Showing 3 open source projects for "encryption algorithm java"

View related business solutions
  • Smart IT Monitoring Icon
    Smart IT Monitoring

    We make IT management effective and simple. Easily observe your networks, servers, cloud services, containers, devices and applications.

    NetCrunch is a smart, agentless network monitoring and management software system capable of monitoring every device in a network. Developed by AdRem Software, NetCrunch helps businesses of all sizes remotely monitor network services, switches, routers, bandwidth utilization, and traffic flow and visualize their system performance.
    Learn More
  • Easily build robust connections between Salesforce and any platform Icon
    Easily build robust connections between Salesforce and any platform

    We help companies using Salesforce connect their data with a no-code Salesforce-native solution.

    Like having Postman inside Salesforce! Declarative Webhooks allows users to quickly and easily configure bi-directional integrations between Salesforce and external systems using a point-and-click interface. No coding is required, making it a fast and efficient and as a native solution, Declarative Webhooks seamlessly integrates with Salesforce platform features such as Flow, Process Builder, and Apex. You can also leverage the AI Integration Agent feature to automatically build your integration templates by providing it with links to API documentation.
    Learn More
  • 1
    Avocado is a Java and PHP port of the trust metrics algorithm behind advogato.org, with a new data model, developer tools, and utilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Its a software which can be used to simulate and emulate the mobility management in the wireless network, this implements the mobility management algorithm, it uses the Blue tooth as a communication media between a wireless terminal and
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next