I am looking for someone to work on a simple CUDA coding work. Must understand CUDA, Parallel Processing, Parallel Computing and good at C/C++ programming. Must be expert in computer science, numerical libraries, performance optimization and parallel programing. CUDA coding templates will be provided to help complete the project quickly. Several Projects will follow for the right person.
...Also the speed of encryption will be very important, namely because of speed I chose stream algorithm instead of block algorithm. I work with transmitting important files over unsecured channels on a regular basis, at the moment I used and use the usual openssl aes-128-cbc, but the encryption speed leaves much to be desired... Therefore, I need a stable utility, but for Salsa20/SOSEMANUK and that quickly encrypted files that weigh from 1kb up to 50kb +. I would like to see it work in the following variants: 1) Sources c++ which can be compiled into usable variant ELF for linux, so it could be put to /bin folder and used as console openssl, extended fileencryptor -enc -in / -out / -key (256bit key) 2) C++ source code, where file encryption is implemented by
I have an issue in laravel while sending messages! The smtp server works only with the local server smtp and the problem that my server send the message only to JUNKS, i tried to fix the issue by importing SENDINBLUE sm...have an issue in laravel while sending messages! The smtp server works only with the local server smtp and the problem that my server send the message only to JUNKS, i tried to fix the issue by importing SENDINBLUE smtp, but i got errors while trying to test it if i add a relay smtp, or any other server, and i click test i got the error: (( Swift_TransportException Unable to connect with TLS encryption )) Im searching only who is the professional to fix this problem by adding SENDINBLUE scripts into my server, or he made anything to let my server accept any kin...
For the implementation & comparison, we have selected the algorithms DES, 3DES, AES, Blowfish & RSA. For comparison, we have used files of different sizes like 25 KB, 50 KB, 1 MB, 2 MB, and 3 MB. The same input files are used for all encryption algorithms. For evaluation of the performance of various encryption algorithms, the following metrics have been chosen. Encryption time, Decryption time, Avalanche effect, Memory consumption WE REQUIRE ANY PROGRAMMING LANGUAGE CODE IMPLEMENTATION OF THESE ALGORITHMS TO COMPARE THE ABOVE-MENTIONED PARAMETERS.
I need someone to fix face recognition file that was written in python code so you have to know how to fix python code. Y need to have good knolage of PHP code programing. The Total budget for this project is $50 Canadian Dollars no more This project will require to fix some other page that were written in PHP code. I include the FRS file that will need to be fixed. All specific details information will be provide to selected Programmer. This Project have to be done in maximum 1 day.
The fees is 300$ a website Similar to and Attached web site script it will be bilingual Arabic and English If you accept the above fees, send me your acceptance with clarification of the following 1-Design programing language and requirements 2- Third parties fees 3-Time needed to finish the website. 4- the website function will be similar to and Payment stages will be 3 stages Three months performance Garantee A web site engine representative will supervise all stages and the work until completion
I haveI have an application in JAVA, and I want to convert it to Node.JS Using Crypto. Need to understand AES/CBC , and Diffie-Hellman key
Want to make a string Encryption and decryption software using Dot net
I haveI have an application in JAVA, and I want to convert it to Node.JS Using Crypto. Need to understand AES/CBC
I am looking for someone to work on Parallel I/O Projects. Must understand I/O Methods (like HDF5 etc.), Parallel Processing, Parallel Computing and good at making graphs/plots from I/O results. Must be expert in CS, numerical libraries, performance optimization, parallel programing and parallel I/O for heterogeneous storage systems. Several Projects will follow for the right person.
Looking for a conference paper ( Cryptography/ IoT security/ Network Security/ Federated learning ) ex: 1. A novel Continuous authN in IoT devices , Functional encryption for data privacy etc
I am looking for a developer to create a simple text messenger on ios that supports end-to-end encryption and send photos. Threema or wikr can be taken as a basis. It is important that the correspondence is as secure as possible. If you have a ready project, we will be happy to buy it
Hello, here on Freelancer last year get birth the Droll Pics app, and the best collaboration with DeePak B. Now the project get bigger. Are you under 25 years old or around there? Do you have the programing knowledge? Are you interested to invest your time and your knowledge in the future profitable business project and be part of it? I'm looking for 5 programmes to create our team. In exchange of your time and service I offer 25% of the company shares. (5% for each person). After 5 years you will have full access to your shares. If you see a big potential in this app, you are welcome to enjoy in the team. You have the age, you have the time, you have the ideas ... Droll Pics needs you. Let's say hello Thank you, Marian.
Looking for asp .net website Main Features Send, receive messages. (auto delete message older than 7 days) Group chat Login Registration pages Control Your Settings. Change Profile information. Web login with email Auth Contacts & block user system Search for a particular message or a user Block a User File Sharing (limit 5 MB) User...Your Settings. Change Profile information. Web login with email Auth Contacts & block user system Search for a particular message or a user Block a User File Sharing (limit 5 MB) User should be able to send msg itself to different devices. Adding a payment gateway for Premium feature—monthly payment or onetime payment. Paid feature should have Encrypted chat system- Chats and file sharing with encryption chat history lifetime. Max file s...
I am looking for someone to work on Parallel GPU and I/O Projects. Must understand CUDA, I/O Methods (like HDF5 etc.), Parallel Processing, Parallel Computing and good at C/C++ programming. Must be expert in CS, numerical libraries, performance optimization, parallel programing and parallel I/O for heterogeneous storage systems. Several Projects will follow for the right person.
I am looking for someone to work on a Plasma Parallel GPU Projects. Must understand CUDA, Parallel Processing, Parallel Computing and good at C/C++ programming. Must be expert in CS, numerical libraries, performance optimization, parallel programing and parallel I/O for heterogeneous storage systems. Several Projects will follow for the right person.
Hello Guys, Hope you are doing well. I have been looking for Server Engineer and Application Developer to make application for VPN Access. Windows PC VPN Mac VPN iPhone VPN (iOS) Android VPN APK Router VPN Chrome VPN Extension IPsec with encryption, IPsec with Layer 2 Tunneling Protocol (L2TP), SSL 3.0 or Transport Layer Security (TLS) with encryption, Layer Two Forwarding (L2F) or Point-to-Point Tunneling Protocol (PPTP) Warm Regards, Ashwani Dudeja
. A new social platform for singles to meet and mingle. We’r...with the founder and a great opportunity to build out your portfolio. Key features to be built: Geo-location enabled Onboarding verification system (think identity and proof of address) to hold the integrity of the platform Twitter-like User profile feed User profile allowing photos, videos, polls, and reels Ability to “follow” and block others, also “like” posts and stories Ability for ads Encryption-capability Roadmap features: Integration with external systems to purchase entertainment tickets (sports, concerts, etc) Allows user to directly purchase and invite others There’s so much that can be done! If any of this interests you, please reach out to Xak with an attached resume an...
Looking for experienced Thoroughbred Software Solution-IV; Script-IV, Dictionary-IV, Business Basic programmer to program scripts, code, and reports that will integrate with Solution-IV Accounting Software. Working knowledge of Solution-IV Source Code preferred. (The Solution-IV and related products were/are developed by Thoroughbred Software International (TSI) and are registered trademarks of TSI.)
...is much more open to security assaults in the 21st century than it was in the past. Homomorphic encryption, for example, is used to maintain the security and privacy of data in the cloud since it offers greater dependability than other solutions. Despite the fact that Fully Homomorphic Encryption offers improved privacy and security, there are a number of challenges with key management and storage. Therefore, to overcome this drawback homomorphic encryption can be infused with the PSO (Particle Swarm Optimization) algorithm to achieve effective key management. The main motive of the project is to enhance the key generation, sharing, and management process which is done using Homomorphic encryption with the help of the PSO Algorithm. Moreover, Diffe Helman ca...
Everyone is familiar with getting license keys to activate software. These keys are normally based on various encryption schemes, and serve to validate that a particular user is authorized to run the software. For this purpose, Please make a Validating Key and Key gen pair. () 1. Input at least three different Local parameters like MAC Id, HDD ID and CPU ID.. (Suggestions Welcome) 2. Take input :: Requesting Person Name, Company name, Email, Software name and Machine Serial Number 3. Create an encrypted (.req) file with all above information 4. On Key -Gen side, Decode all information 5. Generate license for required features(1/16) , as in code project example. 6. Set License type (Demo / Complete) and date of expiry
Role/JD : Data Engineer • 6 years of experience in Designing Azure data lake using data bricks, PySpark, SparkSQL. • Hand on experience on Azure SQL Server, Azure services - Function App, Event Hub, Encryption/Decryption mechanism. • Experience on largest and leading-edge projects, leading cloud transformation and operations initiatives. • Own the technical architecture and direction for a client • Deploy solutions across the Azure platform for major enterprise projects • Producing high quality documentation for consumption of colleagues and development teams • Being a thought leader in introducing DevOps mindset and practices within teams • Helping teams build CI/CD pipelines • Helping development teams solve complex problems in innova...
