Filtrer

Mes recherches récentes
Filtrer par :
Budget
à
à
à
Type
Compétences
Langues
    État du travail
    5,000 encryption missions trouvées

    ...conversion. H. SAV & Workflow États workflows : Ouvert → En traitement → En attente fournisseur → En attente client → Clos. Tickets liés aux dossiers, assignés, SLA, messages automatiques. Journal d’événements + upload documents. I. Sécurité & Conformité Authentification SSO / 2FA pour admins. Permissions basées rôles (Admin, Ventes, Emission, SAV, Finance). Chiffrement at-rest (PGP/DB encryption) pour données sensibles (passeports, PII). Logs d’audit, conformité GDPR (export / suppression). 4) Intégrations techniques (suggestions & remarques) Fillout : réception via webhook → endpoint /webhooks/fillout. Map champs. Stripe :...

    €525 Average bid
    €525 Offre moyenne
    27 offres

    ...RTL/LTR design (Arabic right-to-left compatibility). 5. Include archive pages for reports, documents, and public content. 6. Implement data backup, monitoring, and privacy policies for long-term reliability. --- Core Features and Requirements 1. Security HTTPS, HSTS, CSP policies, and XSS/CSRF prevention. Encrypted storage for sensitive submissions (if stored at all). Server-side encryption (AES / RSA). Secure admin panel with 2FA and login attempt limits. DDoS protection (via Cloudflare / reverse proxy / hosting solution). Logging and monitoring system for suspicious access. 2. Frontend Modern, minimalist UI — inspired by investigative media / civic initiatives. Fully responsive design for mobile and desktop. RTL support for Arabic + LTR for English/Fr...

    €8 - €1490
    Scellé
    €8 - €1490
    59 offres
    Develop my website
    S'est terminé left

    ...icons Integrated map (e.g., Google Maps) showing office location --- 6. User Registration & Login System Sign-up Page: Full name, email, password fields; optional fields like phone/country Email/SMS verification for account activation Login Page: Email + password; sessions or JWT used for login state User Dashboard: Access to personal info, previous orders, registered courses Password Encryption: Secure hashing (e.g., bcrypt) Forgot Password: Password reset via email link --- 7. Admin Dashboard Admin Login: Separate login interface with admin-only access Product Management: Add/edit/delete products, upload images, assign categories Service Management: Full control over service listings and pricing Course Management: Manage courses, schedules, pricing, and s...

    €162 Average bid
    €162 Offre moyenne
    110 offres
    CRM WORK FOR SOFTSOLUTION2000
    S'est terminé left

    ...claims, contacts, users, etc.). 7. Testing and Validation Functional Tests Validate all forms for creation, editing, and deletion of suppliers, products, claims, and contacts. Verify 2FA functionality. Check file uploads and browser preview. Ensure search and filter features work properly. Security Tests Access control: confirm that only logged-in admins can access data. Check for proper encryption (HTTPS). Usability Tests Confirm the interface is clear and intuitive. Ensure consistent design (button placement, labeling, etc.). Final Validation User acceptance testing (UAT) to confirm all requirements are met. 8. Maintenance and Evolution Corrective Maintenance Fix any bugs and apply security updates. Evolutive Maintenance Add new functionalities (e.g., externa...

    €16 / hr Average bid
    €16 / hr Offre moyenne
    40 offres
    CRM WORK FOR SOFTSOLUTION2000
    S'est terminé left

    ...claims, contacts, users, etc.). 7. Testing and Validation Functional Tests Validate all forms for creation, editing, and deletion of suppliers, products, claims, and contacts. Verify 2FA functionality. Check file uploads and browser preview. Ensure search and filter features work properly. Security Tests Access control: confirm that only logged-in admins can access data. Check for proper encryption (HTTPS). Usability Tests Confirm the interface is clear and intuitive. Ensure consistent design (button placement, labeling, etc.). Final Validation User acceptance testing (UAT) to confirm all requirements are met. 8. Maintenance and Evolution Corrective Maintenance Fix any bugs and apply security updates. Evolutive Maintenance Add new functionalities (e.g., externa...

    €1096 Average bid
    €1096 Offre moyenne
    16 offres
    Recruitment solutions
    S'est terminé left

    ...post-interview. 1.8 Offer Management & Onboarding • HR can generate and send offer letters to selected candidates. • Candidates can accept/reject offers through the portal. • Hired candidates' data is exported to SAP HCM for onboarding. 2. Security & Compliance Features • Role-Based Access Control (RBAC): Only HR/Admin can reveal names. • Audit Logging: Tracks who accessed names and when. • Data Encryption (SSL/TLS): Ensures privacy and security. • GDPR & Data Protection Compliance. • Audit Window: A time-bound period for reviewing and auditing all system actions related to recruitment, ensuring transparency and preventing manipulation. 3. Reporting & Dashboard 3.1 Filtered Reports by Position • Recruiters and Hir...

