finds you similar websites
auto-suggest    top sites

May 11th, 2024

19 Popular Sites Like http://www.mobilefish.com...

Our team has studied the net and spotted a lot of awesome java and cryptography sites like this one. Come by and discover websites that are similar to this one.

Displaying 1 to 10 of 500 alternatives to http://www.mobilefish.com/developer.... (Updated: May 11th, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  Mobilefish.com - A tutorial about Bouncy Cast...
No information avaiable
http://www.mobilefish.com/developer/bouncycastle/bouncycastle.html
popularity:
java
cryptography
crypto
security
bouncycastle
tutorial
j2me
programming
opensource
jce
new search by a custom tag signature
  bouncycastle.org
Home of open source libraries of the Legion of the Bouncy Castle and their Java cryptography and C# cryptography resources
similarity:
popularity:
java
security
cryptography
encryption
crypto
programming
api
opensource
library
development
  bouncycastle.org
No information avaiable
similarity:
popularity:
java
crypto
library
security
opensource
cryptography
encryption
pki
mobile
bouncycastle
  Jasypt: Java simplified encryption - Main
IMPORTANT: It is strongly advised not to use version 1.4 of the Apache Commons ... This problem will not arise if you use the default version of this library ...
similarity:
popularity:
java
security
encryption
cryptography
opensource
library
hibernate
framework
spring
programming
  An Overview of Cryptography
Defines cryptographic terms and concepts, offers crypto scheme comparison, ... key, for example, can be found at http://www.garykessler.net/kumquat_pubkey.html. ...
similarity:
popularity:
cryptography
security
reference
encryption
crypto
algorithms
tutorial
computing
computer
programming
  An Illustrated Guide to Cryptographic Hashes
Steve Friedl's Unixwiz.net Tech Tips. An Illustrated Guide to Cryptographic Hashes ... With the recent news of weaknesses in some common security algorithms ...
similarity:
popularity:
security
cryptography
crypto
hash
encryption
reference
programming
tutorial
algorithms
md5
  A Lesson In Timing Attacks (or, Don't use MessageDigest.isEquals) | codahale.com
No information avaiable
similarity:
popularity:
security
cryptography
java
timing
programming
hacking
attack
crypto
statistics
python
  Keyczar
Keyczar: An open source cryptographic toolkit ... Introducing Keyczar ... Keyczar was originally developed by members of the Google Security Team and is ...
similarity:
popularity:
security
python
cryptography
java
programming
opensource
google
software
library
tools
  Programming With the Java XML Digital Signature API
No information avaiable
similarity:
popularity:
java
xml
security
signature
cryptography
programming
tutorial
development
api
howto
  Moserware: A Stick Figure Guide to the Advanced Encryption Standard (AES)
No information avaiable
similarity:
popularity:
security
cryptography
aes
encryption
tutorial
crypto
comic
algorithms
humor
programming
  CrypTool - Homepage
The application Cryptool is a free e-learning application for Windows. You can use it to apply and analyze cryptographic algorithms. The current version of Cryptool ...
similarity:
popularity:
cryptography
security
tools
encryption
crypto
software
opensource
tutorials
tutorial
learning
1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.