ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,147 results

Lawrence Systems
How TOTP  (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

Amazon Affiliate Store ➡️ https://www.amazon.com/shop/lawrencesystemspcpickup Gear we used on Kit (affiliate Links) ...

10:12
How TOTP (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

74,668 views

8 years ago

LernenInVerschiedenenFormen
Challenge Response Authentication Method (and its problem)

Created with SimpleScreenRecorder, Audacity, Xournal.

5:36
Challenge Response Authentication Method (and its problem)

16,320 views

5 years ago

Tom Olzak
Cryptography Goals

In this video, we're treating cryptography like a toolbox, not a magic spell. Cryptography helps us protect information and prove ...

15:27
Cryptography Goals

15 views

2 weeks ago

Ariel Weinberger
JWT Explained In Under 10 Minutes (JSON Web Tokens)

JWT (JSON Web Tokens) explained in under 10 minutes! Authentication, authorization, refresh tokens, statelessness, and more.

9:18
JWT Explained In Under 10 Minutes (JSON Web Tokens)

56,119 views

2 years ago

WSO2
Adaptive authentication functions with WSO2 Identity Server #Identityin15

Adaptive authentication is an evolved form of MFA where the authentication mechanism is decided depending on the user's risk ...

19:19
Adaptive authentication functions with WSO2 Identity Server #Identityin15

683 views

Streamed 3 years ago

University of Hawai'i at Hilo
UHH Multi-Function Authentication Training

MFA Training For resources and frequently asked questions, see the website: ...

10:07
UHH Multi-Function Authentication Training

29 views

7 years ago

Vu Hung Nguyen (Hưng)
23 Internet Authentication

Internet Authentication Essentials: Kerberos, X.509, & PKI Explained Overview: Dive deep into fundamental internet authentication ...

7:14
23 Internet Authentication

21 views

4 months ago

Lady Tasnim
what is MAC? why is it used? Applied Cryptography

please use the comments section to comment, and like and subscribe if you would like me to post more videos like this.

13:51
what is MAC? why is it used? Applied Cryptography

215 views

4 years ago

DFIRScience
Using Brainwave Data to Authenticate Users

In this video we show a demo using brainwave data from an Emotiv device (replayed) to identify and authenticate users to a ...

8:18
Using Brainwave Data to Authenticate Users

1,737 views

9 years ago

Code Geek
How to Call an Azure Function after a User Authenticates

This tutorial will show how easy it is to call an Azure function after a user authenticates. Integrating Azure Functions Using Auth0 ...

9:29
How to Call an Azure Function after a User Authenticates

93 views

3 years ago

Vu Hung Nguyen (Hưng)
21 A Toolkit for Digital Trust

Deep Dive into Cryptography: SHA, HMAC, RSA & Diffie-Hellman Explained Overview: This episode provides a detailed technical ...

9:11
21 A Toolkit for Digital Trust

2 views

4 months ago

The Coding Gopher
99% of Developers Don't Get PostgreSQL

Check out Supabase: https://supabase.plug.dev/qnxeTMY ❤️ Get 40% OFF CodeCrafters: ...

12:40
99% of Developers Don't Get PostgreSQL

207,852 views

4 months ago

AUTOHOTKEY Gurus
💻 Web Scraping Secrets: Fake Browser Authentication Like a Pro! | AHK Hero Extract

Summary* This video discusses web scraping and automation techniques for accessing data from secure websites that require ...

19:48
💻 Web Scraping Secrets: Fake Browser Authentication Like a Pro! | AHK Hero Extract

138 views

2 weeks ago

FOSDEM
Verifpal Cryptographic Protocol Analysis for Students and Engineers

by Nadim Kobeissi At: FOSDEM 2020 https://video.fosdem.org/2020/H.2215/verifpal.webm Verifpal is new software for verifying ...

15:51
Verifpal Cryptographic Protocol Analysis for Students and Engineers

954 views

5 years ago

Sky Solutions
EasyAuth Demo - An Easy-to-use Authentication Service Wizard

EasyAuth allows you to easily implement external authentication for your applications​​​​​​​. Download the one-pager: ...

10:21
EasyAuth Demo - An Easy-to-use Authentication Service Wizard

269 views

5 years ago

Roel Van de Paar
Code Review: Determining what functions should be implemented in this user-authentication class

https://amzn.to/4aLHbLD You're literally one click away from a better setup — grab it now! As an Amazon Associate I earn ...

4:09
Code Review: Determining what functions should be implemented in this user-authentication class

0 views

4 years ago

Cry.College
Hash based Key Derivation Function (HKDF)

This video shows what key derivation functions are and how they can be used. [06 05 04]

4:45
Hash based Key Derivation Function (HKDF)

5,604 views

4 years ago

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,312 views

9 years ago

IACR
Functional Encryption for Regular Languages

Talk at crypto 2012. Author: Brent Waters. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=24299.

16:05
Functional Encryption for Regular Languages

1,466 views

13 years ago

Center for Cybersecurity Innovation & Outreach
Lesson 9: Passwords and Hash Functions

Discusses why passwords are so prevalent today and how organizations use hash functions to secure stored passwords.

8:17
Lesson 9: Passwords and Hash Functions

2,774 views

9 years ago

IACR
Indifferentiable Authenticated Encryption

Paper by Manuel Barbosa and Pooya Farshim, presented at Crypto 2018.

18:47
Indifferentiable Authenticated Encryption

294 views

7 years ago

Tanja Lange: Intro to crypto
Message Authentication Codes (MACs)

Slides are updated to correct an error for the formulas for OFB mode. Part of Introduction to Cryptology ...

10:06
Message Authentication Codes (MACs)

909 views

5 years ago

IACR
Hierarchical Identity Based Encryption from Affine Messafe Authentication

Presentation at Crypto 2014. Paper by Olivier Blazy and Eike Kiltz and Jiaxin Pan.

18:04
Hierarchical Identity Based Encryption from Affine Messafe Authentication

1,498 views

11 years ago

CNCF [Cloud Native Computing Foundation]
Fortifying Microservice Security with SPIRE and OPA - Ash Nakar

Fortifying Microservice Security with SPIRE and OPA - Ash Nakar Microservice architecture although beneficial brings with it ...

17:18
Fortifying Microservice Security with SPIRE and OPA - Ash Nakar

674 views

5 years ago

Steven Gordon
Properties of Hash Functions (CSS441, L18, Y15)

One-way property, weak collision resistant and strong collision resistant hash functions. Course material via: ...

15:57
Properties of Hash Functions (CSS441, L18, Y15)

7,112 views

9 years ago