    €444 Average bid
    €444 Offre moyenne
    21 offres
    VPay_money transfer
    S'est terminé left

    ...(FCM), Twilio (SMS) o Security: AES encryption, OAuth 2.0 authentication 3.2 Real-Time Payments to Agents (Core Enhancement) • Bank API Integration: Connect directly to bank APIs for instant agent payments. • Real-Time Transfer Processing: o Upon successful withdrawal, agent’s linked bank account is immediately credited with:  The disbursed amount  The commission earned o Agent receives an instant notification of the credit • Automated Settlement System: o Transactions are logged for reconciliation o Daily reports are generated for financial tracking • Fallback System: o If instant credit fails, the system retries within a set time o If retries fail, manual admin intervention is triggered 3.3 Security & Compliance • Data Encryption...

    €509 Average bid
    €509 Offre moyenne
    18 offres
    Health care patient prediction
    S'est terminé left

    ...Recommendations • Display patient classification (Normal, At Risk, etc.). • Provide recommended actions based on classification. • Generate alerts for severe cases. • Generate reports for doctors. 4.4. Integration with EHR System • API for retrieving and updating patient data. • Compatibility with HL7/FHIR standards. 4.5. Security & Compliance • Role-based access control (RBAC). • Data encryption (AES-256 for storage, TLS 1.2+ for transmission). • Logging and auditing of all actions. 5. Non-Functional Requirements Requirement Description Performance AI response time < 2 seconds for classification. Scalability Handle 10,000+ patient records efficiently. Availability 99.9% uptime, cloud-based deployment. Compliance GD...

    €797 Average bid
    €797 Offre moyenne
    67 offres

    ...Cloud storage: Use of AWS S3 or Google Cloud Storage to store images, 3D models, and files. 3.3 Drone integration (DJI SDK) DJI SDK: Use of the DJI SDK Mobile for drone integration (Phantom 4 Pro and Mini 4 Pro). Control drone movements, take photos, and manage flight routes. 3.4 Security Secure authentication: Use of OAuth2 or JWT to secure user access. Data encryption: Storage of sensitive information (such as quotes) with SSL encryption. 4. User Interface (UI) / User Experience (UX) Minimalist and refined design: Simple, intuitive, and quick to use interface. Main screens: Home page: Dashboard with summary of quotes and current projects. Project management: List of roofs and current projects with access to quotes. Quote page: Interface to create and modify quotes. 3D vi...

    €1126 Average bid
    €1126 Offre moyenne
    43 offres

    ...services within a microservices environment is a plus. • Node.js: Strong knowledge for building efficient APIs and backend microservices. 2. Cloud & Infrastructure: • Amazon Web Services (AWS): Experience with EC2, ECS, Lambda, S3, and RDS. Familiarity with AWS security best practices is essential. • AWS Security: Ability to implement military-grade security measures, including IAM policies, encryption, and secure networking. • Amazon S3 & AWS Lambda: Knowledge of serverless architectures and scalable storage solutions. • Amazon ECS & EC2: Proven experience managing and orchestrating containerized services. 3. DevOps & Automation: • Terraform: Expertise in Infrastructure as Code for automated, consistent provisioning. &bull...

    €29 / hr Average bid
    €29 / hr Offre moyenne
    43 offres
    Web application
    S&#039;est terminé left

    ...2. **Frontend** - **Frameworks**: React.js, Vue.js, Angular. - **UI/UX**: Use libraries like Material-UI or Bootstrap for a responsive and attractive user interface. 3. **Mobile** - Development of mobile applications for Android and iOS (React Native, Flutter). 4. **Hosting and Security** - Hosting on cloud platforms like AWS, Google Cloud, or Azure. - Data security with SSL, encryption of sensitive data, and two-factor authentication (2FA). ## Development Plan ### 1. Research and Analysis Phase - Understand the specific needs of the school. - Analyze existing systems and identify gaps. ### 2. Design - Create wireframes and prototypes for the user interface. - Define the system architecture and database structures. ### 3. Development - Iterativ...

