Showing 90 open source projects for "encryption algorithm java"

View related business solutions
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 1
    A plattform independent encryption-tool with a simple user interface (swing/java). It uses 'Password Based Encryption' (PBE) to encrypt and/or decrpyt files on the filesystem. Encryted files will also be compressed using the zip-format.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    IslandEv distributes a Genetic Algorithm (like <a href="/projects/jaga">JaGa</a>) across a network (see <a href="/projects/distrit">DistrIT</a>) using an island based coevolutionary model in which neighbouring islands swap migrating individuals every
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Mudslide provides an encrypted file system to any operating system that can mount a webdav server. Mudslide works with Linux, OS X, and Windows. Mudslide is built upon http://jakarta.apache.org/slide/ and the encryption libraries packaged with Java.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    A user-centric Java Mailet for the Apache James mail server (a Java mail server) for the purpose of filtering spam using a naive Bayesian algorithm. As a Mailet, the filter can act upon spam as it is received over SMTP before the user gets it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Contract Management Software | Concord Icon
    Contract Management Software | Concord

    AI-powered contract management that helps businesses track spending, negotiate smarter, and never miss deadlines.

    Concord serves small and mid-sized businesses and Fortune 500 companies. This robust, web-based platform is used by human resource, sales, procurement, and legal teams, and virtually anyone who deals with contracts.
    Learn More
  • 5
    A java library to demonstrate an algorithm to coordinate First Order multi-party interactions. This algorithm could be used to implement concepts in distributed coordinated computing including the Multi-way Rendezvous statement.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A Java based Proxy which dynamically converts HTML from existing web applications to provide XML data and XML-RPC services without having to modify the web applications. One format implements an algorithm called the RMA discussed in a graduate thesis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    Jarsync is a Java implementation of the rsync algorithm, a delta compression algorithm for fast network file transfers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A Compression Utility - based on own bit algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-One Mental Health EHR Icon
    All-in-One Mental Health EHR

    Simplify your systems. Strengthen your cash flow. Start fresh with Ensora Health

    Ensora Health’s Mental Health EHR is designed for mental health professionals, therapists, and practice managers looking for a secure, user-friendly solution to streamline administrative tasks and improve efficiency in their practice management
    Learn More
  • 10
    The goal of this project is to create a new peer-to-peer system that is capable of supporting instant messaging, encryption, and secure sharing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A mobile agent framework. Instead of relying on protocols across the wire, send an agent to the server to execute. An example is encryption: send an agent to retrieve data, but let it do the encryption. Client side encryption on the server!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A similar to Tripwire, file system integrity checking tool but develop in java and cross platform. This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    - development stopped! - GATMAN - The first known combination of a network/user administration and a groupware solution - Latest technologies such as JAVA,XML,JSP and strong encryption are used - Modular design, high scalability - Accessible by client an
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The RAZip bitstream format was designed to provide a faster random access to compressed data than what is currently possible using the GZIP format. During the desing phase, some other features were added, like encryption and error correction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Platform based on JMS queues to centralize System Event Messages (syslog) and Application Layer Messages, persisting them in several Databases and providing several pre- and post- processes according the message's nature, like encryption, mail.
    Downloads: 0 This Week
    Last Update:
    See Project