Search Results for "encryption algorithm java" - Page 15

Showing 900 open source projects for "encryption algorithm java"

View related business solutions
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • 1
    QPass password manager
    QPass is easy to use, open source password manager application with built-in password generator. You can store in it's database such data as passwords and logins which will be encrypted using AES-256 with PBKDF2(number of iterations set by user). Each entry can include additional information about entry such as name, url adress and description.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2

    Levenshtein distance Java Libarary

    Java library implementing Levensh distnce

    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Mouse Rate

    Mouse Rate

    OS independent mouse rate checker written in Java.

    Tiny program written in Java, which provides OS - independent and clean algorithm to measure your mouse rate (mouse latency). Java 7u5 or higher needed to run version 1.1 and lower. Java 7u40 or higher needed to run version 1.2 and higher. **Version 1.3 changes - Fixed graphic artefacts appearing while program window is dragged. **Version 1.2 changes - Major code review & cleanup - Mouse watching algorithm optimized - Duplicate cursor statistics calculations removed & rewritten...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4
    ijblob
    The IJBlob library indentifying connected components in binary images. The algorithm used for connected component labeling is: Chang, F. (2004). A linear-time component-labeling algorithm using contour tracing technique. Computer Vision and Image Understanding, 93(2), 206–220. doi:10.1016/j.cviu.2003.09.002 The ImageJ *Shape Filter Plugin* (see downloads) uses this library for flitering the blobs by its shape. If you are using IJBlob in a scientific publication, please cite...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Test your software product anywhere in the world Icon
    Test your software product anywhere in the world

    Get feedback from real people across 190+ countries with the devices, environments, and payment instruments you need for your perfect test.

    Global App Testing is a managed pool of freelancers used by Google, Meta, Microsoft, and other world-beating software companies.
    Try us today.
  • 5
    Unsupervised TXT classifier

    Unsupervised TXT classifier

    Classify any two TXT documents, no training required - JAVA

    This program is made to address two most common issues with the known classifying algorithms. First, over-training and second, shortage of data for a training of categories. Instead, each TXT file is a category on its own, rather than an assigned category. In a way, this is similar to clustering but not really a clustering algorithm since there is some training involved. The summarizer from Classifier4J has been adjusted to accept two inputs (lets call them A and B). Then, the summarizer gets...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    WOLFSIM: Wideband Optical FDTD Simulator

    FDTD Electomagnetic Wave Simulation Software

    ... these publications for full details on the algorithm: http://www.ece.ncsu.edu/oleg/files-wiki/6/62/SPIE_12_Miskiewicz_wolfsim3D.pdf http://www.ece.ncsu.edu/oleg/files-wiki/1/13/OptExpress07_OH.pdf
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    gannu

    gannu

    Java API and tools for performing NLP and other AI tasks

    Java API and tools for performing a wide range of AI tasks such as: word sense disambiguation (released), optimization (5 Evolutionary Algorithms Implemented ETA February 2014), opinion mining (ETA November 2014) and text wikification (ETA July 2014). Gannu includes some graphical interfaces for scientific purposes. When using Gannu please cite: *Jiménez, F. V., Gelbukh, A. F. & Sidorov, G. (2013). Simple Window Selection Strategies for the Simplified Lesk Algorithm for Word Sense...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Java application for training and deploying text processing applications such as part-of-speech taggers, based on a re-implementation of Brill's algorithm in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 10

    Open TeamPlay

    An OpenSource (C# .NET) TeamPlay Environment.

    An Open Source (C# .NET) TeamPlay Environment. - Permits the easy downloading of games that may not be available via Steam, and their Source Port derivatives. - Preconfigured for easy play. - Enables the easier download of enhanced user made content for such titles. - Enables easier Multi-Player. - May incorporate a chat client in later versions. - Encryption: May incorporate up to 9.99% U.S.-origin parts or components. Officially Supported Operating Systems...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11

    Damerau Levenshtein

    Java Library for Damerau Levenshtein Algorithm

    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    ... has a graphical user interface, an Enigma like subsystem must be devised for data whitening. For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 6 This Week
    Last Update:
    See Project
  • 13
    MyPasswords

