MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Steane codeFlynn's taxonomyMccumber cubePaillier cryptosystemItsecMceliece cryptosystemCodd's cellular automatonAkelarreDesign patternsIec 62443Opal storage specificationCapability-based securityJenkins hash functionSecurity.txtPkcs 12Nist cybersecurity frameworkData encryption standardCryptosystemInformation securityNsa suite b cryptographyCoppersmith's attackData center security6in4Halstead complexity measuresBcryptThe multiprogramming systemJackson structured programmingCisco discovery protocolSha-2Shamir's secret sharingIeee 802.16Hierarchical internetworking modelInformation rights managementIt security standardsData integrity fieldComputer access controlAccess-control listRainbow seriesBrewer and nash modelAtt&ckFletcher's checksumPkcs 8Schnorr signaturePassword policySecurity engineeringIso/iec 646Browser securityCobitComputer security softwareDigital signature standardOctetAdvanced encryption standardIdentity-based encryptionIso/iec 27002Bacon's cipherPromelaPkcs 7Computational trustAdiantumDhcp snoopingCryptovirologyTigerDigidocNist enterprise architecture modelSecurity hackerIso/iec 27701Intel hexBlowfishCipher suiteMacguffinTransport layer securityCommon criteriaHipo modelSecure neighbor discoveryHack computerPkcs 1Rsa securidPrimitive data typeIso 2709Adler-32Iso/iec 8859-10It lawTemporal key integrity protocolIso 9564Time protocolConvergenceFractranEncryption softwareCyclCryptographic key typesInformaticsProcess isolationChacha20-poly1305Dual ec drbgOntology languageCryptographic protocolSecurity testingFortunaHost identity protocolLevel set