Showing 17 open source projects for "encryption algorithm java"

View related business solutions
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • GWI: On-demand Consumer Research Icon
    GWI: On-demand Consumer Research

    For marketing agencies and media organizations requiring a solution to get consumer insights

    Need easy access to consumer insights? Our intuitive platform is the answer. Get the ultra-reliable research that brands and agencies need to stay ahead of changing consumer behavior.
    Learn More
  • 1
    jDHTUQ
    ATTENTION: For more info and latest version, refer to https://github.com/estigma88/jdhtuq. jDHTUQ is a peer-to-peer DHT system based in Chord algorithm, but built like API to generalize the implementation of peer-to-peer DHT systems. jDHTUQ have two fundamental services , put and get of resource.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SAFMQ: Store and Forward Message Queue, message oriented middleware. Uses include Assured Async Messaging, SOA, Delayed/Batch, and Cluster/Grid Computing. The SAFMQ server provides cross platform communication among C++, PHP, Java, and .NET clients.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    JPPF

    JPPF

    The open source grid computing solution

    JPPF makes it easy to parallelize computationally intensive tasks and execute them on a Grid.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Preesm
    PREESM provides a complete framework for fast prototyping. It generates a simulation and an optimized multiprocessor code from graph descriptions of algorithm and architecture. Please visit the project homepage at http://preesm.sourceforge.net.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Employees get more done with Rippling Icon
    Employees get more done with Rippling

    Streamline your business with an all-in-one platform for HR, IT, payroll, and spend management.

    Effortlessly manage the entire employee lifecycle, from hiring to benefits administration. Automate HR tasks, ensure compliance, and streamline approvals. Simplify IT with device management, software access, and compliance monitoring, all from one dashboard. Enjoy timely payroll, real-time financial visibility, and dynamic spend policies. Rippling empowers your business to save time, reduce costs, and enhance efficiency, allowing you to focus on growth. Experience the power of unified management with Rippling today.
    Learn More
  • 5
    An easy-to-use simulator for decentralized distributed scheduling in Clusters, Grids, and Cloud ecosystem MaGate 2.0 is now available from github! https://github.com/huangye177/magate
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    MyZone Social Network

    peer to peer social network

    MyZone is a peer to peer social network that supports almost all features common in Facebook and Google+. In addition you can share unlimited mp3s and mp4s with your friends. MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    MapPSO
    MapPSO is a tool for Ontology Alignment, which uses Discrete Particle Swarm Optimisation. A particle swarm is used to search for the optimal alignment. The algorithm is massively parallel and adapts naturally on parallel architectures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    samizdat

    Kerberized Messaging Toolkit for Java

    Samizdat is a toolkit for Java for building Kerberos secured distributed, message-oriented applications. The toolkit contains base classes that simplifies the management of Kerberos login contexts as well as flexibly sign and seal messages between principals using the Java GSS API. The toolkit contains Transformation classes for Kerberizing JMS traffic as well as a super-lean HTTP based protocol stack that supports both Synchronous (RPC) and Asynchronous modalities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Dinapter:

    Generate adaptation contracts between incompatible services

    Dinapter automatically generates a mapping between methods of incompatible components/services based on their public interfaces and behaviors. It uses a combination of expert system and A* algorithm. Dinapter is the prototype resulting from a couple of research papers: * J.A. Martín, E. Pimentel. Automatic Generation of Adaptation Contracts, FOCLASA'08, ENTCS, 2008 - http://goo.gl/21iJZ * J.A. martín, E. Pimentel. Dinapter: Automatic Adapter Specification for Software Composition,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • SOCRadar Extended Threat Intelligence Platform Icon
    SOCRadar Extended Threat Intelligence Platform

    Get real-time visibility into vulnerabilities, leaked data, and threat actor activity targeting your organization.

    SOCRadar Extended Threat Intelligence, a natively single platform from its inception that proactively identifies and analyzes cyber threats with contextual and actionable intelligence.
    Start Free Trial
  • 10
    DASM is a new simple platform which helps programmer to implement and evaluate any distributed algorithm. Programmer can implement his/her distributed algorithm using DASM primitives and monitors the results in diagrams during execution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    In just one clic (no setup) this Java Applet based solution allows you to run VNC Server / VNC Viewer through an HTTP AES encrypted tunnel. As it is full HTTP, there is no proxy or firewall setup needed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Ex-Crawler
    Ex-Crawler is divided into 3 subprojects (Crawler Daemon, distributed gui Client, (web) search engine) which together provide a flexible and powerful search engine supporting distributed computing. More informations: http://ex-crawler.sourceforge.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    JMS/Joram implementation of the Bully election algorithm. It is a library to be used by a process' implementation to make it transparently manage coordinator's elections, while it carries out business logic. A sample application is included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryption algorithm collision detection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    IslandEv distributes a Genetic Algorithm (like <a href="/projects/jaga">JaGa</a>) across a network (see <a href="/projects/distrit">DistrIT</a>) using an island based coevolutionary model in which neighbouring islands swap migrating individuals every
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A java library to demonstrate an algorithm to coordinate First Order multi-party interactions. This algorithm could be used to implement concepts in distributed coordinated computing including the Multi-way Rendezvous statement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A mobile agent framework. Instead of relying on protocols across the wire, send an agent to the server to execute. An example is encryption: send an agent to retrieve data, but let it do the encryption. Client side encryption on the server!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB