Search Results for "encryption algorithm java" - Page 25

Showing 900 open source projects for "encryption algorithm java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1
    This library implements Josh MacDonalds xdelta binary diff algorithm in java. More information on this algorithm can be found at http://sourceforge.net/projects/xdelta. Binary diff files are stored using the GDIFF file format for storing binary deltas.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    AlViz is a research prototype for visual ontology alignment implemented as multiple-view plug-in for Protege using J-Trees and Graphs. Based on similarity measures of an ontology matching algorithm AlViz helps to assess and optimize the alignment results
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    We propose a metabolic pathway drawing algorithm for reducing the number of edge crossings by considering the fact that metabolic pathway graph is scale-free network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    MCS is a tool that exploits the Monte Carlo method and, with a complex algorithm based on the PERT (Program Evaluation and Review Technique), it estimates a project's time. MCS is a opensource project and it was devolped by Java Programming Language.
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    ROT-13 Encryptor/Decryptor. More functionality will be added as different updates are released.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The goal: to provide implementations of as many algorithms (sorting, searching, ...) and data structures (lists, trees, ...) as possible, accompanied by discussion of big O run time and memory limits and references to sources of further study.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    EMURA is a suite of Java applications that allows two users to send encrypted messages back and forth - as a chat. The encryption key is secure and generated using the Diffie-Hellman algorithm. Utilizes GNU-CRYPTO libraries
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    Manentia Commons is a set of general purpose Java utility classes, including collection handling, configuration reading, date handling, logging wrappers, mail wrappers, database connection pooling manager, simple encryption wrappers and XML utilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 10
    GAAF is a tool for analyzing Genetic Algorithms (GA for short). It allows to check the behavior of a particular GA resolving a particular problem so one can get empirical information to decide which GA best fits problem's conditions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    G.A.V. (Graph Algorithm Visualizer) is a tool that visualizes algorithms from graph theory. A step-by-step visualization from each different algorithm allows the user to understand the particular algorithm very easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The IEEE 1619 Committee open-source reference implementations of encryption algorithms, plus testing and certification suites, for each encryption algorithm included in the standard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Recolition is a simple file encryption program which uses AES as it's algorithm. It will encrypt exisiting files to the .encrypt file extension and then decrypt them back to thier original state.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    otp.el is a one-time-password implementation in emacs lisp, suitable for generating one time passwords with the MD5 algorithm. It's designed to be plugged in to tramp.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Java package for pretty-printing a text by deciding where to introduce line-breaks and indentation. A Java implementation of Derek Oppen\'s pretty printing algorithm. It is _not_ a pretty printer for Java code, though it could be used to write one.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Roots III Encryption is an encryption suite in Java and C++ backed by the strong normality of irrational roots. It can easily offer more than 2048 bit security, and can be seen as a practical one-time key implementation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Reimplementation of the anomaly detection/one-class classification algorithm 'V-detector'.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The implementation of Bee Hive @ Work algorithm that simulates the foraging behavior of honey bees in nature. The aim is to provide an extensible framework that can be used by researchers to simply create new applications of this algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    MelodyBall generates a simulated array of soundmaking bars, on which a ball bounces and plays a melody (see www.melodyball.com). Need to fix Java/MIDI bugs and read MIDI files as source data for the algorithm to create alternate melodies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    a first work algorithm trials to implement a compromise between distributed and centralized version control system.part of research project,it's only a simulation. no real networking is implemented ,only virtual random signal are imaginary produced.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A Java implementation of the Dijkstra bestpath algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Encrypted Chat [synchronous encryption based on passkeys ( and maybe in the near future :) asynchronous encryption based on public/private keys) ] with a lot of smart features, perfectly suitable for developers to communicate in an insecure network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    This is an implementation of Donald Knuth's Algorithm X ("dancing links"). This is primarily a sudoku generator and solver, though it can be used to solve other exact cover problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SMScryptor encrypts and decrypts messages sent from any mobile phones using : - AES 256 encryption - J2ME MIDP2.0 CLDC1.1 - ECMAScript - Apache / PHP / mysql
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Java GUI to analyze one (or more, in batch mode) datasets with several feature selection methods at the same time and also performing an "ensemble" analysis. It can be easily extended to include any feature selection algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.