    €190 Average bid
    €190 Offre moyenne
    30 offres

    hello, we are looking for a developer or development team to continue the development of our market place. Our site is developed based on a Symfony2. We want a high level of expertise in Symfony2, references and a reactivity We need to bring corrective and regularly amélioratives changes Each work will be an encryption and an estimate of the time Thank you best regards En français : bonjour, nous sommes à la recherche d'un développeur ou d'une équipe de developpement pour continuer le développement de notre place de marché. Notre site est developpé sur une base Symfony2. Nous souhaitons un niveau de compétences élevées sur Symfony2, des références et un r...

    €89 Average bid
    €89 Offre moyenne
    7 offres

    ...other institutions without exposing sensitive resources publicly. Key Services AWS Lambda for event-driven oversight logic and scheduled compliance sweeps AWS RDS for the authoritative supervisory data store AWS S3 as the immutable audit and reporting repository Security & Compliance Networking, IAM, logging, encryption, and traffic inspection must adhere to high financial-regulatory standards. This includes: End-to-end TLS KMS-managed encryption Fine-grained IAM policies VPC flow logs streaming to CloudWatch/S3 Auditable change control Deliverables Terraform, CloudFormation, or CDK templates to provision the VPC, subnets, route tables, NAT gateways, and security groups Deployment scripts and Lambda code that trigger compliance c...

    €27 / hr Average bid
    €27 / hr Offre moyenne
    47 offres

    ...KYC/identity verification. Send & Receive Money: Users can transfer funds internationally via bank deposit, mobile wallet, or cash pickup. Currency Conversion: Real-time exchange rates and transparent fees. Payment Methods: Support for bank cards, bank transfers, and digital wallets. Transaction Tracking: Notifications, transfer status updates, and history logs. Security & Compliance: End-to-end encryption, fraud detection, and compliance with AML/KYC regulations. Admin Dashboard: Manage users, transactions, rates, and reports. Technical Requirements: Mobile apps: iOS & Android Web dashboard for admin & users Scalable backend to handle high transaction volumes Integration with payment processors, banks, and currency exchange APIs Deliverables: Fully f...

    €1490 Average bid
    €1490 Offre moyenne
    200 offres
    Secure iOS Health Tracking App
    4 jours left
    Vérifié

    ...authentication (Touch ID / Face ID) with an optional 4- to 8-digit passcode fallback. When pre-set conditions are met—location reached, time elapsed, or user action—the app should automatically issue push notifications to the user (and later to caregivers via a secure service we will integrate). Security is non-negotiable: please design with Secure Enclave, Keychain storage, SSL pinning, and at-rest encryption from day one so that we are audit-ready for HIPAA-style reviews. I want clean, modular Swift code, well-documented so an Android team can mirror the architecture later. Deliverables I need from you: • Xcode project with full source and unit tests • A TestFlight build demonstrating background GPS, biometric gatekeeping, and automated push aler...

    €455 Average bid
    €455 Offre moyenne
    142 offres

    ...Here is what must work out of the gate: • Classic ASP and IIS hosting for all of our existing sites, with bindings, SSL certificates, and application pools duplicated as they stand now. • Database services mirrored so every connection string continues to resolve without edits. • Third-party components already in use—including but not limited to: Auth0 for user authentication, the WodCrypt encryption library ( ), and ABCpdf from —installed, registered, and tested so the sites compile and run just as they do today. You will receive remote access to both the old and new instances along with exported IIS configs. We work with an AWS Partner to provide support as far as networking and AWS configuration, but not application setup. I will consider

    €1848 Average bid
    €1848 Offre moyenne
    87 offres

    ...Penetration Test on a SaaS platform built with Laravel and React. The app helps real estate sourcers package deals using AI and third-party data. The objective of this project is to collate the results of a gray box test, identifying vulnerabilities and weaknesses at minimum in the application's authentication and authorization mechanisms, input validation, state management, access control and encryption of a web application. Testing will focus on identifying potential security risks and providing recommendations for remediation. Scope of Work: • Audit the Authentication/Authorization flow (JWT/Laravel Sanctum). • Test for IDOR and Broken Access Control between user accounts. • Audit API security (integrations with AI and Property Data providers). • C...

    €272 Average bid
    €272 Offre moyenne
    217 offres

    ...profiles Real-time notifications AI-based smart features Secure backend connectivity Preferred Tech Stack (Developers can suggest better alternatives) Frontend: React / / Vue Backend: Node.js / Django / Laravel Mobile App: Flutter / React Native AI/ML: Python, TensorFlow, OpenAI API, or similar Database: MongoDB / MySQL / PostgreSQL Cloud: AWS / Firebase / Azure Security Data encryption Secure authentication Role-based access (Admin/User) Deliverables Fully working website Mobile app (APK + iOS build) Admin dashboard Source code Deployment support Documentation Freelancer Requirements Proven experience in AI projects Portfolio of website + app development Strong UI/UX skills Good communication Ability to deliver on time Timeline Project completion e...

