Showing 104 open source projects for "java implementation loader"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Photo and Video Editing APIs and SDKs Icon
    Photo and Video Editing APIs and SDKs

    Trusted by 150 million+ creators and businesses globally

    Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
    Learn More
  • 1
    JMixNet is a Java implementation of a so called Chauminian Mixnet (or mix-net, or even mix net, at your will ;). It is an anonymous communication network, designed to provide anonymity in data transfers among Internet users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SEPIA: Security-oriented PN Framework

    SEPIA: Security-oriented PN Framework

    Petri net framework for security related modeling and reasoning.

    SEPIA provides implementations for various types of Petri nets. Along Place/Transition-nets, it supports Petri nets with distinguishable token colors and defines coloured workflow nets, where coloured tokens are interpreted as data elements used during process execution. To support information flow analysis of processes, SEPIA defines so-called IF-Nets, tailored for security-oriented workflow modeling which enable users to assign security-levels (HIGH, LOW) to transitions, data elements and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ProGrade

    ProGrade

    Java Security Manager made easy

    The pro-grade library provides implementation of custom Java Security Managers and Security Policies. The main components are the Java Security Policy implementation with deny rules and Policy File generator.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Open eID Fraunhofer

    Open eID Fraunhofer

    Implementation of the protocols PACE, Terminal and Chip Authentication

    This project provides a pure Java implementation of the protocols PACE, Terminal Authentication and Chip Authentication for the german eID infrastructure as specified by BSI TR-03110 and BSI TR-03112. Furthermore this project contains an Android eID client based on this implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • No-Nonsense Code-to-Cloud Security for Devs | Aikido Icon
    No-Nonsense Code-to-Cloud Security for Devs | Aikido

    Connect your GitHub, GitLab, Bitbucket, or Azure DevOps account to start scanning your repos for free.

    Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
    Start for Free
  • 5
    An open-source Java-based XCCDF reference implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    totp-me

    totp-me

    TOTP authenticator for Java ME

    Not only a Google authenticator for 2-step verification for Java ME enabled phones. This is MIDlet-1.0 implementation of RFC 6238 authenticator - TOTP: Time-Based One-Time Password Algorithm. It's quick, simple and it supports multiple profiles.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    The OCIL Interpreter is a standalone Java GUI implementation that demonstrates how an OCIL document can be evaluated. It guides the end user in completing questionnaires (one question at a time), viewing and computing results.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    PBM stealth

    Data hiding in bi-level pbm images

    Implementation of block parity for hiding data in bi-level pbm images in java. Increasing the security of stenography by using a random symmetric key for embedding and extraction of data from image. The project also has a PBM viewer in java and ascii viewer which shows the pbm images in ascii format.This project uses binary coded pbm images. Research paper : http://arxiv.org/abs/1304.1683 Key mechanism is not functional and program have bugs which are to be fixed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    NTRU

    NTRU

    NTRUEncrypt and NTRUSign in Java

    This project provides an implementation of the NTRU public-key cryptosystem: NTRUEncrypt and NTRUSign.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 10
    The project provides functionality to interface the SmartCardIO Java SDK library to Global Platform compliant smart cards, similar to globalplatform.sf.net. The difference is pure Java implementation and easy plug in to your SmartCardIO applications. This project is now more or less subsumed by Martin Paljak's continuation of the project at https://github.com/martinpaljak/GlobalPlatformPro.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    Chi-Square & LSB Enhancement attack

    Chi-Square & LSB Enhancement attack

    Java implementation of Chi-Square Attack and LSB Enhancement Attack

    Chi-square attack is the most commonly known and used statistical attack in steganalysis. LSB enhancement attack is also the most widely known visual attack in this area. This project includes implementation of these two methods in java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The CPE Reference Implementation is a freely available application that demonstrates the naming and matching schemes of the CPE specification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14

    JavaCryption

    jCryption implementation for Java.

    This project provides a jCryption 2.0 implementation for Java (http://www.jcryption.org/).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    tickets

    pythonic kerberosish ticket system: easy to use, easy to subclass

    ...: provides core implementation of state-less Cross Site Request Forgery protection. Other use cases include ticketing object param values pointing at URL:s or services in HTML-objects such as Flash or Java Applets. This adds server-side choises to be made while preventing users from using arbitrary values. Severe testing is done and will be mandatory for core and every specific implementation. Every single bit is flipped and various ticket contents and flag combinations are permutated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    HPCP (High Performance Channel Protocol) is a transactional data exchange specification, defining an implementation and usage of HTTPS, XML, SOAP, and LDAP. The EEAT HPCP implementation is written in JAVA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    ISO18013 Electronic Driving License Java reference implementation. The project implements the host API for reading out ISO compliant electronic driving licenses and a Java Card applet that implements the standard on a smart card.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 18
    Java implementation of MIKEY (Multimedia Internet KEYing, RFC 3830).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This project provides a java implementation of the Captcha project ( see http://www.captcha.net ). A CAPTCHA is a program that can generate and grade tests that: -Most humans can pass. -Current computer programs can't pass.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    Sun's XACML Implementation is an access control policy evaluation engine written entirely in the Java(tm) programming language. It supports XACML 1.x and 2.0 core features, and provides a number of powerful extensions and extensibility points.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    An open source Java/Java Card implementation of the ISO7816 and related PKI standards.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22
    ANts P2P
    ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 23
    Java implementation of the most commonly used algorithms for exact string matching, where the pattern is given first.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    opacity
    The Open Protocol for Access Control Identification and Ticketing with privacY, is a standard suite of Key Establishment and Authentication protocols based on ECC and AES, for optimized contactless transactions and simple PKI based Key management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Server/client suite which provides per-user access control/firewall/QOS. Robust and high speed implementation is secure against MAC/IP spoofing, and can scale to large networks with many clients. Options for additional monitoring and captive portal.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.