Search Results for "encryption algorithm java" - Page 35

Showing 900 open source projects for "encryption algorithm java"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    a java chat system, that encrypts all transfered data to protect the users privacy. Encryption will be done by rsa, blowfish, 3ds or an easy 'exclusive or' encryption. the client will hava a complete gui, the server in addition a console frontend.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A java implementation of the board game SUSAN(tm), invented by Stephen Linhart in 1991. Network features. Computer algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A small chat Program written in Java, which allows you to speak "privately" to other users. It shall get an encryption and a compression. I plan to integrate a dcc-like file-transfer
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    'Einsatz' is a free Java based application to plan medical services. Using the 'Maurer Algorithm' it calculates the staff and equipment you need for services like sporting events or concerts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 5
    <b>SicHer</b> is an encryption client that will allow secure chat across the internet using AES and a Diffe-Hellman key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    This project comprises a collection of libraries and applications for the field of program analysis. The starting point is a type analysis for Java programs using Agesen's Cartesian Product Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    MAGMA: Multiobjective Analyzer for Genetic Marker Acquisition A genetic algorithm for generating SNP tiling paths from a large SNP database based on the competing objectives of cost (number of SNPs) and coverage (haplotype blocks): Hubley R., Zitzler
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This is a non-causal non-linear encryption system that cannot be cracked by the von-neuman architectures available today
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This toolbox is designed to make implementations of voting systems freely available in Java. It will initially have software for Single Transferrable vote (Meek algorithm), but others may be included.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    OpenLabel is a label placement tool and decluttering algorithm for OpenMap. Labels are placed in full conformance with applicable cartographic specifications and conventions - without overlap or ambiguity.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Jayenne is a modular, secure, scalable, easy to use and lightweight webserver wirtten in java, that supports encryption (SSL) and scripting languages like Perl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A cross platform implementation of ECDSA (elliptic curve digital signature algorithm) interface to the aSuretee Token.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Java port and extension of MLC++ 2.0 by Kohavi et al. Currently contains ID3, C4.5, Naive (aka Simple) Bayes, and FSS and CHC (genetic algorithm) wrappers for feature selection. WEKA 3 interfaces are in development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Chinese chess Java Applet using alpha-beta game algorithm. The code can be easily used to program other chess game by changing the chess rules.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Passkeyper is an encrypted password keeper program for the Sharp Zaurus and runs in the PersonalJava environment. It uses the legendary BlowfishJ implementation of Blowfish for encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A pure Java implementation of a constraint solving framework, relying on the stochastic approach of the Adaptative Search Algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    - development stopped! - GATMAN - The first known combination of a network/user administration and a groupware solution - Latest technologies such as JAVA,XML,JSP and strong encryption are used - Modular design, high scalability - Accessible by client an
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Rijndog is an easy to use file encryption/decryption package making use of the Rijndael AES algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    A collection of implementations of the Lovins stemmer as described in "Development of a Stemming Algorithm" by Julie Beth Lovins (published in "Mechanical translation and computational linguistics", 11:22-31, 1968).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Domigene is a genetic algorithm API attempting to incorporate dominant and recessive genes. Supports modular evolution types, genetic programs, definable instruction sets, variation in population, chromosomes, mortality, mutation, fitness functions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The RAZip bitstream format was designed to provide a faster random access to compressed data than what is currently possible using the GZIP format. During the desing phase, some other features were added, like encryption and error correction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Distributed Genetic Algorithm framework (with projects). Uses java.rmi for networking.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.