Showing 2 open source projects for "encryption algorithm java"

View related business solutions
  • Create custom docs, forms, apps, e-signatures, and surveys with Titan. Icon
    Create custom docs, forms, apps, e-signatures, and surveys with Titan.

    Powerful no-code digital experiences for Salesforce

    Create custom docs, forms, apps, e-signatures, and surveys with Titan’s full-suite of enterprise applications designed to integrate seamlessly with Salesforce data across your entire organization. #1 on the Salesforce appexchange
    Learn More
  • Respond 100x faster, more accurately, and improve your documentation Icon
    Respond 100x faster, more accurately, and improve your documentation

    Designed for forward-thinking security, sales, and compliance teams

    Slash response times for questionnaires, audits, and RFPs by up to 90%. OptiValue.ai automates the heavy lifting, freeing your team to focus on strategic priorities with intuitive tools for seamless review and validation.
    Learn More
  • 1
    Conversations

    Conversations

    The very last word in instant messaging

    Conversations is an open source Jabber/XMPP client for Android, designed to provide a unique and more freeing mobile messaging experience. XMPP is a federated protocol that can work with every XMPP server out there, giving you the freedom to choose a trustworthy server for yourself while still being able to chat with contacts from other servers. All communications are TLS encrypted and Conversations offers to enable one of two state of the art end-to-end encryption mechanisms, so you can be...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    SecuXabber

    SecuXabber

    A secure Jabber-client for Android using strong encryption

    SecuXabber is a secure Jabber-client for Android that bases on Xabber and uses a strong, asymmetric enryption that works on top of the XMPP protocol. A key pair is generated on application start-up. Users can send their public key to other SecuXabber users via Bluetooth. This ensures the origin of the public key because people do a face-to-face check during key exchange. After the keys are imported by both users, all communication between them is done fully encrpyted using a strong 4096 bit...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB