Showing 101 open source projects for "encryption algorithm java"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 1
    Sorting algorithm performance testing using a generic test interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    BlowfishVHDL - free fully synthesizable Blowfish encryption algorithm hardware implementation.
    Leader badge
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    XinDiff is a diff utility implementing WinDiff like GUI by an improved LCS algorithm. The key feature in addition to WinDiff is in-place comments for code review.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Bork is a very small, cross-platform file encryption utility. It is written in Java and designed to be included along with the files it encrypts for long-term storage (eg on CD-R). Its minimal external dependencies make it fairly futureproof.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • 5
    This is a network based text search tool. The Network part consists of Client and Server side .class files. The text search algorithm has been implemented in C. On client side type SearchClient ip(server) string
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This Project implements the mergesort algorithm in a MPICH2 (parallel programming -) environment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    VeNCrypt adds TLS/X509 encryption and authentication to VNC. It is heavily based on the RealVNC Free Edition, thus being a single fork away from the original creators of VNC, and is fully compliant with the RFB protocol.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    Aggressive Rectangle Truncation (ART) with Location Verfication Mechanism is a localization algorithm in wireless sensor networks written in nesC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    StrMatch is a simple java program, created for educational purposes, that allows user to test a great part of string matching algorithms. An intuitive user interface shows each algorithm step accurately...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    XML Universal Packet Archiver (PKT) is a platform independant universal file archiving system with pluggable options for encryption, encoding, compression, parity/RAID protection and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryption algorithm collision detection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A plattform independent encryption-tool with a simple user interface (swing/java). It uses 'Password Based Encryption' (PBE) to encrypt and/or decrpyt files on the filesystem. Encryted files will also be compressed using the zip-format.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    IslandEv distributes a Genetic Algorithm (like <a href="/projects/jaga">JaGa</a>) across a network (see <a href="/projects/distrit">DistrIT</a>) using an island based coevolutionary model in which neighbouring islands swap migrating individuals every
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Mudslide provides an encrypted file system to any operating system that can mount a webdav server. Mudslide works with Linux, OS X, and Windows. Mudslide is built upon http://jakarta.apache.org/slide/ and the encryption libraries packaged with Java.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    A user-centric Java Mailet for the Apache James mail server (a Java mail server) for the purpose of filtering spam using a naive Bayesian algorithm. As a Mailet, the filter can act upon spam as it is received over SMTP before the user gets it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A Java based Proxy which dynamically converts HTML from existing web applications to provide XML data and XML-RPC services without having to modify the web applications. One format implements an algorithm called the RMA discussed in a graduate thesis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A java library to demonstrate an algorithm to coordinate First Order multi-party interactions. This algorithm could be used to implement concepts in distributed coordinated computing including the Multi-way Rendezvous statement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Jarsync is a Java implementation of the rsync algorithm, a delta compression algorithm for fast network file transfers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A Compression Utility - based on own bit algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The goal of this project is to create a new peer-to-peer system that is capable of supporting instant messaging, encryption, and secure sharing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A mobile agent framework. Instead of relying on protocols across the wire, send an agent to the server to execute. An example is encryption: send an agent to retrieve data, but let it do the encryption. Client side encryption on the server!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A similar to Tripwire, file system integrity checking tool but develop in java and cross platform. This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    - development stopped! - GATMAN - The first known combination of a network/user administration and a groupware solution - Latest technologies such as JAVA,XML,JSP and strong encryption are used - Modular design, high scalability - Accessible by client an
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The RAZip bitstream format was designed to provide a faster random access to compressed data than what is currently possible using the GZIP format. During the desing phase, some other features were added, like encryption and error correction.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.