    €282 Average bid
    €282 Offre moyenne
    52 offres

    ...Mode) with high-end UI/UX. The Figma designs are complete. I need you to implement them with a "premium" feel—meaning fluid animations, micro-interactions, and flawless performance. Detailed Core Scope: Security & Access: * Whitelist System: Registration restricted to specific domains/verified users only. Strict German GDPR (DSGVO): EU-based infrastructure, "Privacy by Design," and full data encryption are non-negotiable. Social & Communication: Real-time Messaging: High-speed 1-on-1 Chat and Group Messaging functions. Friends System: "My Network" management (adding/removing friends, social graph). Groups: Dedicated spaces for categorized communication and file sharing. Organization & Productivity: Event Management: Full Cal...

    €981 Average bid
    €981 Offre moyenne
    168 offres

    ...collect sensor data, push it to the cloud, and expose a clean API for downstream analytics or dashboards. Core needs • Firmware or embedded code that runs stably on the target hardware (ARM-based MCU) • Edge logic for data aggregation, local caching, and basic alert rules • Secure OTA update mechanism and device provisioning flow • Cloud integration (MQTT or REST) with authentication and encryption in place • A lightweight monitoring dashboard or reference client that demonstrates data ingestion and control commands I already have hardware schematics and a basic data model. Your deliverable will be well-documented source code, build instructions, and a brief test report showing successful connectivity to my staging server. Experience with ind...

    €6072 Average bid
    €6072 Offre moyenne
    27 offres

    ... Design and develop a secure payment aggregator platform Integrate official APIs of bKash, Nagad, Rocket, and Upay Merchant onboarding (basic) Payment initiation, callback/webhook handling Transaction status (success / failed / pending) Admin dashboard (transactions, merchants, settlements) API documentation for merchants Security best practices (signature, IP whitelist, encryption) Sandbox + production-ready setup Technical Requirements Backend: Node.js / Laravel / Django (any stable framework) Database: MySQL / PostgreSQL API-based architecture Experience with: Bangladesh MFS APIs Payment webhooks & reconciliation AML/KYC flow (basic understanding) Must Have Experience Previous work with bKash / Nagad / Rocket / Upay ...

    €6398 Average bid
    €6398 Offre moyenne
    110 offres

    ...be blocking correct authentication. I’ll grant temporary access to the mail-sending config and stream live logs; I can also run telnet or openssl commands on demand so you can trace the exact exchange. Deliverables • Identify the precise cause of the 535 failure • Implement or walk me through the fix until a test message returns code 235 (success) • Provide the confirmed working host, port, encryption type, and auth method so I can mirror them in other environments Acceptance Criteria • A verified test email delivers successfully from the application, showing a 235 response in the log • All new settings are documented clearly enough for me to reproduce them elsewhere If you’re comfortable troubleshooting SMTP over SSL/TLS, parsing verbose o...

    €14 Average bid
    €14 Offre moyenne
    82 offres

    ...technical debt, risks, and improvement opportunities ________________________________________ Required Expertise • 6+ years of experience in DevOps / Cloud / Platform Engineering • Deep, hands-on expertise with AWS (VPC, IAM, EC2, RDS, S3, CloudWatch, networking, security) • Demonstrated experience running HIPAA-compliant production systems • Strong background in cloud security architecture (encryption, IAM, least privilege, audit logging) • Extensive experience with Infrastructure as Code • Proven experience designing and operating CI/CD pipelines at scale • Strong Linux systems and troubleshooting skills • Experience with containerized workloads (Docker, ECS/EKS, Kubernetes preferred) • Ability to work independently and make high-qua...

    €5 / hr Average bid
    €5 / hr Offre moyenne
    24 offres

    Hiring Full Stack Developer / Agency for AI-Powered White Label Loan SaaS Platform We are building a complete AI-enabled fintech loan platf...• Unlimited branded apps/websites • Isolated CRM per client • Custom branding (logo, name, domain) • Feature enable/disable per client • Usage monitoring (users + AI usage) Subscription & Billing • One-time setup fee • Monthly subscription plans • Auto invoicing • Payment reminders • Auto suspension on non-payment Compliance & Security • RBI / Play Store compliance • Consent logs • Data encryption • Audit trails • PAN & CIBIL access security Preferred Tech Stack (Flexible) • Flutter / React Native (Mobile) • / Web frontend • Node.js o...

