualizer as virtualization software at Host. It uses Libvirt driver [30] to interact with Qemu and to interact with its virtualization capabilities of a range of operating systems. Libvirt provides a common, generic and stable...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    MyZone Social Network

    peer to peer social network

    MyZone is a peer to peer social network that supports almost all features common in Facebook and Google+. In addition you can share unlimited mp3s and mp4s with your friends. MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking platform...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    MathParser Java - Math Parser library

    MathParser Java - Math Parser library

    Mathematical Parser for Java

    This project gives a mathematical parser for converting a simple string expression into a result which can be managed for using in other calculations, all in Java. Using a couple lines of code, you'll be able to parse complex arithmetic expressions efficiently. This library is powered by Dijkstra's Shuting-yard algorithm. The library has no dependencies with other external libraries. Dependency <dependency> <groupId>com.google.code.mathparser-java</groupId...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 10

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    This software uses a genetic algorithm to "evolve" reactor designs for Schema's space-simulation game, Star-Made (http://star-made.org/). One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Maroniecoder

    Maroniecoder

    Encrypt a text through a list of encryption methods

    I came to the conclusion that this program is not worth the time for further development. Use different Encryption methods with parameters to en- or decrypted a text through the list With downloadable source-code since 1.3 You need to have Java installed http://www.oracle.com/technetwork/java/javase/downloads/index.html
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    SecurePassG

    Creates Secure Passwords

    SecurePassG creates more secure passwords. It is based on what I understand about password criteria needed to thwart most password guessing software. When saving or writing down a password, you may want to encrypt it using an encryption software like Encrypto available under my profile. When saving your password, you choose the extension you want to use, .txt should be fine. In addition to the original Java version, there is also a Windows .exe version written in C# that currently doesn't...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Fylogenetica

    Constructing level-1-networks consistent with a set of quartets

    This project is an implementation of an algorithm by J. Keijsper and R. Pendavingh. The goal of the algorithm is to construct a phylogenetic level-1-network that is consistent with a given set of quartets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Document Analysis and Exploitation
    The Document Analysis and Exploitation Platform is a Drupal based web interface to a cloud enabled Document Analysis resource set.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Semantic query optimization (SQO) is the process of finding equivalent rewritings of an input query given constraints that hold in a database instance. We present a Chase & Backchase (C&B) algorithm strategy that generalizes and improves on well-known methods in the field. The implementation of our approach, the pegasus system, outperforms existing C&B systems an average by two orders of magnitude. This gain in performance is due to a combination of novel methods that lower the complexity...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Anonymous File Transfer Network (AFTN)

    Send files securely and anonymously

    AFTN is a Peer to Peer network designed to allow its users to securely and anonymously transfer files to other members of the network by utilizing encryption and onion routing techniques. It is important to recognize that this is not a "File Sharing" network, nor is not intended as a means of distributing copyrighted or otherwise protected content illegally. Rather it is designed to provide anonymity, confidentiality and plausible deniability to those with a reasonable and legal need to do...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    DJDarwin

    DJDarwin

    A Genetic algorithm approach to creating beats.

    The program puts beats through evolution - survival, mutations, reproduction. The purpose, in the words of Africa Bambaataa - Looking for the perfect beat. Using a genetic­ algorithmic framework, the user's taste defines a Beat fitness function - she decides which beats survive and breed, and which join the choir invisible. In addition, the user can easily define an automatic fitness function, put the program on 'auto­pilot' mode, and let it speed up evolution. Different types of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Mouse Run

    Mouse Run

    Programming Game, A Practice Tool for Building Intelligent Things

    .../(or whatever you like to call yourself) like us. This game will be a perfect practice tool for programmers like us to find the best algorithm solutions and make the mouse intelligent. To get information on this game, visit the Mouse Run website at http://mouse-run.appspot.com If you have found bugs or have a request, please do write it in the reviews. Thanks!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    ResultsDB

    Manage your algorithm results.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    jEncrypt

    jEncrypt is a command line file encryption archiver

    jEncrypt is a command line file encryption archiver designed to help you encrypt files and directories into a single file archive.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Cabra

    Cabra

    Study smarter and get smarter with the award-winning studying tool

    Much more than plain old flashcards... smart studying sessions, notes, printing, sharing. A must-have for any student! Get Cabra today and join the ten thousand students who are studying smarter and getting smarter! Features: -Create and study flashcards with an algorithm optimized for YOU -Create notes, print your flashcards, share your creation with the world... -Ranked best software in PA High School Computer Fair Still not convinced? Check out getcabra.com.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    DeNovoCheck

    DeNovoCheck: Inheritance analysis for NGS trio data

    DeNovoCheck is intended to be used for inheritance analysis in NGS tio data. For rare dominant Mendelian diseases, patient-parent trios are often used to reduce the number of candidate variants. The algorithm bases the inheritance prediction on the data available in the parental BAM files and allows for a fast and reliable selection of potential de novo variants.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    MapPSO
    MapPSO is a tool for Ontology Alignment, which uses Discrete Particle Swarm Optimisation. A particle swarm is used to search for the optimal alignment. The algorithm is massively parallel and adapts naturally on parallel architectures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    An important tool for Algorithm Visualization (AV) developers is a repository of good examples of existing AVs, including source code. The goal of this site is to build a collection of AV implementations from a variety of developers in the AV community.
    Downloads: 9 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.