Search Results for "encryption algorithm java" - Page 14

Showing 909 open source projects for "encryption algorithm java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 1
    ImpraStorage

    ImpraStorage

    ImpraStorage provided a private imap access to store large files

    ImpraStorage provided a private imap access to store large files. Each file stored on the server is split in severals random parts. Each part also contains random noise data (lenght depends on a crypt key) to ensure privacy and exclude easy merge without the corresponding key. An index of files stored is encrypt (with the symmetric-key algorithm Kirmah) and regularly updated. Once decrypt, it permit to perform search on the server and download each part. transfert process is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Machine learning library that performs several clustering algorithms (k-means, incremental k-means, DBSCAN, incremental DBSCAN, mitosis, incremental mitosis, mean shift and SHC) and performs several semi-supervised machine learning approaches (self-learning and co-training). --------------------------------------------------------------------------- To run the library, just double click on the jar file. Also, you can use the following command line: Java -Xms1500m -jar "ML Library.jar"...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project https://sourceforge.net/p/xorencrypt which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly. The password you provide is hashed ( SHA256 ) and saved into the encrypted file to check if the password provided is correct.This algorithm has limitations in general more the numbers of relative characters in the password to plaintext more secure will be the encryption. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4

    Extract Objects from Image

    Connected Component Labeling Algorithm - Extracting Objects From image

    fast Connected Component Labeling Algorithm - java application - Extracting Objects From image
    Downloads: 0 This Week
    Last Update:
    See Project
  • Automated RMM Tools | RMM Software Icon
    Automated RMM Tools | RMM Software

    Proactively monitor, manage, and support client networks with ConnectWise Automate

    Out-of-the-box scripts. Around-the-clock monitoring. Unmatched automation capabilities. Start doing more with less and exceed service delivery expectations.
    Learn More
  • 5
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Infinium-8

    CryptoNote based currency. Increasing block reward

    Infinium-8 (INF8) is a new privacy-centric coin using the CryptoNote protocol. Infinium-8 was launched 7/18/2014 12:00 UTC Specifications PoW algorithm: CryptoNight [1] Max supply: Infinite Block reward: increasing with difficulty growth [2] Block time: 90 seconds Difficulty: Retargets at every block [1] CPU + GPU mining (about 1:1 performance for now). Memory-bound by design using AES encryption and several SHA-3 candidates. [2] Infinium-8 s the cryptocoin with block reward inincreasing together with difficulty. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    CryptoX

    AES Encryption Program

    v2.0.0 (Latest) ---CHANGE LOG--- v1.0.0 - Original Release v1.0.1 - Source Code Cleanup v2.0.0 - Now Features File Encryption Protect your privacy! Encrypt your messages and files with a cryptographic strength of up to 256 bits before sending them to others!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    phenotemp

    phenotemp

    phenological trends using NOAA AVHRR time series

    Starting from GIMMS values as ascii data (each line will be treated as individual time series), the application can smooth the ts - values by applying different algorithm that are based on Fouriertransformation. Separation of seasonal figure as well as the detection of linear trends is possible. Possible breaks in longterm mean can be detected with a change-point analysis using CuSum algorithms. Phenological events such as start-of-season, day-of-max/day-of-min, end-of-season can be...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Teradata VantageCloud Enterprise is a data analytics platform for performing advanced analytics on AWS, Azure, and Google Cloud. Icon
    Teradata VantageCloud Enterprise is a data analytics platform for performing advanced analytics on AWS, Azure, and Google Cloud.

    Power faster innovation with Teradata VantageCloud

    VantageCloud is the complete cloud analytics and data platform, delivering harmonized data and Trusted AI for all. Built for performance, flexibility, and openness, VantageCloud enables organizations to unify diverse data sources, run complex analytics, and deploy AI models—all within a single, scalable platform.
    Learn More
  • 10

    fusie

    Fuzzy scala inference engine

    Rewriting from Java to Scala and improving my university project on course Artifical Intelligence Systems. About project in russian: http://brunneng.blogspot.com/2013/06/fuzzy-scala-inference-engine-fusie.html Can be used from maven: <dependency> <groupId>net.sf.brunneng.fusie</groupId> <artifactId>fusie</artifactId> <version>0.8.1</version> </dependency>
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Java File Uploader
    Please update v 2.0 if you have downloaded before 16th Feb 2014! Simple java file uploader. The main goal to overcame 2GB browser limit. * Simple GUI * Upload unlimited file sizes from client to server via HTTP * Split uploading file to chunks * MD5 chunk verification on server. Final MD5 confirmation. * Http auth Adv: https://play.google.com/store/apps/details?id=org.vikulin.etherwallet
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    CodeSounding is a sonification framework which makes possible to hear how any existing Java program "sounds like", by assigning instruments and pitches to code statements (if, for, etc) so that the flowing of execution is played as a flow of music.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    nPuzzle 8 / 15 play with numbers and cropped images! Searching algorithm A* : divide and conquer approach based on Manhattan-distance and linear conflict. Author: Roberto Bracaglia Morante ver 2.0 written in Java, May 2014 // many improvements and bug fixes ver 1.3 written in Jython, May 2014
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Open Door Logistics