    €2153 Average bid
    €2153 Offre moyenne
    82 offres

    ...in real time. • The whole chain has to stay online even when nearby frequency jammers or other RF noise are present. • Live status dashboards and alerts are required so I can see, at a glance, that every hop in the link is healthy. Here’s how I picture the collaboration: 1. You review the hardware specs and choose the most resilient protocol settings (frequency-hopping, spread-spectrum, encryption, power levels, antenna layout, etc.). 2. You walk me through the exact configuration—firmware tweaks, pairing steps for the phones/tablets, and any DJI Assistant 2 parameters needed. 3. Together we test the setup in a remote session, simulate interference, and verify uninterrupted streams and telemetry updates. 4. You deliver a short PDF/markdown guide ...

    €7014 Average bid
    €7014 Offre moyenne
    19 offres

    ...possible if needed. Objective Prepare the platform for public beta by implementing professional, scalable security foundations that: Protect user and client data Build trust with end users Lay groundwork for future enterprise compliance (SOC 2 / ISO later — not required now) Scope of Work (Deliverables) 1. Transport & Data Security Ensure HTTPS / SSL is correctly enforced site-wide Verify encryption in transit and at rest Review Supabase security configuration and recommend improvements Ensure no sensitive data is stored in plain text 2. Authentication & Access Control Review and harden authentication setup Enforce strong password policies Implement session expiration / timeout handling Configure role-based access control: Coaches can access only t...

    €5 / hr Average bid
    €5 / hr Offre moyenne
    28 offres

    ...security policies applied without exception. Scope of the engagement • User account management: create, modify, suspend, or delete JumpCloud identities as staff join or leave. • Software installation & updates: push new apps, automate patching, and verify version compliance across Windows and macOS endpoints. • Security policy enforcement: apply and monitor password, screen-lock, disk-encryption, and other baseline policies through JumpCloud. Because no formal SOPs exist yet, the first milestone is to document a lightweight but complete runbook that covers onboarding, off-boarding, patch cadence, escalation paths, and routine health checks. Once that foundation is in place, the work shifts to ongoing weekly maintenance, ad-hoc support, and quarterly r...

    €18 / hr Average bid
    €18 / hr Offre moyenne
    11 offres

    ...contact information. Promotions and Discounts: Special seasonal discounts, especially during Muslim occasions like Ramadan. Delivery Option: Home delivery for all purchases, with separate shipping fees. Payment Methods: Flexible payment options, including "pay on delivery" and "pay before delivery." Shipping fees will be separate from product prices. Security: Secure user authentication, data encryption, and secure payment gateways. Order Tracking: Users can track their orders in real-time. User Reviews and Ratings: Allow customers to leave feedback on products and shops. Responsive Design: The app should be optimized for different devices and screen sizes. Budget: $500 (fixed price) How to Apply: Please provide your portfolio, examples of previous e-commerce ...

    €371 Average bid
    €371 Offre moyenne
    135 offres

    ...one-click PDF/CSV report generation per patient and for cohort summaries. Key requirements – The entire stack must be containerised with Docker so we can deploy to AWS Fargate later. – Role-based access: physicians, nurses, and admin each see only the charts and reports tied to their permissions. – HIPAA compliance on data storage and transmission; please note any libraries you rely on for encryption and audit logging. – Clean, documented code plus a short README that lets my internal dev lead run the project locally with `docker-compose up`. Acceptance criteria 1. Demo site running locally that loads a provided sample dataset of 5,000 anonymised patient records. 2. At least three interactive charts (line, bar, pie) that update when filters...

    €438 Average bid
    €438 Offre moyenne
    173 offres

    ...blocking correct authentication. I’ll grant temporary access to the mail-sending config and stream live logs; I can also run telnet or openssl commands on demand so you can trace the exact exchange. Deliverables • Identify the precise cause of the 535 failure • Implement or walk me through the fix until a test message returns code 235 (success) • Provide the confirmed working host, port, encryption type, and auth method so I can mirror them in other environments Acceptance Criteria • A verified test email delivers successfully from the application, showing a 235 response in the log • All new settings are documented clearly enough for me to reproduce them elsewhere If you’re comfortable troubleshooting SMTP over SSL/TLS, parsin...

    €23 Average bid
    €23 Offre moyenne
    89 offres

    ...multitasking, and Doze mode. • Certain premium features unlock through an in-app purchase handled via Razorpay; a clean payment callback and refund flow are mandatory. What I need from you • Native Android code (Kotlin preferred) that cleanly implements CameraX/Camera2, foreground service, and WorkManager or similar for queued uploads. • Integration with the AWS SDK for S3, including simple encryption at rest. • Razorpay Checkout with test and live keys, plus a minimal dashboard screen that shows transaction history. • OTP authentication built on Firebase or an equally reliable SMS provider. • Clear, well-commented code and a short README so another engineer can pick it up. I’ll share detailed wireframes, user stories, and ed...

