Search Results for "encryption algorithm java" - Page 18

Showing 909 open source projects for "encryption algorithm java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    Darwin 2: Java Framework for Evolutionary Computation (genetic algorithm, GA). A true framework with out-of-the-box functionality and extensibility of all classes. Interface-based pattern with dependency-injection to configure components.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    MyRouter

    MyRouter

    WiFi Hot Spot using WindowsXP, Windows 7 and 2008 R2

    MyRouter is a Virtual WiFi Router that takes advantage of the WindowsXP , Windows 7 and Windows 2008 R2 Virtual WiFi technology and simplifies the process of sharing your internet securely with other WiFi enabled device's with a few clicks.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Sentence Composer

    Sentence Composer

    Compose the writings semi-automatically

    Please click on "BROWSE ALL FILES" to open a README! What is this program? This program is meant to search the texts and suggest sentences that might follow any inputted sentence. It was meant to help composing the writings. How was it made? First, I made a chatterbot to understand the concept of "predicting" the next sentence (worked as good as the Cleverbot), then I made this program that is aided by an user to compose the new writings. SAMPLE: Input sentence was "Learning...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    MazeJen

    java maze generator

    MazeJen is a maze generator written in java which implements the Depth First Search algorithm, and can render mazes in both 2 and 3 dimensions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    Web KeePass Password Safe
    Web AND Mobile (Apple iPhone) based, multi user, java port of the KeePass project. A free, easy to use password manager which helps you to manage your passwords in a secure way. Focused on deep encryption and ease of use.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Exact Subgraph Matching Algorithm

    Exact Subgraph Matching Algorithm for Dependency Graphs

    ...This Java implementation implements our ESM algorithm. See README file: https://sourceforge.net/projects/esmalgorithm/files/ If you use our ESM implementation to support academic research, please cite the following paper: Haibin Liu, Vlado Keselj, and Christian Blouin. Exploring a Subgraph Matching Approach for Extracting Biological Events from Literature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    My Text is Treasure
    It is a simple password manager for your PC and Smartphone. It works like a text editor and uses a strong cryptography algorithm to generate the end file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Hanasu

    Hanasu

    A P2P Messenger which uses JXTA. It provides secure RSA/AES end-to-end

    Does not work because there is no master server! A P2P Messenger which uses JXTA. It provides secure RSA/AES end-to-end encryption and VoIP-Capabilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10

    TextComparer

    Small Java program to compare two texts

    ...Probably very much can be done to improve this program and the algorithm which it uses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    DAL4j

    Data Access Layer 4 Java

    Welcome to Data Access Layer for Java (DAL4j) a set of command line tools and framework used to reverse engineer a MySQL or SQLServer database schema into a set of JPA Entity Beans. DAL4j can be useful for scenarios where there is an existing database schema but a technology other that JPA is used to interact with the database. DAL4j can provide an easy way to migrate your code base from other technologies such as JDBC or Hibernate to JPA.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    JCrypTool - Eclipse based Crypto Toolkit
    JCrypTool moved to GitHub! See https://groups.google.com/d/topic/jcryptool-developers/nauEXL6vsbk/discussion for more information and visit our new project home at https://github.com/jcryptool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Tetrumble

    Tetrumble is encryption tool.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Send secret data

    Application send ciphered data between users.

    Send secret data application is tool which support sending encrypted data between computers. It is helpful for confidencial data communication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    ChessAT

    one more chess engine in the barn

    This simple chess engine employs a minimax algorithm to calculate two moves ahead.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    This a NetBeans project developed to create a small Hexagon map library with a few basic functionalities. It is possible to measure distance between tiles's centres and calculate the best path between two of them (if any). It is possible to define tiles where it is not possible to pass (or reenabling them) by right clicking on them (they will become red), creating therefore obstacles that can help testing the path finding algorithm. This library is licences under GPL licence.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Java Random Numbers - Random.Org API

    Offers Random numbers API for your programs written in Java.

    Very lightweight and easy to use library that allows you to generate truly random numbers by means of Random.Org service. Library offers optimized algorithms for obtaining single random number or more random numbers at once, sequences of numbers, random strings etc. Also allows you to check quota. It provides algorithm to generate unspecified number of random numbers of certain total value. This algorithm still keeps server load low by sending as large requests as possible, yet all...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Stegno

    This project is created for providing basic stegnography concept.

    ...RUN Decryptor.CLASS (WITH APPROPRIATE JAVA ENV.) 2. PROVIDE APPROPRIATE PARAMETERS. • file_name : (NAME OF FILE i.e. output_file_name in ENCRYPTION process) • logical_file_name : (NAME OF LOGICAL FILE i.e. target_file_name in ENCRYPTION process, file extension matters not name) e.g. java hidden.mp3 hideme.mp3 [output_file_name] [target_file_name]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Welcome to the Algorithm Development Kit, the associated code repository to the "Algorithms in a Nutshell" book published by O'Reilly Media, Inc. http://oreilly.com/catalog/9780596516246. This repository is freely available for you to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    HTML Encrypter

    HTML Encrypter

    Java based HTML encrypter and decrypter

    An encryption and decryption application developed in Java. The application uses a number of algorithms to encrypt and decrypt the HTML source code: Blowfish, AES, TEA, Rabbit, MARC 4, Escape/Unescape functions. In addition to the encryption and decryption functions, the application also returns the source code of a website. The user has the ability to upload the encrypted file, using the FTP transfer feature, to his or hers personal website.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    JAVA Arabic Stemmer

    A JAVA class with a small functionality that is stemming Arabic words

    A JAVA Arabic stemmer that is based on Shereen Khoja algorithm. This java class offers a function called stemWrod which takes an arabic word and return the stem of it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Java implementation of Shamir's Secret Sharing algorithm as described in Applied Cryptography [as LaGrange Interpolating Polynomial Scheme].
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    spantus
    Spantus - signal(speech) analytical tool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    Dinapter:

    Generate adaptation contracts between incompatible services

    Dinapter automatically generates a mapping between methods of incompatible components/services based on their public interfaces and behaviors. It uses a combination of expert system and A* algorithm. Dinapter is the prototype resulting from a couple of research papers: * J.A. Martín, E. Pimentel. Automatic Generation of Adaptation Contracts, FOCLASA'08, ENTCS, 2008 - http://goo.gl/21iJZ * J.A. martín, E. Pimentel. Dinapter: Automatic Adapter Specification for Software Composition,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Here are implementations of the Dual Contouring algorithm (SIGGRAPH 2002, see http://www1.cse.wustl.edu/~taoju/research/dualContour.pdf). The C++ code was co-developed by Tao Ju and Scott Schaefer, and Java port is done by Jean-Denis Boudreault.
    Downloads: 1 This Week
    Last Update:
    See Project