Showing 3 open source projects for "secret sharing"

View related business solutions
  • SKUDONET Open Source Load Balancer Icon
    SKUDONET Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • 1
    Inbucket

    Inbucket

    Disposable webmail server (similar to Mailinator) with built in SMTP

    Inbucket is an email testing application; it will accept messages from any email address and make them available to view via a web interface. When you need to test your webapp's outbound emails with Mailinator but are stuck behind a firewall, Inbucket provides the solution. It allows you to keep your new application development secret until it's time to release it. Inbucket is ideal for validating that emails go out as part of your integration test suite, sending links to coworkers...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    lecithine

    FUSE File system powered by secret sharing scheme

    Lecithine is a FUSE (file system in user space) using a secret sharing scheme. You can use Lecithine as regular file system. When writing to disk, data will be devided into randomly chosen pieces (secret shares) and stored into different places. Upon reading, the shares are merged together such that in turn the plaintext results. From a cryptographers point of view, there is no symmetric or private key ever needed to produce a ciphertext. This is how secret sharing schemes are designed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ESOSI (Employment of Secret-Sharing for Object Security in Intranets) offers a security solution for companies and authorities. It extends the eCryptfs file encryption system by adding Secret-Sharing, smartcard support and a Linux Security Module (LSM).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next