    €70 Average bid
    €70 Offre moyenne
    13 offres

    ...workflow automation. The ideal solution will be scalable, secure, intuitive, and monetizable internationally — ready to compete with top SaaS products. Core Features PDF Editing Tools Merge, split, compress, rotate PDFs Convert PDF Word, Excel, PowerPoint, JPG/PNG Add, edit, move text, images, highlights Digital signature & secure approvals Watermarking & stamping Password protection & encryption OCR text recognition --- SaaS Platform Functionality User System User registration & login Social login (Google, LinkedIn) optional Multi-tenant architecture Billing & Subscriptions Tiered subscription plans (Free / Pro / Business / Enterprise) Recurring billing (Stripe, PayPal, Razorpay optional) Free trial or freemium model Automa...

    €255 Average bid
    €255 Offre moyenne
    38 offres

    ...will own the high-level architecture and guide a small engineering team so that every layer—from model serving to front-end delivery—can grow without drama. Cloud-agnostic design, container orchestration, CI/CD pipelines, microservices or modular monoliths: I’m open to whatever will give us low latency, predictable costs, and clean deployment workflows, provided we end up with true end-to-end encryption for all customer data, both at rest and in transit. Key areas where I need your expertise • Selecting and refining our NLP stack (e.g., spaCy, Hugging Face Transformers, RAG approaches) and the automated data-extraction pipeline. • Designing a privacy-first data model that isolates tenant data, supports encrypted metadata search, and passes external ...

    €18 / hr Average bid
    €18 / hr Offre moyenne
    94 offres

    ...and the use of interactive icons (Lottie) to enhance user experience. : Complete, clean, and documented source code, including uploading to and ensuring acceptance on the Apple App Store and Google Play Store. Sixth: Security & Data: : Full compliance with the Personal Data Protection Law (PDPL) in Saudi Arabia and National Cybersecurity Authority (NCA) standards. 2.Encryption: Encryption of all sensitive data (customer info, addresses, payments) using advanced protocols (e.g., AES-256) and securing connections via SSL/TLS. Security: Securing endpoints against attacks (SQL Injection, XSS) and using Two-Factor Authentication (JWT). Residency: Commitment to local data storage within Saudi Arabia as per regulatory requirements. Testing: Delivery of

    €1950 Average bid
    €1950 Offre moyenne
    235 offres

    ...Signals The site will require a professional UI/UX that emphasizes our concierge nature. We have already prepared the "About Us," "Meet the Team," "Terms of Service," and "Handover Scripts" to be integrated into the layout. 4. Tech Stack & Payments Responsive Design: Optimized heavily for mobile users. Payments: Integration with Stripe for deposits and final balance payments. Security: SSL encryption and secure API key management. 5. The "Workshop Node" (Client Communication) A digital portal for customers to track their vehicle without visiting the garage: Digital Evidence: Technician photo/video upload for MOT failures or advisories. Interactive Quote & Approval: Customer-facing "Approve Repair" button fo...

    €2649 Average bid
    €2649 Offre moyenne
    264 offres

    ...cross-platform stack such as Flutter or React Native—open to your recommendation). – Core features: user onboarding with phone/email, item listing with image/video uploads, location-based search, in-app payments (Paystack preferred but flexible), secure real-time chat, push notifications, ratings & reviews, and an admin dashboard for moderation. – Security: End-to-end encrypted messaging, data at rest encryption, and basic fraud-detection hooks. – Testing & launch: Unit and integration tests, app-store compliance, and publication to Apple App Store & Google Play. Deliverables 1. Source code and build files for both platforms 2. Compiled apps ready for store submission 3. Admin dashboard (web or mobile) 4. Technical documentation ...

    €263 Average bid
    €263 Offre moyenne
    58 offres

    ...proven. The firmware must keep the external card invisible while still giving me direct, real-time access to game memory. To make sure it stays hidden through every Vanguard update, I need three concrete layers of protection: • Obfuscation techniques that randomise or mask identifiable code patterns • Robust debugging-prevention so the device cannot be stepped through or analysed live • Memory encryption for anything held on-card or passed over PCIe I will provide any hardware-specific documentation you require; all I need from you is the compiled binary, full source code (so I can adapt or re-flash later), and concise build instructions that reproduce the image on a fresh workstation. If you have previous, demonstrable success with DMA-based bypasses—esp...

