Use java encryption jobs


My recent searches
Filter by:
    Job State
    9,361 use java encryption jobs found, pricing in USD
    looking for trainer for Team 6 days left

    ...Users]) Follow topic : - MongoDB - Oauth 2.0 - RestAPI - SSO (single sign on) - Jwt token - License validation (suppose software need to validate license before use (Laravel) ) + Code encryption (Laravel) - Microservice - Firebase All topic must included - All basic concept, technology - Installation, how it work - What kind of application we need above

    $524 (Avg Bid)
    $524 Avg Bid
    13 bids
    DVD Copy Encryption Software 6 days left

    DVD Dublicate Copy Encryption Software We Need an Destop Software or Any Plugin when Write it with that Plugin. The DVD Get an Encryption Automatickly. With Tht Encryption No one can Copy it to Computer or Make and duplicate DVD for it. But can able to play in DVD Player and Computer Player only. But cannot copy from Computer.

    $248 (Avg Bid)
    $248 Avg Bid
    2 bids

    ...server need not authenticate clients. Start by implementing a basic file system that can handle the create, open, read, write, and stat operations. Then add some form of encryption. You'll need to support a synthetic control file to which the key is written. As a basic version, keep the contents of the files in memory. For a more challenging version

    $162 (Avg Bid)
    $162 Avg Bid
    6 bids

    ... 1. Multiple customers with mobile, email, age, DOB 2. The apartment building and flats management 3. Subgroup of customers 4. Payment gateway integration 5. Data encryption 6. Discussion forum 7. Polling 8. Complaint management(Ticket System) 9. Parking Management with Vehicle directory 10. Hall booking 11. Email and SMS broadcast facility

    $3354 (Avg Bid)
    $3354 Avg Bid
    15 bids

    I'm having trouble finding out how to set up full disk encryption on ubuntu server 16.04. It's installed on ([url removed, login to view]) using asrock tpm2-s module ([url removed, login to view]) I don't want to learn anything about it, I'm looking for copy&paste solution :-) And data recovery

    $27 (Avg Bid)
    $27 Avg Bid
    2 bids
    Server Security Expert 5 days left

    ...component that has Java, JQuery, HTML and CSS. We have a detailed report from IBM's App Scan and also have an SSL set up. Here us the list of the vulnerabilities that need to be fixed... 1) DOM Based Cross-Site Scripting Fix:Review client-side code and clear your input sources 2) Encryption not apllied Fix: Force the use of HTTPS when sending

    $229 (Avg Bid)
    $229 Avg Bid
    13 bids

    Hello, We planing to develop a product as SAAS based on cloud. that will include Micro CMS , Micro CRM with Market if user want to buy one time license for 1 domain and hosting on their server? 4. Which Database you will prefer to use? 5. For frontend what you will use - Angular or bootstrap? 6. Which kind of api you going to use?

    $11665 (Avg Bid)
    $11665 Avg Bid
    16 bids
    POS Coin Development 2 days left

    We are looking...of 21Million coins, QT wallet and the coins should be transferred to our wallet. We want the complete source code of the coin as well. The coin should be based on SHA256 encryption. You should have experience in Coin Development and should be able to provide us sample of your work so we are sure that you can complete the project.

    $1552 (Avg Bid)
    $1552 Avg Bid
    9 bids

    ...with a certain structure (see below, no compression involved) The archive does not need to employ compression/decompression. We use it as a simple container, the JPG files could be simply read as data buffers; encryption will be applied later The application will only have to show thumbnails of this pictures (by dynamically resizing the pictures)

    $239 (Avg Bid)
    $239 Avg Bid
    31 bids

    ...script that enable multiple users to encrypt and decrypt a file with a password. The password must be entered by the user via command line (not stored in the script). The encryption hash used must be SHA256. The script must have the ability to list multiple files in the index. When encrypting a file that is already in the index, have it replace the

    $23 (Avg Bid)
    $23 Avg Bid
    4 bids

    Use any cryptographic library to implement an IND- CCA secure public key encryption scheme and encrypt some image file using the scheme. Submit a detailed description of your implementation.

    $98 (Avg Bid)
    $98 Avg Bid
    5 bids
    Write some Java Code 1 day left

    I need you to write code for encryting a txt file using encryption key using Java

    $23 (Avg Bid)
    $23 Avg Bid
    19 bids

    I need you to develop some software for me. I would like this software to be developed for Windows using Java. Design a windows software that will have an encryption and decryption functions and will access a web server for information

    $25 (Avg Bid)
    $25 Avg Bid
    4 bids

    i need to develop a new encryption technique or to demonstrate a novel method of securing and verifying digital signature without using any third party application. i alrady fenish the website desigen using java

    $48 (Avg Bid)
    $48 Avg Bid
    9 bids

    For our project we need different & unique method of image encryption in MATLAB by using any binary random sequence . just YOU can provide your codes of MATLAB for us & give a screen recorded video of working .

    $77 (Avg Bid)
    $77 Avg Bid
    3 bids

    I nee...required; - Firmware and source code of the controller software to log every RFID tag in its range and than submit it into a server in the internet, preferably using SSL encryption. The device should (preferably be USB powered) have medium range (50cm to 100cm) RFID tag reader, internet connection using GSM (3G, GPRS), and a micro-controller

    $491 (Avg Bid)
    $491 Avg Bid
    14 bids

    ...have a task to unzip a file from an archive which uses pkzip2/deflate (zipcrypto) encryption and compression. I have read that this is possible to crack with a known-plaintext approach with at least 12 known bytes. Since I do not know the content, the idea was to use 12 bytes from the fileheader of the jpg in the zip file. Have tried the tools pkcrack

    $30 (Avg Bid)
    $30 Avg Bid
    1 bids

    Hi i need to find the type of encryption of these requests here is the request and the response [url removed, login to view] [url removed, login to view] i need to know how are encrypted these two info : X-APIToken and "sign" if can it be useful i have already collected the requests using fiddler , so i can send you the fiddler

    $37 - $308
    $37 - $308
    0 bids

    I would like someone with great expertise in laptop encryption...

    $2041 (Avg Bid)
    $2041 Avg Bid
    4 bids

    ...own Encryption or Digital Signature Technique or Algorithm, Description Nowadays, security by encryption is done using either a third-party application or the database’s native digital signature processing, the former being too expensive, while the latter offers weak security. The idea is for the students to formulate their own encryption algorithm

    $40 (Avg Bid)
    $40 Avg Bid
    3 bids