Java decryption jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    1,758 java decryption jobs found, pricing in USD
    XML parser 6 days left

    ...password to connect to server and retrieve new files and place in n local folder. The files are encrypted and there is password/salt key to decrypt. We already have the code for decryption in c sharpe and is available. These are patient files and each patient is assigned to a pharmacy and also care home... there is an identifier in the file name for these.

    $694 (Avg Bid)
    $694 Avg Bid
    34 bids

    you have to encrypt/decrypt the file using Polyalphabetic Ciphers

    $28 (Avg Bid)
    $28 Avg Bid
    5 bids

    We need some Android developers. we need who has knowledge of Hiding the file/folder using Encryption/Decryption. we need a serious and hard working person at LOW budget

    $7 / hr (Avg Bid)
    $7 / hr Avg Bid
    9 bids

    Need to encrypt and decrypt the message using Polyalphabetic Ciphers

    $20 (Avg Bid)
    $20 Avg Bid
    4 bids

    Hello everybody! We developed a C program for an IoT device that uses strings generated by our No...strings generated by our Node JS REST Api. To improve security, we encrypt the strings generated on server side and need to decrypt them with the C program. Hence, we need a decryption function compatible with the library we are using on Node "crypto".

    $156 (Avg Bid)
    $156 Avg Bid
    6 bids

    While usi...opencv GUI application which detects face from camera ( reading the above rtsp Url ) and save it as an image. This time the stream is encrypted. I can provide u the key for decryption used at the time of setting encrypted stream. IMP: BID ONLY IF YOU KNOW HOW TO DECRYPT AN ENCRYPTED STREAM. JUST READING FACE FROM VIDEO IS NOT ENOUGH.

    $177 (Avg Bid)
    $177 Avg Bid
    7 bids

    GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not...

    $8 - $75
    $8 - $75
    0 bids

    GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not...

    $375 (Avg Bid)
    $375 Avg Bid
    7 bids

    GSM is the most wide spread mobile communications system in the world. However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not...

    $132 (Avg Bid)
    $132 Avg Bid
    5 bids

    ...security features - Payment gateway security, to keep transaction data safe. File upload security, to ensure only correct file upload. One way hash code to prevent password decryption. Two step verification for admin access. Prevention of SQL injection. CAPTCHA validation on all forms Access level and branch level security....

    $1062 (Avg Bid)
    $1062 Avg Bid
    32 bids

    While using OpenCV to capture Faces from Video from IPCamera , we can use the RTSP URL to read the stream like below ...opencv GUI application which detects face from camera ( reading the above rtsp Url ) and save it as an image. This time the stream is encrypted. I can provide u the key for decryption used at the time of setting encrypted stream.

    $103 (Avg Bid)
    $103 Avg Bid
    3 bids

    ...encrypts the file with your encryption algorithm and saves the processed file to an encrypted file with same file name but with an extension of ".enc". When you run the decryption program, it reads the encrypted file and decrypts (or reverses) it and saves it to same filename but with an extension of ".dec" which stands for decrypted file. For example:

    $40 (Avg Bid)
    $40 Avg Bid
    3 bids

    I need you to develop some software for me. I would like this software to be developed for Windows . I need someone to check my Dropbox activity log for suspicions of malware, worms and any other suspicious activity

    $152 (Avg Bid)
    $152 Avg Bid
    2 bids

    Research about • HTTP Password Authentication - An investigation of the intrinsic authentication configurations, decryption techniques and counter measures. The report you develop must be in IEEE format(4k words) an indicative list of sections for the report are:-. • Title • Abstract • Introduction • Protocol Scope • Protocol Standards •

    $101 (Avg Bid)
    $101 Avg Bid
    28 bids
    $30 Avg Bid
    18 bids

    c language using devc about encryption/decryption. should be than 150 line. need it as soon as possible

    $30 (Avg Bid)
    $30 Avg Bid
    1 bids

    I need you to develop a script for me. Iimplement a python 3 code that decrypts the the encryoted [login to view URL] shall take the cipher text as input and output would be in plain text.

    $24 (Avg Bid)
    $24 Avg Bid
    20 bids

    ...done: File Recovery Evidence verification Image file properties File carving Does it have Filters to aid the examiner like Encase/FTK? Hex Value interpreter usage Decryption/Encryption of a file What encryption does it support? File search in unallocated space Internet artefacts (Browser history) Emails analysis Registry files analysis

    $252 (Avg Bid)
    $252 Avg Bid
    12 bids