Showing 118 open source projects for "encryption algorithm java"

View related business solutions
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • 1
    The project Jaulp is jet another utility library project written in Java. It contains utility classes for Date ,Calendar, Collections, Resources, Files, IO for Random data, and many more. This is the last version for this project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    In just one clic (no setup) this Java Applet based solution allows you to run VNC Server / VNC Viewer through an HTTP AES encrypted tunnel. As it is full HTTP, there is no proxy or firewall setup needed.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Ex-Crawler
    Ex-Crawler is divided into 3 subprojects (Crawler Daemon, distributed gui Client, (web) search engine) which together provide a flexible and powerful search engine supporting distributed computing. More informations: http://ex-crawler.sourceforge.net
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    Coffeearc

    A simple, extensible GUI archiver for experimental cmd-line tools.

    Coffeearc is a simple, extensible GUI archiver for cmd-line tools. Bundled with CCM and Slug, both ultra-fast and strong compression (including AES encryption) are its core features. Some conventional formats like ZIP, TAR and others are supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    aRSync is "Another RSync" and provides a pure java implementation of the rsync algorithm. This implementation is intended to be ready to use for file transfer, to be easy to extend for further use cases and - most important - to become productive.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    JMS/Joram implementation of the Bully election algorithm. It is a library to be used by a process' implementation to make it transparently manage coordinator's elections, while it carries out business logic. A sample application is included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    C/C++/Java XML parsers benchmarking toolset. Supported parsers: LibXML2, Xerces, Oracle XDK, Expat, RXP, QT, Sun Crismon. Benchmark Fields: Parsing (Native,SAX,DOM), DOM Manipulation, Schema Validation, XSL Transformation, XML Signature & Encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    An algorithm for compression and decompression of Binary Decision Diagrams will in many cases reduce the size of the BDD to 1-2 bits per node.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • 10
    The project will develop an in – memory object cache utilizing the LRU (least-recently-used) algorithm. The cache will store the objects that are most accessed within a fixed size memory pool. Thus system is keep statistics and calculates tradeoffs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Sorting algorithm performance testing using a generic test interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    XinDiff is a diff utility implementing WinDiff like GUI by an improved LCS algorithm. The key feature in addition to WinDiff is in-place comments for code review.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This is a network based text search tool. The Network part consists of Client and Server side .class files. The text search algorithm has been implemented in C. On client side type SearchClient ip(server) string
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TigerJars is a project designed around the idea of making a executable jars that preform desired system tasks such as file comparison, file encryption, and possibly networking tasks. In gerneral, to provide a free alternative to high end shareware.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    This Project implements the mergesort algorithm in a MPICH2 (parallel programming -) environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Package for coding and decoding files with Matheos algorithm from commandline or console in Linux/Unix Environment. Based on Keys stored in files or as hardware locks (on devices). Fast and strong coding. Fast encoding.ONLY BINARY PACKAGES FOR NOW!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    VeNCrypt adds TLS/X509 encryption and authentication to VNC. It is heavily based on the RealVNC Free Edition, thus being a single fork away from the original creators of VNC, and is fully compliant with the RFB protocol.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 21
    Aggressive Rectangle Truncation (ART) with Location Verfication Mechanism is a localization algorithm in wireless sensor networks written in nesC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    StrMatch is a simple java program, created for educational purposes, that allows user to test a great part of string matching algorithms. An intuitive user interface shows each algorithm step accurately...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    XML Universal Packet Archiver (PKT) is a platform independant universal file archiving system with pluggable options for encryption, encoding, compression, parity/RAID protection and more.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryption algorithm collision detection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(
    Downloads: 0 This Week
    Last Update:
    See Project