Showing 236 open source projects for "libbiosig-3.dll"

View related business solutions
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    A smart card-based public key cryptography system based on elliptic curves, using AES for session key generation and SHA for hashing. This project will include the smart card software, terminal software, and a public key server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    We wish to explore the use of Java annotations for object validation, and specifically for input validation. The result should be a framework which should be easy to add to an existing application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    gaiusIdM is an Identity Management solution. A centralized identities repository that can be used to ditribute and provision identities on heterogeneous systems like RDBMS, ldap, MS AD, etc. It runs on Tomcat and is based on JPA,SDO,XSD,XSL,AJAX and Rest
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SERENITY is an integrated EU-funded project, which creates the first practical secure and dependable solution for AmI ecosystems. A set of its results will gradually become available under LGPL under this open source project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    The Freenet Project
    Development of a Java application designed to allow the free flow of information and ideas on the Internet without fear of censorship of any kind.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    The Crypthing project aims to develop cryptographic software for business, government and personal use within the context of Brazilian Public-Key Infrastructure.The first delivery is an application to sign documents for non-repudiation purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This is a simple app, created around an original sudoku solver based only on heuristics, not brute force. It's coded in Java/SWT(GUI toolkit). It's an example of MVC and of Visitor, Observer, Strategy, Abstract Factory, Singleton Design Patterns.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    "HelloWorld goes mobile" is a decentralized social network for mobile phones running under Google Android. It is based on XML and different JAVA encryption technologies. The software-structure is based on the desktop-orientated project "HelloWorld".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Encryption application using one time pad algoritm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 10
    A suite of modules for the Netbeans IDE for accessing and manipulating Java keystore files, X.509 certificates, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Project37 is a model-driven software application that uses an XML schema to generate security services which can be used to alter GUI forms or XML data sets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Pfyshnet is a public anonymous peer to peer network and file-system. Security is its primary concern, and it provides security for all aspects of participating nodes. It is one of the few network designs that provides strong anonymous keyword search.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    The GOLEM (Global Object Learning Enterprise Mediator) is a multi-module system for identity management purposes in an inter- and intra-university context. It supports eLearning applications in a very broad sense, i.e. including wikis and other web tools
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    CartoReso intends to facilitate enterprise computer network mapping.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    AntiSQLFilter is a J2EE Web Application Filter that protects web components from SQL Injection hacker attacks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This is a fork of the JSch project (Java Secure Channel) which fixes bug 1849771 (infinite loop when password is incorrect). It is hoped that the JSch author will incorporate this fix into the official JSch project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Grimoire Encoder is a useful Ascii Encoder while doing penetration tests on web applications. It supports URL Encoding, Full URL Encoding, Double URL Encoding, Unicode HTML, Unicode URL, Unicode URL IE Specific, Base64 Encoding, MD5, MD2, SHA1 and Binary
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    acegi usage example which contains some extended features: 1.get permission from db, 2.tag to test if the user has permission for an url 3.the permission can be refreshed when permission changes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Suite of services and tools for handling PKI requirements. The initial list of programs contains: 1) a viewer/encoding converter for X.509 certificates, 2) a viewer/editor/generator for PKCS#7 and 3) a viewer/editor/generator for various keystores types.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    PTestUnt is a unit based framework for testing web application vulnerabiltites. Requires ANT, JUnit and HttpUnit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Crypt-EG is an easy visual cryptosystem program that implements ElGamal method using elliptic curves.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Java-based security platform which provides a multi-user service middleware for distributed systems. Features: service environment, Shell-based interaction, user authentication (password, soft-token, smard-card), policy enforcement, Web services support
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Implementation of "Functional Specification of the OpenPGP application on ISO Smart Card Operating System" (OpenPGPCard) on Java Card.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Virtual Keyboard for security web systems access
    Downloads: 1 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB