Results for: encryption algorithm java - Page 3

Suggested Categories:

Encryption Software
Encryption software protects sensitive data by converting it into unreadable code that can only be accessed with the correct decryption key. It secures files, communications, applications, and entire systems from unauthorized access, cyberattacks, and data breaches. These tools use algorithms like AES, RSA, and elliptic-curve cryptography to safeguard data at rest, in transit, or in use. Many encryption platforms offer key management, user authentication, and compliance features to meet industry regulations and enterprise security requirements. Overall, encryption software is essential for maintaining privacy, ensuring data integrity, and protecting information across digital environments.
Algorithmic Trading Software
Algorithmic trading software enhances and automates trading capabilities for trading financial instruments such as equities, securities, digital assets, currency, and more. Algorithmic trading software, also known as algo trading software or automated trading software, enables the automatic execution of trades depending on occurrences of specified criteria, indicators, and movements by connecting with a broker or exchange.
Email Encryption Software
Email encryption software ensures the confidentiality and integrity of email communications by converting messages into unreadable formats that can only be decrypted by authorized recipients. It uses encryption protocols such as S/MIME and PGP to protect sensitive information from interception, eavesdropping, and unauthorized access. The software helps organizations comply with data privacy regulations like GDPR, HIPAA, and CCPA by securing emails containing personal or financial information. Email encryption can be applied at the message level, attachment level, or entire inbox, providing versatile protection for both internal and external communications. By safeguarding email content, businesses can reduce the risk of data breaches, maintain customer trust, and avoid costly compliance fines.
Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
Encrypted Messaging Software
Encrypted messaging software protects digital communications by encoding messages so that only the intended recipient can read them. It uses sophisticated encryption algorithms to prevent interception, eavesdropping, and unauthorized access. This type of software ensures privacy and security for personal, business, and governmental communications. It supports the safe exchange of text, voice, video, and files over the internet. By maintaining message confidentiality and user anonymity, encrypted messaging software is essential for secure, private communication.
PDF Encryption Software
PDF encryption software is a type of program used to protect documents in the PDF format. With it, users can protect the contents of their documents by setting passwords and restricting certain editing permissions. It can also be configured to set expiration dates for documents, ensuring that they remain secure until a specified time. By encrypting PDFs, users are able to keep their sensitive information safe and secure from unauthorized viewing.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
Encryption Key Management Software
Encryption key management software securely handles the creation, storage, distribution, and lifecycle management of encryption keys used to protect sensitive data. It provides a centralized system that ensures only authorized users and applications can access or decrypt encrypted information, reducing the risk of data breaches. By automating key processes such as generation, rotation, expiration, and backup, this software helps maintain security standards and compliance with regulatory requirements. With features like role-based access, logging, and auditing, it offers transparency and control over key usage. Encryption key management is essential for organizations aiming to secure data across databases, applications, and cloud environments.
Key Tracking Software
Key tracking software, also known as physical key management software, is designed to monitor and manage the physical keys used within an organization, ensuring they are secure and accessible only to authorized individuals. It centralizes the process of assigning, returning, and logging the use of keys, reducing the risk of unauthorized access and lost keys. With features like real-time tracking, user authentication, and detailed reporting, key tracking software provides transparency and accountability over key usage. It often includes alerts and reminders to prevent overdue returns or misuse. This software is essential for organizations managing multiple keys, helping improve security and streamline key control processes.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Mentoring Software
Mentoring software is a type of software designed to facilitate the mentor-mentee relationship. It provides users with tools for scheduling, tracking progress, providing feedback, and developing plans for growth. The software can be used as a standalone system or integrated into existing enterprise solutions. Mentoring software allows organizations to easily manage and monitor their mentorship programs remotely and efficiently.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Password Management Software
Password management software securely stores, generates, and manages passwords for users across various accounts and systems. It helps individuals and organizations maintain strong, unique passwords for each service while reducing the risk of password fatigue or breaches due to weak or reused passwords. These tools typically offer features like password vaults, automatic password generation, encryption, and multi-factor authentication (MFA) for added security. Password management software is essential in protecting sensitive information from cyber threats by simplifying and securing the process of handling numerous login credentials. For businesses, it also allows for centralized control and auditing of password access, ensuring compliance with security policies and regulations.
Identity Resolution Software
Identity resolution software enables organizations to identify and track the identity of customers, users, or potential customers across multiple devices and services. Identity resolution solutions are very helpful for running personalized campaigns across different channels and devices.
Natural Language Generation Software
Natural language generation software is computer-generated software designed to create natural-sounding output. It can generate text from structured data sources such as databases, or from unstructured sources like audio or video recordings. The output of this software can be used for various tasks such as summarizing information or producing news articles. Natural language generation technology is commonly used in applications that require automated content creation and natural language processing algorithms.
Product Recommendation Engines
Product recommendation engines use algorithms and customer data to suggest personalized products to users based on their browsing behavior, past purchases, or preferences. These platforms analyze large sets of data, such as customer interactions and purchase history, to identify patterns and recommend products that are most likely to interest the individual customer. Product recommendation engines help e-commerce businesses increase sales and customer engagement by offering a more personalized shopping experience. By integrating these engines, businesses can provide relevant suggestions, improve conversion rates, and enhance customer satisfaction.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.
View more categories (18) for "encryption algorithm java"

155 Products for "encryption algorithm java"

  • 1
    Quantum Xchange

    Quantum Xchange

    Quantum Xchange

    ...To further strengthen data protection, Phio TX provides an affordable, crypto-agile, and quantum-safe solution. It seamlessly integrates with existing IT infrastructures, enabling the deployment of post-quantum cryptographic algorithms without significant performance costs.
  • 2
    Accent RAR Password Recovery

    Accent RAR Password Recovery

    Passcovery Co. Ltd.

    ...Its intelligent algorithms and configurable scenarios make it suitable for both novice users and forensic professionals. AccentRPR provides complete control over recovery settings, enabling users to refine search ranges and leverage custom mutation rules for complex passwords. Simple, efficient, and trusted by over a million users worldwide, Accent RAR Password Recovery offers the best balance of power, performance, and precision.
    Starting Price: $40
  • 3
    NSFOCUS NGFW
    ...It provides NGFW capabilities and collaborates with other security devices to proactively defend against cyber threats, and improve user and application experience while lowering the total cost of ownership. A dedicated AI-based content moderation module effectively recognizes content in texts, images, and videos. Use honeypots and AI algorithms to trap attacks. AI algorithms recognize attacks and apps in encrypted traffic. Scalable AI-based AV engine increases virus detection rate.
  • 4
    License4J

    License4J

    LICENSE4J

    LICENSE4J is a powerful licensing library and license server designed to simplify software licensing for developers. It enables easy integration of licensing features into Java applications with minimal coding required. The user-friendly, web-based License Manager works seamlessly on both desktop and mobile devices, enhancing accessibility for all users. The basic concept of software licensing involves creating a unique license key. This key, along with additional information about the client's device, is sent to a license server. ...
    Starting Price: 19/month
  • 5
    Dynamic Web TWAIN
    Dynamic Web TWAIN is an enterprise-grade, browser-based document scanning SDK built for speed, security, and scale. It enables developers to create robust capture applications with minimal JavaScript. It supports all major browsers on Windows, macOS, Linux, and mobile, along with TWAIN, WIA, ICA, SANE, and eSCL drivers. Key features include high-volume scanning with disk caching and a 64-bit service, async APIs for faster workflows, and a built-in viewer with editing tools like annotation, zoom, and de-skew. Documents can be exported to PDF, TIF, JPG, BMP, or PNG and uploaded via chunked or multi-threaded transfer. ...
  • 6
    F5 VIPRION
    ...Reduce deployment time with support for major private cloud stacks, including OpenStack, VMware, and Cisco. Programmatic toolkits leverage customizable app templates, a JavaScript community, and over 250K+ node.js libraries. Reduce cost of ownership by up to 53% compared to other ADC vendors. Supports all major encryption methods, including emerging Forward Secrecy, for the fastest way to achieve A+ Grade SSL rating. The VIPRION platform empowers you to dynamically scale and adapt.
  • 7
    Temporal