    MyPasswords

    Personal Password Manager

    What you need for managing your passwords, including the passwords of your online accounts, bank accounts and ... with the corresponding URLs. The passwords are encrypted by AES. Can be used on almost all operating systems including Windows & Linux.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 14
    totp-me

    totp-me

    TOTP authenticator for Java ME

    Not only a Google authenticator for 2-step verification for Java ME enabled phones. This is MIDlet-1.0 implementation of RFC 6238 authenticator - TOTP: Time-Based One-Time Password Algorithm. It's quick, simple and it supports multiple profiles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Open Uniper

    Open Uniper

    Open Uniper is the XTRAP's reversed encryption algorithm.

    Open Uniper is a project created by d3v1l401 (http://d3vsite.org) and targets to make the encryption algorithm of XTRAP open source. Currently NOT Optimized view of code,NOT Optimized code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Cipher(StudentProject)

    A simple encryption project for java

    A simple encryption project for java written for a school project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    Cryptography fascinates everyone. A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12) e(+15) l...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Java generic Iterator implementation to generate permutations and combinations. Uses the algorithm described here http://en.wikipedia.org/wiki/Steinhaus%E2%80%93Johnson%E2%80%93Trotter_algorithm#Even.27s_speedup and the clear description of that algorithm here: http://www.cut-the-knot.org/Curriculum/Combinatorics/JohnsonTrotter.shtml
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Face Recognition Based Login Assistant

    Login to Websites Automatically Using Your Face as Password

    ... in to user accounts. The Viola - Jones Algorithm presents a novel face detection technique, we would implement this technique for face detection and then use eigen faces method to recognize the person in the image. Once recognized the person can easily sign in to any applications without the need of typing passwords or usernames.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    sfxcompress
    The utility sfxcompress is a bash script used to pack and encrypt the current directory on a self-extracting file. It also includes the calculation of the MD5 function to check if the compressed file is correct.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    sqlite3fish

    Another encryption solution (with Blowfish algorithm) for SQLite3

    The sqlite3fish is another encryption solution for sqlite3. It is based on some source code of botansqlite3(https://github.com/OlivierJG/botansqlite3) . But it does not need Botan library, it uses Blowfish algorithm to encrypt/decrypt the database file. This library only depends on the source code(no-modify) of SQLite3, it is clean and easy to compile. But currently it only supports the version 3.7.0 of SQLite3 (http://www.sqlite.org/sqlite-amalgamation-3_7_0.zip) .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Java RTree project aims to maintain an Java version of the RTree spatial indexing algorithm. See http://jsi.sourceforge.net for more information, and http://github.com/aled/jsi for latest development code.
    Leader badge
    Downloads: 1,779 This Week
    Last Update:
    See Project
  • 23
    FileManESI

    FileManESI

    File manager software

    FileMan is a file manager software that allow users to apply multiple functions to all kinds of files such as : AES encryption/decryption, zip archiving, file spliting/merging , file comparison.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    ECG2HRV

    ECG2HRV

    import and store ECG, associate to clinical data, automatic HRV

    http://www.youtube.com/watch?v=AOzpNMC-FXU This multi-platform application will enable the user to import digital CSV ECGs at any sampling rate and store them in an encrypted local DB along with relevant clinical data of the patient. It also performs automatic QRS complex detection and RR interval classification showing the output in a visual chart that the user can edit to correct sources with artifacts or pats with bad detections. This project was developed using Netbeans 7.3...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25

    Approximate Subgraph Matching Algorithm

    Approximate Subgraph Matching Algorithm for Dependency Graphs

    ..., the total worst-case algorithm complexity is O(m^n * n(n-1)/2 * km * log m). This Java implementation implements our ASM algorithm. See README file: https://sourceforge.net/projects/asmalgorithm/files/ If you use our ASM implementation to support academic research, please cite the following paper: Haibin Liu, Lawrence Hunter, Vlado Keselj, and Karin Verspoor. Approximate Subgraph Matching-based Literature Mining for Biomedical Events and Relations. PLOS ONE, 8:4 e60954, 2013.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.