finds you similar websites
auto-suggest    top sites

Jun 8th, 2024

10 Popular Sites Like http://en.wikipedia.org/w...

Our team has scoured through the internet and identified a lot of of the best cryptography and security sites like this one. So come and find out about more webpages that complement this one.

Displaying 21 to 30 of 500 alternatives to http://en.wikipedia.org/wiki/Alice_.... (Updated: Jun 8th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Alice and Bob - Wikipedia, the free encyclope...
No information avaiable
http://en.wikipedia.org/wiki/Alice_and_Bob
popularity:
cryptography
security
reference
wikipedia
alice
encryption
networking
culture
bob
email
new search by a custom tag signature
  Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
  Wiretapped - Computer Security Software etc.
No information avaiable
similarity:
popularity:
security
hacking
software
tools
networking
internet
linux
network
cryptography
reference
  FIPS 140-2 - Wikipedia, the free encyclopedia
No information avaiable
similarity:
popularity:
fips
security
cryptography
encryption
standard
wikipedia
crypto
hsm
government
research
  Cryptology ePrint Archive
Provides access to author-submitted research papers in cryptology. ... International Association for Cryptologic Research (IACR) [ Cryptology ePrint archive ] ...
similarity:
popularity:
cryptography
security
crypto
cryptology
research
papers
science
archive
reference
eprint
  PGP Corporation - Home Page
Helps companies secure e-business operations through firewall, encryption, and intrusion detection.
similarity:
popularity:
security
encryption
pgp
software
privacy
tools
cryptography
internet
email
technology
  LASEC
FÉDÉRALE DE LAUSANNE. http://lasecwww.epfl.ch/ gavoine/rfid ... Tag-to-Reader channel: up to a few meters. http://lasecwww.epfl.ch/ gavoine/rfid ...
similarity:
popularity:
security
cryptography
research
reference
password
technology
computer
laboratory
epfl
website
  The PKI page
the PKI page ... The PKI page. This page contains links to various sites and documents which are ... Some links may be missing, other links may be out of date ...
similarity:
popularity:
pki
security
cryptography
ssl
x509
ca
reference
encryption
crypto
standards
  bouncycastle.org
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
  CVE - Common Vulnerabilities and Exposures (CVE)
Aims to standardize the names for all publicly known vulnerabilities and security exposures.
similarity:
popularity:
security
vulnerability
reference
vulnerabilities
exploits
hacking
networking
computer
cve
database
  ScramDisk - Free Disk Encryption Software
No information avaiable
similarity:
popularity:
security
software
encryption
cryptography
crypto
disk
privacy
tools
networking
filesystem
< prev ... 1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.