    Temporal

    Temporal

    ...Our IPFS dedicated data center ensures quality and resiliency for all our clients. Scalable IPFS Infrastructure to build production-ready applications on top of IPFS quickly with modern tools and languages such as Golang and JavaScript with free starter package featuring turnkey APIs, toolkits & storage. Fully Automated - Install it and go. Temporal does almost everything for you, which means you don't have to learn in detail how to use IPFS. Moderately experienced network and data engineers adopt it quickly. Deduplication and content addressing characteristics of IPFS make it faster and more affordable to manage data; plus, it can be fully encrypted.
  • 8
    TutorFlow

    TutorFlow

    Geek Haus

    ...The platform features OCR technology that converts handwritten equations into digital text, interactive programming capabilities supporting multiple languages including Python and Java, and AI agents that provide instant feedback to students. TutorFlow includes mobile accessibility on iOS and Android, quiz generation tools, and course publishing features designed to streamline the educational workflow. The system offers code editors with real-time feedback, formula input capabilities, and automatic grading functionalities. ...
    Starting Price: $19/month
  • 9
    Vanillatech Labs

    Vanillatech Labs

    Vanillatech

    We developed a neuro-bio inspired generic deep learning algorithm that works as simple as an intelligence test. It automatically detects and predicts patterns and allows you to build intelligent apps easily. Our software is easy to use because it offers a straightforward and well defined REST api which allows you to build intelligent apps from any environment. This way you can connect e.g.
  • 10
    Coding Blocks

    Coding Blocks

    Coding Blocks

    ...At Coding Blocks, we strive to increase student interest by providing hands on practical training on every concept taught in the classroom. Learn Data structures and Algorithms right from the basics and become an accomplished programmer using Java, one of the most popular programming languages in the world and brighten your chances of making it to the Top Tech organisations as an Intern or SDE. Having been a standalone field for a long time, the software industry has now come neck to neck with most of the other industries by close coordination and easy integration. ...
    Starting Price: $20.09 per course
  • 11
    SSL2BUY

    SSL2BUY

    SSL2BUY

    ...We offer low-cost SSL certificates, but we never compromise with your web security. All of our certificates come with modern algorithms recommended by the CA/Browser forum.
    Starting Price: $8 per year
  • 12
    SecureMFA

    SecureMFA

    SecureMFA

    ...OTP data storage in MS Active Directory attributes or MS SQL Service. QR secrets encryption with AES 256-bit encryption. Configuration of network locations (IPv4 and IPv6) from which user can scan QR code. Support of ADDS multi-forests trust relationships.
    Starting Price: $178.25 per year
  • 13
    Huawei Cloud Elastic Volume Service
    ...If the capacity of an EVS disk is insufficient, you can immediately increase block storage space, even if the disk is currently in use. In just a few clicks, you can scale a system disk up to 1 TB and a data disk up to 32 TB, all without any disruption to your workloads. Data on EVS disks is encrypted using the industry-standard AES-256 encryption algorithm and keys.
    Starting Price: $0.054 per GB per month
  • 14
    VICIhost

    VICIhost

    VICIhost

    VICIhost offers Inbound ACD, outbound predictive dialing, inbound email handling, web-configurable IVRs, skills-based agent routing, voicemail boxes, full call recording, PBX functionality and much more. High-level data encryption is available from your agents’ web browsers all the way to the database back-end where your data is stored in our secure SSAE-16 certified hosting facilities. We use NIST-approved, strong encryption algorithms to safeguard your data. You can also send your customers to a secure IVR to collect sensitive information like credit card numbers to shield that. ...
  • 15
    IBM Guardium Quantum Safe
    IBM Guardium Quantum Safe, delivered on the IBM Guardium Data Security Center, monitors, uncovers, and prioritizes cryptographic vulnerabilities to help protect your data from both conventional and quantum-enabled risks. As quantum computing advances, traditional encryption algorithms that would take centuries to break using conventional computers may be cracked within hours, potentially leaving all sensitive information secured by today's encryption standards vulnerable. IBM, a leader in the quantum-safe space, developed two recently published NIST post-quantum cryptographic standards in collaboration with industry partners. ...
  • 16
    MyIPHide

