Search Results for "encryption algorithm java"

19 projects for "encryption algorithm java" with 1 filter applied:

  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • No-Nonsense Code-to-Cloud Security for Devs | Aikido Icon
    No-Nonsense Code-to-Cloud Security for Devs | Aikido

    Connect your GitHub, GitLab, Bitbucket, or Azure DevOps account to start scanning your repos for free.

    Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.
    Start for Free
  • 1
    BeeBEEP (Free Office Messenger)

    BeeBEEP (Free Office Messenger)

    You can message and share files inside your intranet without a server.

    BeeBEEP is a secure (encryption based on Rijndael Algorithm, AES) peer to peer office messenger. You can talk and send files with all your colleagues inside a local area network such of an office, home or internet cafe without a server. BeeBEEP works also with VPNs. This serverless application is indispensable in all those places where privacy and security an essential requirement. For more info visit: https://www.beebeep.net
    Leader badge
    Downloads: 2,310 This Week
    Last Update:
    See Project
  • 2
    [OFFICIAL] tinyfiledialogs C C++ v3.21.1

    [OFFICIAL] tinyfiledialogs C C++ v3.21.1

    inputbox password WIN OSX GTK QT Console VCPKG C# Lua R Fortran Pascal

    ... ASCII UTF-8 - applescript kdialog zenity shanty … ° SSH console / X forwarding / waypipe Wayland ° the dialogs can be forced into console mode ° curses dialogs via Dialog.exe/Dialog (disabled by default) C89/C18 & C++98/C++23 compliant VisualStudio MinGW GCC Clang TinyCC IntelCC OWCC BCC SunCC on Windows Mac Linux Bsd Solaris Minix Raspbian Flatpak Haiku bindings: VCPKG C# R Lua Rust Haskell Java AllegroBasic Fortran Pascal D JavaScript Kotlin click tab 'Files' for prototypes
    Leader badge
    Downloads: 130 This Week
    Last Update:
    See Project
  • 3
    Cerberus Content Management System 6

    Cerberus Content Management System 6

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model complete with a Unix-Like Kernel File named: Cerberus. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text,...
    Leader badge
    Downloads: 26 This Week
    Last Update:
    See Project
  • 4
    mystic-crypt is designed as a Java library that can be used for simple and complex encryption and decryption. The source code for the library is available under https://github.com/astrapi69/mystic-crypt For demonstration what the library can do there is a graphical client: The source code for the ui is available under https://github.com/astrapi69/mystic-crypt-ui
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    proreports

    proreports

    Simple Reporting System

    ProReports is simple reporting system designed to generate reports in popular office formats - PDF, XLS, RTF, HTML, TXT, XML, JSON, CSV, PNG, GIF. These reports are generated based on the definition in the internal database system. ProReports supports jrxml (JasperReport) format. This type of report templates can be prepared in external editor, such as iReport. Also user can prepare report in internal format of ProReports (simple Visual Programming Language mixed with PHP5 and JAVA...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Photon4K

    32768-bit symmetric-key encryption, fully-functional development CLI

    Photon4K is a 32768-bit symmetric-key encryption cipher accessed via a basic, yet fully-functional development-oriented Command Line Interface (CLI) utility. The algorithm is intended to be a high-security "symmetric" cipher designed primarily for archival purposes -- http://wikipedia.org/wiki/Symmetric-key_algorithm . Photon4K is implemented as an attempt to take long-established, proven cryptographic techniques to another "level" to contend with the rapid advances in powerful...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    WinRaidMonitor

    WinRaidMonitor

    Windows Software RAID Monitor

    This little utility monitors the health of your Windows software RAID. It's based on Java, but can easily be called periodically from Windows task scheduler, and/or at system startup (configuration and batch file is included). WinRaidMonitor can send emails to a specified email address (supports SSL connections to SMTP server and user/password authentication).
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A pronounceable password generator plugin for KeePass. NOTE: This project has been discontinued. It hasn't been worth it to maintain the project for a while now, so no more updates will be made to the plugin. The algorithm this plugin uses is based off FIPS-181 which was withdrawn by NIST a while back. The proliferation of password managers that seamlessly run on multiple platforms (some of which are free) has also removed almost all advantages of using randomly generated pronounceable...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 9
    Impact Finite Element Program
    Impact is an explicit Finite Element Program Suite which simulates dynamic impact events. It has a range of elements, contact handling and different material laws. Models can be created, solved and analyzed with the included pre- and postprocessor. Impact is based on an Explicit Time stepping algorithm. These kind of codes are used to simulate dynamic phenomena such as car crashes and similar, usually involving large deformations.
    Leader badge
    Downloads: 15 This Week
    Last Update:
    See Project
  • Photo and Video Editing APIs and SDKs Icon
    Photo and Video Editing APIs and SDKs

    Trusted by 150 million+ creators and businesses globally

    Unlock Picsart's full editing suite by embedding our Editor SDK directly into your platform. Offer your users the power of a full design suite without leaving your site.
    Learn More
  • 10

    Open TeamPlay

    An OpenSource (C# .NET) TeamPlay Environment.

    An Open Source (C# .NET) TeamPlay Environment. - Permits the easy downloading of games that may not be available via Steam, and their Source Port derivatives. - Preconfigured for easy play. - Enables the easier download of enhanced user made content for such titles. - Enables easier Multi-Player. - May incorporate a chat client in later versions. - Encryption: May incorporate up to 9.99% U.S.-origin parts or components. Officially Supported Operating Systems...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Popular Game 15 implemented in Java. The most intersting part of the project is the genetic algorithm which solving the puzzle. Play the game here: http://www.geocities.com/todordimitrovbalabanov/the15/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Open source DRM for MPEG-4 and MPEG-2 adhering to ISO/MPEG IPMP open standards (MPEG IPMP Hooks and IPMP-X), ISMAcryp and OMA DRM 2 specs. Includes CA, PKI, DOI mgmt, ISMA streaming, license server, encoding/encryption, player, plugin architecture, etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Real-Time Proactive Secret Sharing Library for RTAI is an implementation of the Shamir's secret sharing scheme and Herzberg's proactive secret sharing algorithm. The library uses a port of GNU GMP in order to make multiple precision arithmetic operatio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Web-Based Academic course system for assigning students to courses written in JAVA with pgsql DB and evolutionary algorithm for assigning students to course requests. Multiple roles for users: Admin, Student, Teacher or Tutor. International localization.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    1. project name eXPimenttk (e-SecureOffice) 2.Language Java (req. - at least j2re) 3.target platform - Cross-platform software 4.problem we want to sole- Encryption, Decryption software, File eraser, Messenger, Mailer,Remailer,FireWall 5 target - user
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Java port and extension of MLC++ 2.0 by Kohavi et al. Currently contains ID3, C4.5, Naive (aka Simple) Bayes, and FSS and CHC (genetic algorithm) wrappers for feature selection. WEKA 3 interfaces are in development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.