Search Results for "encryption algorithm java" - Page 19

Showing 776 open source projects for "encryption algorithm java"

View related business solutions
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    MobiStego
    It's a simple Android, j2me, Symbian client that implement the steganographic algorithm LSB on the last 2 bit for channel. It's developed with both plaftorms. Stable release only for Android. Moved on GitHub https://github.com/paspao/MobiStego
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    JEnigma is a java API to implement the Enigma cipher, as used by the Enigma encryption machine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    TaxonFinder is an application that annotates taxon found in literature. The application harnesses a hybrid algorithm that is necessarily a combination of morphological analysis, dictionary lookup and Levenstein Distance algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    A particle swarm optimization demo written by students in the digital communication msc program (2010) at uni-kiel.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
    Learn More
  • 5
    weka outlier is an implementation of outlier detection algorithms for WEKA. CODB (Class Outliers: Distance-Based) Algorithm is the first algorithm developed using WEKA framework.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Longest Common Subsequence Algorithm and Longest Increasing Subsequence Algorithm by Dynamic Programming by java
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    DazioAES is a password manager: it's an application protected by a single password that stores multiple other password or informations in an encrypted way. It uses Bouncycastle crypto library (classes from) and their AES encryption implementation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A small program written in java which helps you to manage your passwords in a secure way. Stores all your passwords so you only have to remember one single master password. You can create multiple profiles. 128 or 256 bit AES encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • 10
    Maui is a multi-purpose automatic topic indexing algorithm. Given a document, Maui automatically identifies its topics. Depending on the task topics are tags, keywords, keyphrases, vocabulary terms, descriptors or Wikipedia titles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    The goal of the project is to create an example of Java ME based application for SMS message encryption. This aplication is only of academic interest and is not suitable for real safe SMS encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Reversi game with minimax algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    This projet try to develop an object persitence framework (MicroObject) for java me/MIDP, allowing password protection and data encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    M.A.N.G.
    Marc's Awesome Name Generator is a Java based library to allow the easy and fast generation of random first, middle and last names based on user-definded criteria, such as culture of origin or contained letters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Identification of biological species via iterational process of giving an ordered set of questions to user. The order is defined by an optimization algorithm, trying to provide the most correct prediction about the questions to ask.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Toothfairy is a Java midlet for chatting on mobile devices via a Bluetooth connection. It creates a network of devices using a simple but powerful ad-hoc routing algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Lisn uses the JNI to interface with various media players(winamp/itunes) using either the COM interface or HWND calls. Allows intuitive interaction with the media players as well as a quasi heuristic algorithm for volume control(under development)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This is a reference implementation of snoBAC, a Bayesian Classifier designed to predict box H/ACA snoRNAs in Caenorhabditis nematode genomes. For details of algorithm and data, see Wang and Ruvinsky (2009) RNA in press.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    An implementation of the Simplified Lesk algorithm for Germanet from the University of Tübingen.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    C/C++/Java XML parsers benchmarking toolset. Supported parsers: LibXML2, Xerces, Oracle XDK, Expat, RXP, QT, Sun Crismon. Benchmark Fields: Parsing (Native,SAX,DOM), DOM Manipulation, Schema Validation, XSL Transformation, XML Signature & Encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ConTextKit is a Java-based implementation of Wendy Chapman's ConText algorithm for annotating the context of medical documents, specifically the negation, temporality, and experiencer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ROT-13 Encryptor/Decryptor. More functionality will be added as different updates are released.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB