Text data decrypt access jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Skills
Languages
    Job State
    3,160 text data decrypt access jobs found, pricing in SGD

    ...you'll need to send us a corresponding C# code that you have written and subsequently provide a guide on how to generate sample cipher texts using the code. We shall then decrypt the cipher texts using the java files. POINTS TO NOTE: [url removed, login to view] 256 AES with some modifications. The magic is in the modification of the encryption.. [url removed, login to view] ...

    $174 (Avg Bid)
    $174 Avg Bid
    17 bids
    Onion-Routing Project 4 days left
    VERIFIED

    ...order to minimize the risks of interception and to increase the anonymity. The confidentiality of the shallot network is implemented as folllows: the relay nodes are unable to decrypt the original message. They can only know about the next hop in the route and the (ciphered) message they have to relay. Alice picks up the route so that it can never be predicted

    $180 (Avg Bid)
    $180 Avg Bid
    8 bids
    decrypt php file 3 days left
    VERIFIED

    I have 1 php file that need to be decrypted. I will only release payment after the decrypted files are proven to work as they did before they where decrypted. This means that I should be able to take the decrypted file and replace the existing encrypted file within and everything should continue to work as per normal without any errors showing. Don't bid on this project if you feel it is b...

    $64 (Avg Bid)
    $64 Avg Bid
    6 bids
    Android App 2 days left

    I have an android file manager source code on android studio and I would like to implement Google cloud storage, a recycle bin, and file encrypt/decrypt feature if possible.

    $50 (Avg Bid)
    $50 Avg Bid
    11 bids

    ...order to minimize the risks of interception and to increase the anonymity. The confidentiality of the shallot network is implemented as folllows: the relay nodes are unable to decrypt the original message. They can only know about the next hop in the route and the (ciphered) message they have to relay. Alice picks up the route so that it can never be predicted

    $286 (Avg Bid)
    $286 Avg Bid
    3 bids

    ...some software for me. I would like this software to be developed for Linux using PHP. Need a web interface to a database which allows two groups of users to log in:. Data owners and data users. Owners can add entities and users can provide and alter content related to the entities. Owners can also add and alter content. For each entitiy, we will

    $1688 (Avg Bid)
    $1688 Avg Bid
    41 bids
    decrypt php file Ended
    VERIFIED

    I have 2 php files that need to be decrypted. I will only release payment after the decrypted files are proven to work as they did before they where decrypted. This means that I should be able to take the decrypted file and replace the existing encrypted file within the wordpress plugin that it belongs to and everything should continue to work as per normal without any errors showing. Don'...

    $168 (Avg Bid)
    $168 Avg Bid
    28 bids
    $65 Avg Bid
    18 bids

    ...decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. In the proposed scheme, the cloud verifies the authenticity of the series without knowing the user's identity before storing data. Our scheme also has the added feature of access control in which only valid users are able to decrypt the stored

    $673 (Avg Bid)
    $673 Avg Bid
    2 bids

    I need you to develop some software for me. I would like this software to be developed for Windows using .NET. this software should be able to decrypt encrypted HTML files.

    $29 (Avg Bid)
    $29 Avg Bid
    8 bids

    ...alphanumeric characters. Alice also has a public and privacy key pair (pk, sk) for the RSA encryption scheme. They want to establish a secure communication channel that can provide data confidentiality and integrity. This will be done via the following steps: (1) perform a mutual authentication and key exchange protocol; and (2) use the shared session key

    $148 (Avg Bid)
    $148 Avg Bid
    11 bids

    ...information on the ultralight c nfc tag 2. The information written on the tag should be encrypted using AES 256 algorithm 3. The data format of the details written should be plain. There should be no use of command or NDEF 4. Once data is successfully written on the tag, we need to be able to view information written on the tag in an information log. Once

    $641 (Avg Bid)
    $641 Avg Bid
    13 bids

    I am looking for someone who can decrypt WhatsApp Store data (crypt12). The data came from an android device which we are trying to decrypt. I have a key but it doesn't work.

    $27 (Avg Bid)
    $27 Avg Bid
    4 bids

    ...will be executed, send via PHP Get/set a Hash of the Hardware ID (Hard Disk Serial Number) to a linux server where a Database is stored. This Linxu server decrypt the hash and check in the data base, if the client is authorized to proceed. If the client is authorized, a DLL should be loaded and injected to a target process via Manual Mapping Method

    $225 (Avg Bid)
    $225 Avg Bid
    14 bids

    "Decrypt for Yoshida"

    $572 (Avg Bid)
    $572 Avg Bid
    59 bids

    [url removed, login to view] i need this panel with User and Password I suppose to be Admin and can able to create user and provide to clients Registration button not suppose to be available. I uploaded a sample page.

    $143 (Avg Bid)
    $143 Avg Bid
    30 bids

    Job Profile : Dehash sha256, input type would be given. Our company needs 3 sha256 encrypted daily . 1 month project or more project. Serious people who can dehash sha256 and have the resources which can be done . Huge opportunity for people.

    $523 (Avg Bid)
    $523 Avg Bid
    2 bids

    I am looking for someone who can decrypt WhatsApp Store data (crypt12). The data came from an android device which we are trying to decrypt. I have a key but it doesn't work.

    $36 (Avg Bid)
    $36 Avg Bid
    1 bids

    I need to code a program to encrypt and decrypt a large file, with the given public/private keys. I can share key file and more details. It needs to be done in C language Details are attached, Please only bid after reading attachment. I have more details and some code also which i can share, if u agree to do it

    $144 (Avg Bid)
    $144 Avg Bid
    6 bids

    I need to code a program to encrypt and decrypt a large file, with the given public/private keys. I can share key file and more details. It needs to be done in C language

    $177 (Avg Bid)
    $177 Avg Bid
    18 bids