    MyIPHide

    Didsoft

    MyIPHide is a lifetime free, browser-focused VPN proxy that unblocks websites and protects privacy by encrypting browser traffic with an optimized algorithm that claims to be up to 13 times faster than traditional VPNs; it uses static IPs, lets users switch IPs in 0.1 seconds, and hides the real IP address and location while bypassing censorship, school or company firewalls, and ISP spying. It works across several platforms with a single account and has no data limits or ads in its core apps, offering both a web proxy site with multiple preset endpoint speeds/regions for quick access and downloadable apps for deeper integration; encrypted connections can add SSL to sites that lack it, and cached content improves repeat-load performance. ...
    Starting Price: $8.96 per month
  • 17
    KeePassium

    KeePassium

    KeePassium

    ...It supports offline or cloud-based database files, automatic two-way sync with any storage provider accessible via the Files app, and AutoFill for websites and apps. KeePassium supports all major KeePass database formats (kdb, kdbx3, kdbx4) and uses strong, time-proven encryption algorithms such as AES, ChaCha20, Twofish, and Argon2. It includes features like custom entry fields, custom icons, TOTP codes, file attachments, Face ID/Touch ID or passcode unlock, full accessibility support (VoiceOver, large text), entry history, recycle bin for deleted entries, and pre-saving of database copies for safety. ...
    Starting Price: €19.99 per year
  • 18
    Browserling

    Browserling

    Browserling

    ...You can also annotate them and send bug reports this way. Change screen resolution and resize browsers for all your responsive testing needs. All connections between you and Browserling are SSL encrypted. Your browsing is completely anonymous! Browserling is powered by HTML5 and JavaScript. You don't need to install anything. It just works.
    Starting Price: $19 per user per month
  • 19
    YantraPlatform
    YantraNet offers YantraPlatform, a highly scalable, secure, flexible, cloud or on-premise based enterprise IOT platform to control, monitor and manage connected devices and YantraTouch, the world's first cross-platform web browser framework designed specifically to Build cross-platform, highly interactive, multi-touch, secure and locked-down self-service, digital signage and desktop/mobile IOT applications using HTML5, CSS and JavaScript. Built from the ground up using state of the art technology to manage tens of thousands of connected devices. Self-Service Kiosks, ATM's, Digital Signages, Medical Devices, Trucks or even Toasters, if it's connected it can be managed. This is no security through obscurity. Everything is secured end-to-end. Content, Communications, Configurations, Passwords are encrypted to the highest standards. ...
  • 20
    Phoenix CTMS

    Phoenix CTMS

    Phoenix CTMS

    ...Designed to meet the operational and regulatory needs of clinical research, it supports academic institutions, CROs, and hospitals conducting trials of any phase. The system offers private, encrypted subject registries to safeguard personally identifiable information and complies with EU-GDPR requirements. Phoenix CTMS includes advanced electronic data capture (EDC) features with unlimited JavaScript form scripting and support for large electronic case report forms (eCRFs). It enables managing multiple trials simultaneously with tools for site staff and resource organization. ...
    Starting Price: $1 one-time payment
  • 21
    IBM Cloud Data Shield
    ...IBM Cloud Data Shield supports user-level code to allocate private regions of memory, called enclaves, that are protected from processes running at higher privilege levels. It extends Intel Software Guard Extensions (SGX) language support from C and C++ to Python and Java™, while also providing preconverted SGX applications for MySQL, NGINX and Vault. Powered by the Fortanix Runtime Encryption platform and Intel SGX technology, these tools enable organizations with sensitive data to leverage cloud computing with more confidence. IBM Cloud Data Shield helps enable organizations with sensitive data to deploy and benefit from cloud computing. ...
  • 22
    RxDB

    RxDB

    RxDB

    ​RxDB is a local-first, NoSQL JavaScript database optimized for modern web and mobile applications. It enables offline-first functionality by storing data directly on the client using storage engines like IndexedDB, OPFS, SQLite, and more. RxDB offers real-time reactivity, allowing developers to subscribe to changes in documents, fields, or queries, ensuring that UI components update automatically as data changes.
    Starting Price: Free
  • 23
    Serply

