ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

182,209 results

Microsoft Azure
Authentication fundamentals: The basics | Microsoft Entra ID

In this video, Microsoft Entra ID Program Manager Stuart Kwan explains the basic concepts and fundamental workings of ...

4:33
Authentication fundamentals: The basics | Microsoft Entra ID

273,117 views

6 years ago

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough, which leads us into the ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

38,519 views

1 year ago

SoftsWeb
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

Confused about API authentication? In this video, we break down OAuth, JWT, and API Keys, explaining when and why to use ...

9:42
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

379,088 views

1 year ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

This is one of the many videos in the mini-series of HTTPS ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

10,153 views

2 years ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

81,764 views

4 years ago

Abhishek Sharma
Authentication functions and 3 ways to produce authentication | Message authentication

Hello friends! Welcome to my channel. My name is Abhishek Sharma. #abhics789 If you learned something new do like and share ...

11:49
Authentication functions and 3 ways to produce authentication | Message authentication

276,519 views

6 years ago

Trouble- Free
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

6:12
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

211,115 views

4 years ago

IEEE SecDev
For developing Physical Unclonable Functions for Device Authentication

Award acceptance speech by Srinivas Devadas (MIT).

15:19
For developing Physical Unclonable Functions for Device Authentication

857 views

4 years ago

Adam Marczak - Azure for Everyone
AZ-900 Episode 25 | Azure Identity Services | Authentication, Authorization & Active Directory (AD)

Identity and Access Management is one of the most important topics for anyone working with Azure. Today we will discuss the ...

11:41
AZ-900 Episode 25 | Azure Identity Services | Authentication, Authorization & Active Directory (AD)

251,314 views

5 years ago

ByteMonk
API Authentication: JWT, OAuth2, and More

In this video, we dive into API Authentication, covering why it's essential, how it secures API access, and four common methods: ...

6:12
API Authentication: JWT, OAuth2, and More

328,720 views

1 year ago

Cyber Experts Academy
What is AAA (Authentication, Authorisation, & Accounting) & IAM? - Beginner's Cyber Security Series

This video consists of easy to understand introductions to IAM (Identity and Access Management) and AAA (Authentication, ...

4:34
What is AAA (Authentication, Authorisation, & Accounting) & IAM? - Beginner's Cyber Security Series

11,773 views

3 years ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

88,285 views

4 years ago

Epic Networks Lab
Securing 5G: Authentication & Key Exchange in Cellular | Computer Networks Ep. 8.8.2 | Kurose & Ross

Answering the question: "How does cell phone encryption work?" This video covers security in wireless and mobile networks, ...

5:54
Securing 5G: Authentication & Key Exchange in Cellular | Computer Networks Ep. 8.8.2 | Kurose & Ross

3,754 views

4 years ago

Web Dev Simplified
Build Node.js User Authentication - Password Login

In this video we are going to build a secure Node.js user authentication system. I will be covering all of the security concerns that ...

13:31
Build Node.js User Authentication - Password Login

572,665 views

6 years ago

Coding Droplets
Blazor Authentication Tutorial - How to Authorize in Blazor [Blazor Tutorial]

Get Source Code by Supporting on Patreon: https://patreon.com/CodingDroplets Blazor Tutorial Series Playlist link: ...

14:25
Blazor Authentication Tutorial - How to Authorize in Blazor [Blazor Tutorial]

84,058 views

2 years ago

leerob
Next.js App Router Authentication (Sessions, Cookies, JWTs)

Learn the foundations of session based authentication through cookies in the Next.js App Router, and how community libraries ...

11:31
Next.js App Router Authentication (Sessions, Cookies, JWTs)

344,046 views

2 years ago

Jeff Brown Tech
Securing Azure Functions with Keys, Key Vaults, Identity, and Networking

Secrets, keys, and identity—oh my! Learn how to lock down your Azure Function App with Key Vault secrets, identity-based ...

16:22
Securing Azure Functions with Keys, Key Vaults, Identity, and Networking

2,210 views

10 months ago

ComTech Network Solutions
Multi-Factor Authentication (MFA): Why You Need It & How to Use It

Ethan from ComTech explains the best practices for setting up Multi-Factor Authentication (MFA) to secure your accounts.

6:18
Multi-Factor Authentication (MFA): Why You Need It & How to Use It

684 views

1 year ago

The Computer Science Engineer
Types of Authentication - Message Encryption, MAC, Hash Functions

Authentication is a critical aspect of information security, and various methods are employed to verify the identity of users, systems, ...

13:39
Types of Authentication - Message Encryption, MAC, Hash Functions

761 views

2 years ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

331,983 views

8 years ago

dotnet
Authentication for Serverless apps

Security can be tricky, especially when comes to serverless. Azure App Service Auth (also referred to as “Easy Auth”) does ...

17:01
Authentication for Serverless apps

7,952 views

4 years ago

RMDCSE
Authentication requirement & Function |CNS| Mrs. S. Logesswari, Assistant Professor, CSE, RMDEC

This video explains the concept of the Authentication requirement & Function in Cryptography Network Security.

8:20
Authentication requirement & Function |CNS| Mrs. S. Logesswari, Assistant Professor, CSE, RMDEC

263 views

3 years ago

Ekeeda
Authentication Functions | Cryptography and Network Security

Unlock the secrets of secure communication with our latest video on Authentication Functions in Cryptography and Network ...

12:54
Authentication Functions | Cryptography and Network Security

1,018 views

2 years ago

Sameer Saini
ASP.NET Authentication using Identity in 10 Minutes - Authentication and Authorization in .NET8

NET8 Web API Full Course https://www.udemy.com/course/build-rest-apis-with-aspnet-core-web-api-entity-framework/?

12:22
ASP.NET Authentication using Identity in 10 Minutes - Authentication and Authorization in .NET8

95,726 views

1 year ago

Abhishek Sharma
MAC in Cryptography ||  Message Authentication Code in Cryptography and network security

... #security #AbhishekDit #InformationSecurity Authentication functions : https://youtu.be/SAz7-A6rNKM My 2nd YouTube channel ...

14:41
MAC in Cryptography || Message Authentication Code in Cryptography and network security

420,648 views

6 years ago