Search Results for "encryption algorithm java" - Page 19

Showing 900 open source projects for "encryption algorithm java"

View related business solutions
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • Sales CRM and Pipeline Management Software | Pipedrive Icon
    Sales CRM and Pipeline Management Software | Pipedrive

    The easy and effective CRM for closing deals

    Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
    Try it for free
  • 1
    JCRCGen

    JCRCGen

    Generates Java source code for the CRC algorithm.

    JCRCGen is a tool written completely in Java that will output public domain Java source code containing both the simple and table-driven implementations of the Rocksoft Model CRC algorithm. Generator polynomials may be any 8-bit multiple between 8 and 64 bits.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Tcp/Ip API Wrapper

    TCP/IP API (SSL Encryption, ZLIB Compression)

    TCP/IP connectivity warpped in an API extended to provide the following major features: SSL Encryption, ZLIB compression, packet oriented mode rather stream oriented mode. Asynchrounous. One liner to declare server or connect to server.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A library written in Java and C# for crypt,encrypt and generate key pairs using the ElGamal algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Rcrypto

    Rcrypto

    Encryption Tool

    Rcrypto is the encryption and decryption software for windows XP,vista and 7 to keep your data secure from unauthorized users. It uses the highly secure algorithm to encrypt every byte of the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 5
    KonEncriptación

    KonEncriptación

    Encryption tool for Dropbox

    It's a new, free distribution encryption software that provides Dropbox users with additional security for their sensitive information. Encrypt and securely share your files with other KonEncriptación users via Dropbox. KonEncriptación is fully integrated with Dropbox and is easy to use, thus allowing you to exploit all its features from the start.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    OpenSource Java based cross platform command line file encryption software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    RSAmake

    RSAmake

    An Cryptography software with RSA algorithm

    An Cryptography software with RSA algorithm RSAmake using Python and WxPython written
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SimpleHTTPDB is a client based key-value database that allows for storing data on any http-server via FTP. This way, no server-based functionality is required. Security of the data is provided by high-level encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    FactHash

    Factorial Hashing Function

    ... than the block size. I hold no guarantee of the security of this algorithm, USE AT YOUR OWN RISK. I have had no 3rd party analysis done on the algorithm to date, but research is welcome, and a challenge is even provided in CHALLENGE.txt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Crowdtesting That Delivers | Testeum Icon
    Crowdtesting That Delivers | Testeum

    Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.

    Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
    Click to perfect your product now.
  • 10
    j-Algo is an algorithm visualization tool, especially useful for students and lecturers of computer science. It is written in Java and platform independent. j-Algo is developed at Dresden University of Technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Cumulus4j is an encryption plug-in for DataNucleus. Applications can thus use JDO or JPA to persist their data into every common database. Using the Bouncy Castle cryptography libs, it provides strong encryption via AES, TwoFish or other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    GlabUke creates ukulele tabs and transposes it easily. It also offers a algorithm that finds the easiest transposition. Guk files can be exported as PDF for quality printing. Other features are planned for the future, such as addings lyrics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    MyVigilant Phone

    Detect fall and wander with android smart phone

    The objective of this project is to evaluate the possibility to use a smart phone (or watch phone) to detect dangerous situations (fall and wandering) encountered by fragile people, especially suffering from Alzeihmer deases. - HYPOTHESIS - => The smart phone embed sensors able to detect falls and wandering thanks an accelerometers and the GPS. => The smartphone provide an interface and embed connected technologies able to alert helpers people from almost...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A package of java classes for the implementation of the UTASTAR algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    SMART (Shape Matching Algorithm Research Tool) enables you to implement 2D and 3D shape matching algorithms as plugins. Plugins can either be implemented in Java or as native plugins, i.e. in C/C++.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Peters Backup is a program for backing up your important data files on to diskette, zip drive, fixed disk or CD/RW. It uses an extremely efficient compression algorithm. It keeps track of all versions of your files in full and incremental backups.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Hash Codes
    Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    BlogTEX is an ad-hoc blog posts extraction algorithm written in Java for TREC Blog08 dataset. It includes an optimized sentence model for clearly identifying sentence boundaries in each blog post. Its output can be customized using its config file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Coffee Maker is a collection of objects which make it easier to program in Java for those that have been using Game Maker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    MbPc Pagerank Simulator

    Testbed for playing with the algorithm "pagerank" of Google

    Provide a testbed to play with pagerank-like algorithm on graph. You can easily add vertices, edges, save the graph for reuse, etc. For now, only Pagerank is implemented, but in the future, other algorithms will be added.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    ENIGMA 2000

    ENIGMA 2000 is a reliable file encrypter for DOS shell

    ENIGMA 2000 is a symmetric cryptographic algorithm developed in C++ for Windows, to encrypt any file. It is not optimized for speed processing but it is extremly reliable. Tests state that a huge input file just with zeros, will return an output file whose frequency analysis is white noise. It uses six phases to encrypt any file and the phases sequence depends on the password. On phase 5, it uses the Rubik's cube paradigm to encrypt the data. It's extremly reliable and the password...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    pjp

    poor man's pgp encryption program

    java-based pki encryption utility formed by simply pulling together bouncycastle examples into a working tool. i don't guarantee that there aren't loopholes, but this may be a starting point.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This project Human Face Detection is based on java for detecting the face present in image inputted from memory. This face detection project is based on skin color detection method and image segmentation based on region growth algorithm. However being minor project and also due to time deficiency the output of this project isn't so convincing. Regardless of it it is simple and easily understandable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    ProteinLasso

    ProteinLasso: A Lasso regression approach to protein inference problem

    ProteinLasso: In this paper, we formulate the protein inference problem as a constrained Lasso regression problem and then solve it with a fast pathwise coordinate descent algorithm. The new inference algorithm ProteinLasso explores an ensemble learning strategy to address the sparsity parameter selection problem in Lasso model. ProteinLasso is implemented in Java and can run on any Java Virtual Machine (JVM) regardless of computer architecture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    SSVNC adds encryption security to VNC. It provides a GUI for Windows, MacOSX, and Unix that automatically starts up an SSL or SSH tunnel for connections to any VNC server. It also supports VeNCrypt encryption. The Unix viewer has many new features.
    Downloads: 84 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.