    €79 Average bid
    €79 Offre moyenne
    9 offres
    EnvShare Zero-Knowledge App QA
    23 heures left
    Vérifié

    ...a zero-knowledge SaaS that lets freelancers and companies exchange secrets (.env files, API keys, etc.) through client-side AES-256 encryption, self-destructing links, Slack notifications and a small CLI. To make sure everything works—and is as secure as advertised—I need two to three sharp-eyed testers to put the free tier through its paces from both desktop and mobile browsers. What I’d like you to do • Create and share secrets, view them before and after expiry, and upload files in the Pro-mode flow. • Try every edge case you can think of: malformed inputs, long filenames, simultaneous opens, expired links, clipboard interactions, potential encryption bypasses, URL leakage—you name it. • Note any UI or UX rough spots, sluggi...

    €74 Average bid
    €74 Offre moyenne
    20 offres

    ...and item-level data Build error handling for partial acceptance, full acceptance, and rejection scenarios Create digital invoice verification against PO/TOT values Support batch detail pre-feeding to warehouse systems Technical Requirements API Development: RESTful API design with POST endpoints Support for both JSON and XML payload formats Basic Authentication implementation HTTPS/SSL encryption ISO-8601 UTC timestamp handling Integration Features: Webhook configuration and management IP whitelisting support for security Comprehensive error code system (E101-E114 range) Warning notifications for non-blocking issues (W101-W103 range) Detailed error parameter tracking with field-level validation Data Handling: Parse and validate complex nested objects (buyer detai...

    €154 Average bid
    €154 Offre moyenne
    7 offres
    ESP32-S3 Modular Firmware
    15 heures left
    Vérifié

    I’m building an ecosystem of ESP32-S3-based modules and I’d like to bring a seasoned embedded developer on board for the long haul. Every module in the roadmap—starting with the very first one we will tackle together—must combine three pillars: LoRa communication (with robust AES-based encryption), a lightweight web panel served from the device itself, and an on-device GUI rendered on a small display. For the initial milestone you will deliver fully-tested, production-ready firmware that proves this trio works seamlessly on the S3: flawless encrypted LoRa packets, a responsive web panel for configuration/monitoring, and a smooth GUI (LVGL or comparable) sharing the same data layer. I’m working with ESP-IDF, but I’m open to your preferred toolchai...

    €416 Average bid
    €416 Offre moyenne
    143 offres

    ...application status. D. Secure Resume Upload and Storage • Resume upload in PDF or DOCX format. • All resumes must be encrypted at rest. • Strict access control: only the owner, authorized recruiters, and admins may access resumes. • Uploaded resumes must be treated as sensitive assets. E. Secure Messaging • One-to-one and small group messaging (e.g., recruiter and candidate). • End-to-end encryption (E2EE) for private conversations. • The server must store only ciphertext for E2EE chats. • Optional server-side encrypted messaging for non-sensitive announcements. F. Authentication and Account Security • Secure user registration and login. • Email and mobile OTP verification. • OTP-based verification for high-risk...

    €8 / hr Average bid
    €8 / hr Offre moyenne
    47 offres

    ...application status. D. Secure Resume Upload and Storage • Resume upload in PDF or DOCX format. • All resumes must be encrypted at rest. • Strict access control: only the owner, authorized recruiters, and admins may access resumes. • Uploaded resumes must be treated as sensitive assets. E. Secure Messaging • One-to-one and small group messaging (e.g., recruiter and candidate). • End-to-end encryption (E2EE) for private conversations. • The server must store only ciphertext for E2EE chats. • Optional server-side encrypted messaging for non-sensitive announcements. F. Authentication and Account Security • Secure user registration and login. • Email and mobile OTP verification. • OTP-based verification for high-risk...

    €278 Average bid
    €278 Offre moyenne
    27 offres

    ...application status. D. Secure Resume Upload and Storage • Resume upload in PDF or DOCX format. • All resumes must be encrypted at rest. • Strict access control: only the owner, authorized recruiters, and admins may access resumes. • Uploaded resumes must be treated as sensitive assets. E. Secure Messaging • One-to-one and small group messaging (e.g., recruiter and candidate). • End-to-end encryption (E2EE) for private conversations. • The server must store only ciphertext for E2EE chats. • Optional server-side encrypted messaging for non-sensitive announcements. F. Authentication and Account Security • Secure user registration and login. • Email and mobile OTP verification. • OTP-based verification for high-risk...

