Search Results for "encryption algorithm java" - Page 15

Showing 741 open source projects for "encryption algorithm java"

View related business solutions
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 1
    spantus
    Spantus - signal(speech) analytical tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Here are implementations of the Dual Contouring algorithm (SIGGRAPH 2002, see http://www1.cse.wustl.edu/~taoju/research/dualContour.pdf). The C++ code was co-developed by Tao Ju and Scott Schaefer, and Java port is done by Jean-Denis Boudreault.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    HTML Encrypter

    HTML Encrypter

    Java based HTML encrypter and decrypter

    An encryption and decryption application developed in Java. The application uses a number of algorithms to encrypt and decrypt the HTML source code: Blowfish, AES, TEA, Rabbit, MARC 4, Escape/Unescape functions. In addition to the encryption and decryption functions, the application also returns the source code of a website. The user has the ability to upload the encrypted file, using the FTP transfer feature, to his or hers personal website. Additional features are listed below.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    NitroCache

    Extremely fast, scalable, concurrent, pure Java In-memory cache

    One of the fastest, 100% Pure Java In-memory cache. Its aimed at providing very fast, light, highly scalable cache with high concurrency. The fetch operation from cache are always in constant time, O(c), irrespective of the number of threads accessing the cache or cache size. NitroCache uses unique custom algorithm inspired by Btree, skiplist and hashing to deliver a constant time cache with lock-less fetches. For details on using NitroCache, please visit wiki section Note...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5

    Galois sub-hierarchy builder

    Visualize Galois sub-hierarchy of 2d matrix

    GSH builder is a free Galois Sub-Hierarchy visualization tool. The algorithm for calculating GSH is called Pluton and the present Java realization is based on two articles. "Efficiently computing a linear extension of the sub-hierarchy of a Concept Lattice" by Anne Berry, Marianne Huchard, Ross M. McConnell, Alain Sigayret and Jeremy P. Spinrad. "Performances of Galois Sub-hierarchy-building algorithms" by Gabriela Arevalo, Anne Berry, Marianne Huchard, Guillaume Perrot...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A cross platform steganography software written completely in java, with a juicy AES support. The project is pretty extensible, so new smarter steganography algorithms's are fully implementable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Sudoku Cracker

    Sudoku Cracker

    Sudoku puzzle cracker with User Interface (Java)

    Sudoku cracking algorithm with a convenient user interface with drop down options to fill up the grid. (Java platform)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Stegno

    This project is created for providing basic stegnography concept.

    THESE PROGRAMS JUST PROVIDES BASIC Stenography CONCEPT. ENCRYPTION 1. RUN Encryptor.CLASS (WITH APPROPRIATE JAVA ENV.) 2. PROVIDE APPROPRIATE PARAMETERS. • source_file_name : (NAME OF FILE TO WHICH target_file_name IS TO BE EMBEDDED) • target_file_name : (NAME OF FILE WHICH SHOULD BE EMBEDDED ) • output_file_name : (NAME OF OUTPUT FILE) e.g. java Encryptor original.mp3 hideme.mp3 hidden.mp3 (space will be used for separating parameters) [source_file_name] [target_file_name...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10

    Genetic Basis

    A general genetic algorithm framework

    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BayesianCortex

    BayesianCortex

    simple algorithm for a realtime interactive visual cortex for painting

    A paint program where the canvas is the visual cortex of a simple kind of artificial intelligence. You paint with the mouse into its dreams and it responds by changing what you painted gradually. There will also be an API for using it with other programs as a general high-dimensional space. Each pixel's brightness is its own dimension. Bayesian nodes have exactly 3 childs because that is all thats needed to do NAND in a fuzzy way as Bayes' Rule which is NAND at certain extremes. NAND can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    WiFi Location Tracking

    Location tracks objects based on SSID strength in 2D environments

    This simple algorithm gives an example of location tracking in indoor environment using WiFi signals strengths sent to a local sever machine which then determines the clients location.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    CRF is a Java implementation of Conditional Random Fields, an algorithm for learning from labeled sequences of examples. It also includes an implementation of Maximum Entropy learning.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Bracer

    Bracer

    Repository has been moved to: http://dtitov.github.com/bracer

    Java library for parsing and evaluating math expressions. Javadoc is available at http://bracer.sourceforge.net/javadoc/ P.S. This library depends on Apache Commons Math, so don't forget to include commons-math-2.2.jar to your project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Recursive to Iterative in Java

    Recursive to Iterative in Java

    converting java recursive methods to iterative ones. for educational purposes ,i didn't say much about the algorithm because this can be an interesting field of research for B.S. students.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    JCRCGen

    JCRCGen

    Generates Java source code for the CRC algorithm.

    JCRCGen is a tool written completely in Java that will output public domain Java source code containing both the simple and table-driven implementations of the Rocksoft Model CRC algorithm. Generator polynomials may be any 8-bit multiple between 8 and 64 bits.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    OpenSource Java based cross platform command line file encryption software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    RSAmake

    RSAmake

    An Cryptography software with RSA algorithm

    An Cryptography software with RSA algorithm RSAmake using Python and WxPython written
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SimpleHTTPDB is a client based key-value database that allows for storing data on any http-server via FTP. This way, no server-based functionality is required. Security of the data is provided by high-level encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    FactHash

    Factorial Hashing Function

    ... than the block size. I hold no guarantee of the security of this algorithm, USE AT YOUR OWN RISK. I have had no 3rd party analysis done on the algorithm to date, but research is welcome, and a challenge is even provided in CHALLENGE.txt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    j-Algo is an algorithm visualization tool, especially useful for students and lecturers of computer science. It is written in Java and platform independent. j-Algo is developed at Dresden University of Technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Cumulus4j is an encryption plug-in for DataNucleus. Applications can thus use JDO or JPA to persist their data into every common database. Using the Bouncy Castle cryptography libs, it provides strong encryption via AES, TwoFish or other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    GlabUke creates ukulele tabs and transposes it easily. It also offers a algorithm that finds the easiest transposition. Guk files can be exported as PDF for quality printing. Other features are planned for the future, such as addings lyrics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    MyVigilant Phone

    Detect fall and wander with android smart phone

    The objective of this project is to evaluate the possibility to use a smart phone (or watch phone) to detect dangerous situations (fall and wandering) encountered by fragile people, especially suffering from Alzeihmer deases. - HYPOTHESIS - => The smart phone embed sensors able to detect falls and wandering thanks an accelerometers and the GPS. => The smartphone provide an interface and embed connected technologies able to alert helpers people from almost...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    A package of java classes for the implementation of the UTASTAR algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.