Search Results for "encryption algorithm java" - Page 17

Showing 900 open source projects for "encryption algorithm java"

View related business solutions
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 1

    ME_DSS

    Microemulsion Decision Support System

    This application allow user to predict microemulsion region based on algorithm consisted of artificial neural networks and random forests. Those techniques combined create Decision Support System. Application was created as a part of project K/DSC/000033 subsidy for young researchers from Polish Ministry of Higher Education.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Cryptex Box is an encryption software written in java for password storing. It's easy to use, very fast and small. Is cross platform (win, mac, linux) and does not require any installation process.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    EmployeesProfileViewer is my MSc final project. Consists of an application to represent the employees of an organization in a graphic map according to personal skills, using their evaluations on the different competences which the company needs. This software generates a graphical representation of the employees in a 2D map of coordinates, that pojects each worker as a figure in the map. The geometric characteristics of each one of these shapes will tell us how are the skills of the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    cerrla

    The CERRLA algorithm, developed by Sam Sarjant

    This project contains the files required to run the Cross-Entropy Relational Reinforcement Learning Agent (CERRLA) algorithm. Note that a copy of the JESS rules engine will also be required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5

    Java Evolutionary Computation Library

    As of 2012-12-18, this project may now be found at Google Code.

    As of 2012-12-18, this project may now be found at http://http://code.google.com/p/paba JECO is a Evolutionary Computation Library deveoloped in Java. It includes a variety of evolutionary optimization techniques such as genetic algorithm, genetic programming, evolutionary mapping methods, particle swarm optimization, ant colonies, etc.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Selective Data Backup (DoS App)

    Select the files you want backed up.

    ... Encryption Algorithm: basically, you have to have the password, or you'll never see your data again! This also means that ONLY YOU get to see your passwords/accounts. So, if you don't feel like memorizeing 47 accounts (like I), then download this thing! lol I included a random password generator to go along. Any length, include any characters! Copy/paste and done!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    This is a GUI, Java implementation of the Ant Colony Optimisation/Particle Swarm Optimisation (PSO/ACO2) rule induction algorithm. This project was inspired by Ant-Miner, but handles continuous attributes using PSO or now Differential Evolution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    License Generator

    License Generator

    Java Library to generate license for your application.

    This is a free and open source java library to generate license for your application. Use this library to make your custom license file with your own extension. It encrypts the license file with the one time pads encryption technique to make it hard to break. The generated license file can be set to expire after certain time, and also can be set to expire manually after a certain action.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Chess Game AI Phantoms
    Phantoms Chess Where Pawns Can become Queens Chess Game is zero-sum two-player. Team Members: Phantoms Team * Leader Gehad Sayed Kaseb Gehad.Kaseb@gmail.com * Co-leader Rawia Ahmed * Research team Hagar Samir Safaa Mohamed * Design and Implementation team Ahmed Helal Aya Eid Aya Tarek Eman Saleh Fatma El zhraa Ibrahim Hanan Mohamed John Samir Mina Victor Nahla Ibrahim Samira Magdy Samr Ayman * Integration Team Marwa Ayman Nahla Essam * Interface...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights. Click to perfect your product now.
    Click to perfect your product now.
  • 10
    Darwin 2: Java Framework for Evolutionary Computation (genetic algorithm, GA). A true framework with out-of-the-box functionality and extensibility of all classes. Interface-based pattern with dependency-injection to configure components.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Exact Subgraph Matching Algorithm

    Exact Subgraph Matching Algorithm for Dependency Graphs

    ... association detection and Protein-Protein interaction identification. This Java implementation implements our ESM algorithm. See README file: https://sourceforge.net/projects/esmalgorithm/files/ If you use our ESM implementation to support academic research, please cite the following paper: Haibin Liu, Vlado Keselj, and Christian Blouin. Exploring a Subgraph Matching Approach for Extracting Biological Events from Literature. Computational Intelligence, 2013.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Web KeePass Password Safe
    Web AND Mobile (Apple iPhone) based, multi user, java port of the KeePass project. A free, easy to use password manager which helps you to manage your passwords in a secure way. Focused on deep encryption and ease of use.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13
    Sentence Composer

    Sentence Composer

    Compose the writings semi-automatically

    ... algorithm" The prefix was "transductive learning" Learning algorithm. Transduction, or transductive inference, tries to predict new outputs on specific and fixed (test) cases from observed, specific (training) cases. The simplest realization for transductive inference is the method of k-nearest neighbors. Learning to learn learns its own inductive bias based on previous experience. ...AND SO ON.... Enjoy the program !
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This is an encrypter. It can be used to encrypt confidential information. Prefect for sending file over the Internet without others knowing the content of the file. The encryption algorithm used in this software is similar to the one that's used by espionage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    MazeJen

    java maze generator

    MazeJen is a maze generator written in java which implements the Depth First Search algorithm, and can render mazes in both 2 and 3 dimensions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    MyRouter

    MyRouter

    WiFi Hot Spot using WindowsXP, Windows 7 and 2008 R2

    MyRouter is a Virtual WiFi Router that takes advantage of the WindowsXP , Windows 7 and Windows 2008 R2 Virtual WiFi technology and simplifies the process of sharing your internet securely with other WiFi enabled device's with a few clicks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    mFileBinder

    mFileBinder

    An advanced file binder which binds multiple file of any type

    mFileBinder is an advanced file binder which binds multiple file of any type and merges into a single executable file. mFileBinder uses rijndael encryption algorithm to encrypt the file which can make Virus / Trojans Fully Undetectable. Set the drop location of all files and set the execution mode(Background,Foreground) of each file. Predefined set of ICON Package is included set your desired icon. Silently extracts and sequentially execute files.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19
    ES-E

    ES-E

    Evolved Studios Encryption is a new platform of protection.

    ES-E is a fully downloaded encryption algorithm that you can use for your WebServer or use it for your programs (by grabbing the output off the webpage). Check the Files page for the latest build.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    textcrypter

    textcrypter

    textcrypter is an encryption tool using vigenere cipher algorithm

    Textcrypter is an encryption tool using vigenere cipher algorithm. Vigenere use the same key/password to encrypt and decrypt a file (symmetric key cryptosystem). Result of the encryption process is a ciphertext in hexa number.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    egrsa

    egrsa

    rsa-elgamal comparison

    compare time of process between rsa and elgamal algorithm used to encryption and digital signature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    TextComparer

    Small Java program to compare two texts

    Small Java program to compare two texts, originally designed to be used to find quotations in a Byzantine anthology. It can quite likely be used to detect plagiarism between two texts as well Graphical interface which allows easy navigation between corresponding parts in the two different texts. Uses the http://software.jessies.org/salma-hayek/ Java TextArea for this. Probably very much can be done to improve this program and the algorithm which it uses.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Hanasu

    Hanasu

    A P2P Messenger which uses JXTA. It provides secure RSA/AES end-to-end

    Does not work because there is no master server! A P2P Messenger which uses JXTA. It provides secure RSA/AES end-to-end encryption and VoIP-Capabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    My Text is Treasure
    It is a simple password manager for your PC and Smartphone. It works like a text editor and uses a strong cryptography algorithm to generate the end file.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA. The beans generated can be 1 or two types: Simple...
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.