    €379 Average bid
    €379 Offre moyenne
    25 offres

    ...both iOS and Android, delivered as soon as realistically possible. The core flow should guide users from account creation through document capture, data validation, and final e-filing, with secure storage and end-to-end encryption at every step. Please walk me through your proposed architecture and timeline in a detailed project proposal. I am especially interested in how you will: • Handle cross-platform development (React Native, Flutter, or native) • Integrate OCR for receipt and form scanning • Calculate federal and state taxes with up-to-date rules • Manage encryption, authentication, and cloud back-ups • Prepare the app for App Store and Google Play submission • must have Hmrc apis •must have robust security Acceptance c...

    €2743 Average bid
    LDN
    €2743 Offre moyenne
    278 offres

    ...Email notifications) * Multi-Currency Wallet (via Razorpay/Stripe/Paytm, patient deposits only, no access of wallet amount withdrawal) * Provider Onboarding ( interested Hospitals / Doctors / Laboratory /Radiology Service providers / Hotels / Lodges / Transport providers etc can self-register, update perks & rates) * Field Staff App View (Restricted Role) * HIPAA-grade security (logging in, encryption, Indian IT Act compliance) * Cloud-native infra (AWS/Azure/GCP, scalable) * AI Chatbot What we expect * Clean, production-ready code * Weekly demos after agreement & code reviews * Documentation (API specifications with API details and Post method, Header , Body Runbook data to post) * Healthcare data handling experience — Detailed & Developer-Friendly (for fi...

    €507 Average bid
    €507 Offre moyenne
    170 offres

    ...Technical Requirements 8.1 Software Design • Modular and layered architecture • Secure APIs and services • Separation of GMP and non-GMP data 8.2 Database Requirements • Secure relational database (e.g., SQL Server, PostgreSQL) • Encryption at rest and in transit • Regular backups and restore verification • Restricted direct database access 8.3 Time Synchronization • Centralized time source (NTP) • Time-stamp consistency across PLC and software ________________________________________ 9. Cybersecurity Requirements • Secure PLC communication (certificates, encryption) • Network segmentation (IT/OT separation) • Firewall and access control rules • Event logging and intrusion detection • Compliance with IEC...

    €1168 Average bid
    €1168 Offre moyenne
    9 offres

    ...loop) AES encryption on radio link LEDs and reset button handling 2 RTK ROVER (STM32 + UM981) Main responsibilities: Receive encrypted radio frames Decrypt RTCM + ZDA Forward RTCM to UM981 Use ZDA (GNSS time) for license validation Enforce license expiration (time-based) License update via Windows tablet → UART (TX only) Key points: No SD card No internet License bound to STM32 UID Multiple rovers can be connected (UID-based filtering) Simple serial command protocol TECHNICAL STACK MCU: STM32 (H7 family) GNSS: Unicore UM981 Language: C Interfaces: UART (DMA) GPIO Flash Encryption: AES (preferred: AES-GCM or AES-CTR + HMAC) RTOS: Optional (acceptable either way) WHAT IS PROVIDED Full system architecture Detailed firmware flow UART mappi...

    €935 Average bid
    €935 Offre moyenne
    54 offres

    ...statement views, real-time transaction history, pay-in/pay-out processing, and role-based admin dashboards. Seamless secure transaction flows are non-negotiable; every transfer, balance update, or statement request has to be atomic, auditable, and tamper-proof. While secure transactions top the list, I’m happy to integrate any additional layers you recommend—be it two-factor prompts, data-at-rest encryption, or token-based session hardening—so long as they don’t compromise usability. Technology environment Choose the stack you know you can harden and scale—Java/Spring Boot, .NET Core, Node.js with TypeScript, or a comparable enterprise-grade framework. Containerisation (Docker, Kubernetes), automated CI/CD, RESTful or gRPC APIs, and a relational d...

    €581 Average bid
    €581 Offre moyenne
    39 offres
    Digital Gold Web & Apps
    S&#039;est terminé left

    ...polished, store-ready mobile apps built with either native code or a robust cross-platform framework such as Flutter or React Native—whichever you are most comfortable delivering to production quality. 2. Secure backend with user authentication, KYC document storage, wallet management and transaction ledgering. I’m fine with Node, Django, Laravel or similar as long as security best practices—encryption at rest, token-based auth, HTTPS everywhere—are observed. 3. Integration with a reliable gold-price feed (for example, Metals-API) and payment gateways that accept the card and wallet options noted above. 4. Admin dashboard for user management, price-margin control and manual overrides. 5. End-to-end testing, app-store deployment support and clear ha...

    €331 Average bid
    €331 Offre moyenne
    43 offres

    Meilleurs articles de la communauté encryption