MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Key exchangeMutual authenticationAuthentication protocolKey encapsulation mechanismPre-shared keyCryptographic key typesSecurity associationProxy re-encryptionPairing-based cryptographySecure telephoneSignaling protocolAuthentication serverAuthenticated encryptionBasic access authenticationLoginCommunication protocolAuthorizationSecure voiceKnowledge-based authenticationTls-pskElectronic authenticationBackchannelClient certificateAuthenticationConversational user interfaceAccess tokenCommunication channelQuantum key distributionCommunications securityConnection-oriented communicationPassword authentication protocolPasswordHardware-based encryptionPairingCryptosystemApi keyRekeyingIpsecKey signatureTransmission securityKey distributionPublic key certificateComparison of voip softwareMessaging patternSignal protocolThree-pass protocolSession initiation protocolHttp tunnelCodeKey signing partyNetwork level authenticationSupersingular isogeny key exchangeLogical access controlInterfaceToken passingHybrid cryptosystemFederated identityEmail encryptionBlind carbon copyLanguage interoperabilitySpelling alphabetDigest access authenticationJava keystoreClient-side encryptionPresence informationRole-based access controlInternet key exchangeCircuit switchingComputer configurationRsa securidPublic key infrastructureCryptographic protocolSpoofing attackMediated communicationDatabase connectionEchoIdentity assuranceTelecommunications linkPrivate set intersectionTrust boundaryIntegrated encryption schemePersonal identification numberTechnical writerPluggable authentication moduleNetwork-to-network interfaceComputer-mediated communicationElectronic signatureSecure access moduleAir interfaceData streamAccess controlBitmessageSecure socket tunneling protocolDigital identityKeystreamCode-switching in hong kongIn-band signalingStream cipherSecure remote password protocolInter-process communication