ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,228 results

Code Geek
How to Call an Azure Function after a User Authenticates

This tutorial will show how easy it is to call an Azure function after a user authenticates. Integrating Azure Functions Using Auth0 ...

9:29
How to Call an Azure Function after a User Authenticates

93 views

3 years ago

LernenInVerschiedenenFormen
Challenge Response Authentication Method (and its problem)

Created with SimpleScreenRecorder, Audacity, Xournal.

5:36
Challenge Response Authentication Method (and its problem)

16,266 views

5 years ago

Ariel Weinberger
JWT Explained In Under 10 Minutes (JSON Web Tokens)

JWT (JSON Web Tokens) explained in under 10 minutes! Authentication, authorization, refresh tokens, statelessness, and more.

9:18
JWT Explained In Under 10 Minutes (JSON Web Tokens)

51,806 views

1 year ago

Lawrence Systems
How TOTP  (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

Amazon Affiliate Store ➡️ https://www.amazon.com/shop/lawrencesystemspcpickup Gear we used on Kit (affiliate Links) ...

10:12
How TOTP (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

74,532 views

8 years ago

WSO2
Adaptive authentication functions with WSO2 Identity Server #Identityin15

Adaptive authentication is an evolved form of MFA where the authentication mechanism is decided depending on the user's risk ...

19:19
Adaptive authentication functions with WSO2 Identity Server #Identityin15

682 views

Streamed 3 years ago

DFIRScience
Using Brainwave Data to Authenticate Users

In this video we show a demo using brainwave data from an Emotiv device (replayed) to identify and authenticate users to a ...

8:18
Using Brainwave Data to Authenticate Users

1,729 views

9 years ago

Spamfizzle
Universal Computer Authentication (Part 1 of 2)

Two novel and related anti-spam systems that enable the authentication of every mail server and every personal computer in the ...

10:21
Universal Computer Authentication (Part 1 of 2)

687 views

14 years ago

Steven Gordon
Digital Signatures (CSS441, L18, Y15)

Hash functions and public key crypto for digital signatures. Course material via: http://sandilands.info/sgordon/teaching.

18:09
Digital Signatures (CSS441, L18, Y15)

2,119 views

9 years ago

Vu Hung Nguyen (Hưng)
23 Internet Authentication

Internet Authentication Essentials: Kerberos, X.509, & PKI Explained Overview: Dive deep into fundamental internet authentication ...

7:14
23 Internet Authentication

21 views

4 months ago

DFIRScience
Linux Intro: Signing and verifying data using GPG

In this video we will be using GPG to sign and verify data. Signing is used as a secure way to check whether data has been ...

8:31
Linux Intro: Signing and verifying data using GPG

69,929 views

9 years ago

Vu Hung Nguyen (Hưng)
21 A Toolkit for Digital Trust

Deep Dive into Cryptography: SHA, HMAC, RSA & Diffie-Hellman Explained Overview: This episode provides a detailed technical ...

9:11
21 A Toolkit for Digital Trust

2 views

4 months ago

Faris Durrani
Authentication and Password Hashing

A short lecture topic on what authentication is and the standard theory of password-based authentication procedures.

9:47
Authentication and Password Hashing

54 views

2 years ago

chaintuts
File Verification - Hashes and Signatures

Learn about software security with file verification - using cryptographic hashes and digital signatures. Discusses the use of these ...

7:13
File Verification - Hashes and Signatures

296 views

2 years ago

University of Hawai'i at Hilo
UHH Multi-Function Authentication Training

MFA Training For resources and frequently asked questions, see the website: ...

10:07
UHH Multi-Function Authentication Training

28 views

7 years ago

Mark Edmondson
googleAnalyticsR - How to do auto authentication

A demo on how to enable auto-authentication using googleAnalyticsR - see more on the website here ...

7:14
googleAnalyticsR - How to do auto authentication

3,785 views

7 years ago

IACR
Hierarchical Identity Based Encryption from Affine Messafe Authentication

Presentation at Crypto 2014. Paper by Olivier Blazy and Eike Kiltz and Jiaxin Pan.

18:04
Hierarchical Identity Based Encryption from Affine Messafe Authentication

1,495 views

11 years ago

internet-class
What is a crytographically secure hash function?

Modern cryptography depends on the existence of several special kinds of mathematical functions. One important kind is a ...

5:45
What is a crytographically secure hash function?

1,308 views

9 years ago

Sky Solutions
EasyAuth Demo - An Easy-to-use Authentication Service Wizard

EasyAuth allows you to easily implement external authentication for your applications​​​​​​​. Download the one-pager: ...

10:21
EasyAuth Demo - An Easy-to-use Authentication Service Wizard

268 views

5 years ago

IACR
Indifferentiable Authenticated Encryption

Paper by Manuel Barbosa and Pooya Farshim, presented at Crypto 2018.

18:47
Indifferentiable Authenticated Encryption

294 views

7 years ago

Vu Hung Nguyen (Hưng)
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

Cryptographic Hash Functions Explained: SHA, Security & Applications Overview: This episode provides a comprehensive look ...

7:21
11 Cryptographic Hashes: Your Data's Digital Fingerprint #AI #NLP #Tech #Podcast #Learning

10 views

4 months ago