Dear all, I'd like to develop a website in order to search geospatial data from the developed ontology. To this end, I'm looking for someone who is expert in python programing (e.g., for django part), java, and "ontology" (e.i., "jena"). Diego
Applied Cryptographer / Cryptanalyst * Experience in Matlab , C++, Python * Principle of Symmetric & Asymmetric Cryptography, Hands-on, Technical, Problem Solver. * Can easily crack hash & decrypt strong encryption * Evaluate, Analyse and target weakness in cryptographic security system and algorithms. Investigate, research and test new cryptology theories & applications. Develop and update methods for efficient handling of Cryptic process. * Experience seeing the entire lifecycle of software products is crucial. Strong experience working with engineering and product development teams.
I Need AI programmer familiar with CTL (computational tree logic programing) or logical maths. I will share more details in chat.
need write a java application to create german public transportation ticket barcodes. For those a combination of encryption, decryption and signing processes need to be done. We are looking for support with experience with the bouncy castle library.
I Need AI programmer familiar with CTL (computational tree logic programing) or logical maths. I will share more details in chat.
...I need someone to prepare a report on the current market size, share, level of competition and forecast growth in the data software encryption market in Asia, Americas, Europe, Oceania and Africa regions by key segment. There is a lot of information available right now in research reports, but I don’t have time to collect it and analyse it, so I need someone to do the work for me. The Asian and North American markets are of particular interest to us which we need to get right, the other regions are less important but still need to be considered. The reason for the report is simple. We are considering whether to expand an existing data software encryption business into certain regions of the world. If so, how, and in what order? The report findings will feed in...
we are looking Android Expert for encryption and decryption API integration
...-Ensuring that the company's overall strategy and goals are supported by those of the product The Product Security, Product Manager will receive a vision and roadmap with solutions to address the information security needs of our clients. They will help innovate and deliver security features including: -Customer feedback loop -BYO keys -Suspicious login notification -Enabling MFA, 2FA, etc -Encryption at rest Requirements: Define vision and strategy for products and convert them into a workable blueprint for internal and client teams Provide technical leadership for requirements gathering implementation, testing, and delivery Assist product team with sprints from ideation through deployment identifying client needs, designing, and validating concepts, develop...
Vicetext is a typing plug-in that can help two individuals to make online communications private by encrypting their messages, it is based on blockchain technology (Web 3.0) while allowing people to chat with Web 2.0 software such as WhatsApp, Discord, and Twitter. Visit to see more.
hi we need to develope feathers for our esp8266 code need knowledge in esp8266 webserver tcp http cliaents end ects' we have a working code for sprinklers system and we need to improve it with some feathers the job for now will be to add a api weather client the the existing code so we will get alsoo serial print and data on the webserver of esp8266 of wether and temperaturs from openwether site to the esp8266
We have a number of clients where our software is hosted on our client's server. The clients own the server as well as the SQL database licenses. They create our SQL access. Our clients makes backups of the databases so have full visibility of our databas...We need guidance and support on how to encrypt the databases so they clients cannot access the databases at all, and the data needs to be encrypted even when they do backups as well so they are not able to restore the services. Secondly we host our application on their servers as well and we need to get the application folders encrypted and secured If you have extensive knowledge on database encryption please apply to this project. Note this is a project on an hour to hour rate based on the number of hours needed Kind ...
...functional consultants with testing and UAT via debugging and defect analysis will also be required. Key Responsibilities: ● Create and maintain documentation of technical solution design ● Support SAP functional teams with technical designs ● Development of CDS views including Annotations ● Development of Adobe Forms ● Fiori In App extensions ● ABAP Development in Eclipse (ADT) ● Restful Abap Programing (RAP) ● Excellent working knowledge of S4Hana development tools and methodologies ● Hands on experience and development of all WRICEF objects ● Analysis of functional requirements to produce technical designs and documentation ● Solid understanding of the “Clean Core Methodology” ● In App extension ● Side by Side Extensions utilising BTP ● Experience of SAP Integrati...
It is an exercise of a database, it corresponds to exercise 5 of the attached pdf, where it is indicated which database is being used. Exercise: Implement a solution through database programming to validate the values of a column that represents a situation (state) ensuring that its values and their transitions meet the specification of a transition diagram of states (DTE). The more generic and reusable the solution, the better the score. on that issue. A test scenario must be delivered along with the solution demonstrating how the solution works.