    Open Door Logistics

    Open source software for territory design

    Open Door Logistics Studio is free, open source software for territory design and territory mapping. Design sales or delivery territories, generate sales territory maps, export to pdf, word etc. Go to http://www.opendoorlogistics.com for binary downloads, support, tutorials etc. Using the studio you can: - Geocode your customer data held within an Excel based on address or postcode. - View your customers in a map and export maps to PDF or Word. - Perform territory design and territory...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    AESTextCrypt is an easy-to-use open source tool for text encryption and decryption. Primarily intended for use with email, use it wherever you need to protect text from prying eyes. The encrypted text can be copy/pasted into any text-handling application (e.g. email) instead of plain text. Convenience buttons are provided for clipboard operations. AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16

    JFool

    Famous Russian card game

    Famous Russian card game. Currently only one human player is supported. Virtual players are programmed with simplest possible algorithm so it must be easy to defeat them. This is alpha version and there may be bugs especially if you start a new game instead of restarting the application. Cards Images were taken from wikipedia (I hope it does not contradict their license).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Impact Finite Element Program
    Impact is an explicit Finite Element Program Suite which simulates dynamic impact events. It has a range of elements, contact handling and different material laws. Models can be created, solved and analyzed with the included pre- and postprocessor. Impact is based on an Explicit Time stepping algorithm. These kind of codes are used to simulate dynamic phenomena such as car crashes and similar, usually involving large deformations.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 18
    JBernstein

    JBernstein

    JBernstein: Exploration techniques for non-linear constraint checking

    JBernstein is a tool implemented in Java that enables to check whether a polynomial constraint holds for all variables within their domain. It is mainly used in the verification or synthesis of cyber-physical systems where the system model is nonlinear. The tool also supports specifications in assume-guarantee style. The underlying algorithm is based on a translation to Bernstein polynomials, and several optimization techniques are implemented to ensure efficiency. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    FALCON - Text Search Java Project

    FALCON - Text Search Java Project

    JSON based text search Java Project

    ----------------- - What is it? - ----------------- The "Falcon Search" is a JAVA API and tool to search inside the documents. It was originally started to search the content in pdf files under the project "HAWK Search". Searching with this tool is query-based not word-based as in most of the document search tools OR document readers. It also takes care of jumbling of words within query and spelling mistakes. Commonly used techniques in this project are Natural Language...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    JCycles

    [frozen] A library for computing cycles in graphs or in Java code.

    [This project is frozen, but has an offspring with more features: https://github.com/jeffhain/jadecy ] JCycles provides treatments to compute cycles, or just strongly connected components, in directed graphs in general, or in classes or packages dependencies graphs parsed from class files (major version <= 51, else does best effort). It uses Tarjan's algorithm for SCCs, and Johnson's for cycles, with continuations instead of recursion, which allows to handle large graphs (< Integer.MAX_VALUE vertices). Requires Java 5 or later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    cmotif

    A method for mining conditional phosphorylation motifs

    Phosphorylation motifs represent position-specific amino acid patterns around the phosphorylation sites in the set of phosphopeptides. The discovery of phosphorylation motifs is a very valuable work in bioinformatics. Although several algorithms have been proposed to uncover phosphorylation motifs, the problem of efficiently discovering a set of significant motifs with sufficiently high coverage and non-redundancy still remains unsolved. In this paper, we propose an algorithm called C-Motif...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Encrypt

    Allows you to encrypt files and plain text, then back again.

    Encrypt is a small application which allows you to encrypt your files and even write plain text to be encrypted in GZIP code so it effectively cannot be read by humans. Your note passing, personal diary and more is safe. As well as that, it can decode your GZIP messages back into plain text so it can be read again. It is written entirely in Java, and is very easy to use. For more information on this application, please refer to my YouTube tutorial or send me an email at romejanic@gmail.com....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    JConstraints

    JConstraints

    Java Framework to implement solutions to solve constraints problems

    ...Just to name a few algorithms, the Framework can solve any constraints problems using: - Regular Backtracking; - A variety of Backjumping algorithms; - A variety of arc-consistency algorithms; - Local search algorithm; - Tabu search algorithm; - Maximize solutions: comming soon; - Minimize solutions: comming soon; The Framework also enables heuristic injections so that the developers can achieve greater performance of algorithms using their own heuristics. Version 1.0: Released! Version 1.1: Coming soon See the tutorial in the Wiki page to learn how to use this Framework.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Graphal

    Graphal

    Graph algorithms interpreter, IDE, debugger, 3D visualizations.

    Graphal is an interpreter of a programming language that is mainly oriented to graph algorithms. There is a command line interpreter and a graphical integrated development environment. The IDE contains text editor for programmers, compilation and script output, advanced debugger and visualization window. The progress of the interpreted and debugged graph algorithm can be displayed in 3D scene.
    Downloads: 0 This Week
    Last Update:
    See Project