    Serply

    Serply

    ...The API supports advanced queries across various Google services, allowing for tailored data retrieval. Serply.io ensures accurate location-based results by utilizing geolocated, encrypted parameters and routing requests through proximate servers. Developers can integrate the API using multiple programming languages such as Python, JavaScript, Ruby, and Go. It boasts a four-year track record with a 100% service level, offering responsive customer support and comprehensive documentation to assist users in implementation. ...
    Starting Price: $49 per month
  • 24
    DynamicPDF API

    DynamicPDF API

    DynamicPDF API

    ...It offers multiple REST endpoints for creating and processing PDFs, including generating PDFs from images, HTML, Word, Excel, or template data, merging documents, converting content, filling and flattening forms, adding barcodes and stamps, securing and encrypting files, and extracting text, metadata, or XMP information. DynamicPDF includes an online Designer tool for visually building PDF reports and templates, plus client libraries in languages such as Node.js, .NET, Java, PHP, Go, Python, and Ruby for easy integration without constructing raw HTTP calls. PDFs are created and assembled in milliseconds with scalable infrastructure that routes requests to the closest global zone, while the service never stores client data unless explicitly requested.
    Starting Price: Free
  • 25
    Peak DSP

    Peak DSP

    Peak DSP (by Edge 226)

    ...Edge’s leading product is Peak DSP, a Performance-Driven DSP that enables programmatic buying for quality user acquisition and re-engagement. Peak DSP offers: • An AI-driven algorithm optimizing and predicting install & post-install events: registrations, subscriptions, purchases or any other action • Data-based targeting with Lookalike Audiences, External User Data and Audience Match • Direct integrations: ­ Owned & operated and direct apps ­ Mobile device manufacturers & carrier-based supply ­ Over 35 of the world’s top SSPs • All verticals and environments: Gaming, shopping, utilities, sports (etc.) campaigns across in-app, mobile web and desktop • Multiple creative types: ­ Rewarded video ­ Playable ads ­ Banners, native ads & text ads ­ HTML/Rich Media ­ JavaScript tags
  • 26
    Tobu

    Tobu

    Tobu

    ...This allows you to extract excel downloads of candidate received automatically. Tobu goes far beyond simple keyword searches to find the best fit for your criteria to a high degree of detail in seconds. For ex: Top Java Developers, 3-6 years experience within 50 mile radius of Zip 90210
  • 27
    PPCSecure

    PPCSecure

    PPCSecure

    We monitor your ads using our exclusive click-fraud prevention algorithm. We place offenders' IP addresses into your IP Exclusion list automatically. We even track the time each user spends on your site and their conversions. PPCSecure was just a single report with a few basic columns. Not anymore! Over the last 7 years, we've added a number of new and exciting reports which can be viewed in your browser or downloaded as PDF or CSV files.
    Starting Price: $29.97 per month
  • 28
    Searchify

    Searchify

    Searchify

    ...These factors can be used to boost relevant documents and to restrict the results to a radius of a geographic location. Use the service with open-source libraries for several platforms. Clients are available for Ruby, Python, PHP and Java. The community also contributes several alternatives to these and other languages. Besides, our REST API is super simple so you can develop your own client with very little effort. In Searchify, results ordering is defined by a custom sorting algorithm that is expressed in a formula.
    Starting Price: $59.00/month
  • 29
    Apache Lucene

    Apache Lucene

    Apache Software Foundation

    ...Apache Lucene set the standard for search and indexing performance. Lucene is the search core of both Apache Solr™ and Elasticsearch™. Our core algorithms along with the Solr search server power applications the world over, ranging from mobile devices to sites like Twitter, Apple and Wikipedia. The goal of Apache Lucene is to provide world class search capabilities.
  • 30
    Active File Compare

    Active File Compare

    Formula Software

    ...This utility is an excellent tool for comparing source code versions since it allows you to correct the source code and also supports syntax highlighting for the programming languages C++, C#, Java, Visual Basic, Delphi, Object Pascal, SQL, Perl, Assembler, Fortran, Foxpro etc. and for HTML, PHP, XML, INI and BAT files. You can also use it to manage the source code when several independent authors make changes. The algorithm of comparing is designed in such a way that it's always very accurate in finding differences both in small text files and in files with a large number of changes. ...
    Starting Price: $7.95 one-time payment