ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,144 results

Lawrence Systems
How TOTP  (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

Amazon Affiliate Store ➡️ https://www.amazon.com/shop/lawrencesystemspcpickup Gear we used on Kit (affiliate Links) ...

10:12
How TOTP (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

74,666 views

8 years ago

LernenInVerschiedenenFormen
Challenge Response Authentication Method (and its problem)

Created with SimpleScreenRecorder, Audacity, Xournal.

5:36
Challenge Response Authentication Method (and its problem)

16,320 views

5 years ago

WSO2
Adaptive authentication functions with WSO2 Identity Server #Identityin15

Adaptive authentication is an evolved form of MFA where the authentication mechanism is decided depending on the user's risk ...

19:19
Adaptive authentication functions with WSO2 Identity Server #Identityin15

683 views

Streamed 3 years ago

Ariel Weinberger
JWT Explained In Under 10 Minutes (JSON Web Tokens)

JWT (JSON Web Tokens) explained in under 10 minutes! Authentication, authorization, refresh tokens, statelessness, and more.

9:18
JWT Explained In Under 10 Minutes (JSON Web Tokens)

56,054 views

2 years ago

Tom Olzak
Cryptography Goals

In this video, we're treating cryptography like a toolbox, not a magic spell. Cryptography helps us protect information and prove ...

15:27
Cryptography Goals

15 views

2 weeks ago

Code Geek
How to Call an Azure Function after a User Authenticates

This tutorial will show how easy it is to call an Azure function after a user authenticates. Integrating Azure Functions Using Auth0 ...

9:29
How to Call an Azure Function after a User Authenticates

93 views

3 years ago

Vu Hung Nguyen (Hưng)
23 Internet Authentication

Internet Authentication Essentials: Kerberos, X.509, & PKI Explained Overview: Dive deep into fundamental internet authentication ...

7:14
23 Internet Authentication

21 views

4 months ago

University of Hawai'i at Hilo
UHH Multi-Function Authentication Training

MFA Training For resources and frequently asked questions, see the website: ...

10:07
UHH Multi-Function Authentication Training

29 views

7 years ago

Roel Van de Paar
Code Review: Determining what functions should be implemented in this user-authentication class

https://amzn.to/4aLHbLD You're literally one click away from a better setup — grab it now! As an Amazon Associate I earn ...

4:09
Code Review: Determining what functions should be implemented in this user-authentication class

0 views

4 years ago

Lady Tasnim
what is MAC? why is it used? Applied Cryptography

please use the comments section to comment, and like and subscribe if you would like me to post more videos like this.

13:51
what is MAC? why is it used? Applied Cryptography

215 views

4 years ago

IACR
Indifferentiable Authenticated Encryption

Paper by Manuel Barbosa and Pooya Farshim, presented at Crypto 2018.

18:47
Indifferentiable Authenticated Encryption

294 views

7 years ago

Vu Hung Nguyen (Hưng)
21 A Toolkit for Digital Trust

Deep Dive into Cryptography: SHA, HMAC, RSA & Diffie-Hellman Explained Overview: This episode provides a detailed technical ...

9:11
21 A Toolkit for Digital Trust

2 views

4 months ago

DFIRScience
Using Brainwave Data to Authenticate Users

In this video we show a demo using brainwave data from an Emotiv device (replayed) to identify and authenticate users to a ...

8:18
Using Brainwave Data to Authenticate Users

1,737 views

9 years ago

IACR
Hierarchical Identity Based Encryption from Affine Messafe Authentication

Presentation at Crypto 2014. Paper by Olivier Blazy and Eike Kiltz and Jiaxin Pan.

18:04
Hierarchical Identity Based Encryption from Affine Messafe Authentication

1,498 views

11 years ago

The Coding Gopher
99% of Developers Don't Get PostgreSQL

Check out Supabase: https://supabase.plug.dev/qnxeTMY ❤️ Get 40% OFF CodeCrafters: ...

12:40
99% of Developers Don't Get PostgreSQL

207,654 views

4 months ago

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,312 views

9 years ago

Steven Gordon
Digital Signatures (CSS441, L18, Y15)

Hash functions and public key crypto for digital signatures. Course material via: http://sandilands.info/sgordon/teaching.

18:09
Digital Signatures (CSS441, L18, Y15)

2,121 views

9 years ago

Cry.College
Hash based Key Derivation Function (HKDF)

This video shows what key derivation functions are and how they can be used. [06 05 04]

4:45
Hash based Key Derivation Function (HKDF)

5,602 views

4 years ago

Sky Solutions
EasyAuth Demo - An Easy-to-use Authentication Service Wizard

EasyAuth allows you to easily implement external authentication for your applications​​​​​​​. Download the one-pager: ...

10:21
EasyAuth Demo - An Easy-to-use Authentication Service Wizard

269 views

5 years ago

Coding with Verrol
ep24.10 - SSH passwordless login and SSH keygen

Hi all, let's take a look at how SSH Passwordless login works and how to set it up. Episode: 24.10 Source code: ...

19:07
ep24.10 - SSH passwordless login and SSH keygen

877 views

5 years ago