ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

180,033 results

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough, which leads us into the ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

37,949 views

1 year ago

Microsoft Azure
Authentication fundamentals: The basics | Microsoft Entra ID

In this video, Microsoft Entra ID Program Manager Stuart Kwan explains the basic concepts and fundamental workings of ...

4:33
Authentication fundamentals: The basics | Microsoft Entra ID

271,163 views

6 years ago

SoftsWeb
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

Confused about API authentication? In this video, we break down OAuth, JWT, and API Keys, explaining when and why to use ...

9:42
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

364,953 views

1 year ago

Abhishek Sharma
Authentication functions and 3 ways to produce authentication | Message authentication

Hello friends! Welcome to my channel. My name is Abhishek Sharma. #abhics789 If you learned something new do like and share ...

11:49
Authentication functions and 3 ways to produce authentication | Message authentication

276,100 views

6 years ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

81,483 views

4 years ago

Trouble- Free
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

6:12
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

210,442 views

4 years ago

IEEE SecDev
For developing Physical Unclonable Functions for Device Authentication

Award acceptance speech by Srinivas Devadas (MIT).

15:19
For developing Physical Unclonable Functions for Device Authentication

850 views

4 years ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

This is one of the many videos in the mini-series of HTTPS ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

9,905 views

2 years ago

Cyber Experts Academy
What is AAA (Authentication, Authorisation, & Accounting) & IAM? - Beginner's Cyber Security Series

This video consists of easy to understand introductions to IAM (Identity and Access Management) and AAA (Authentication, ...

4:34
What is AAA (Authentication, Authorisation, & Accounting) & IAM? - Beginner's Cyber Security Series

11,723 views

3 years ago

ByteMonk
API Authentication: JWT, OAuth2, and More

In this video, we dive into API Authentication, covering why it's essential, how it secures API access, and four common methods: ...

6:12
API Authentication: JWT, OAuth2, and More

326,053 views

1 year ago

Adam Marczak - Azure for Everyone
AZ-900 Episode 25 | Azure Identity Services | Authentication, Authorization & Active Directory (AD)

Identity and Access Management is one of the most important topics for anyone working with Azure. Today we will discuss the ...

11:41
AZ-900 Episode 25 | Azure Identity Services | Authentication, Authorization & Active Directory (AD)

250,741 views

5 years ago

Jeff Brown Tech
Securing Azure Functions with Keys, Key Vaults, Identity, and Networking

Secrets, keys, and identity—oh my! Learn how to lock down your Azure Function App with Key Vault secrets, identity-based ...

16:22
Securing Azure Functions with Keys, Key Vaults, Identity, and Networking

2,171 views

10 months ago

Epic Networks Lab
Securing 5G: Authentication & Key Exchange in Cellular | Computer Networks Ep. 8.8.2 | Kurose & Ross

Answering the question: "How does cell phone encryption work?" This video covers security in wireless and mobile networks, ...

5:54
Securing 5G: Authentication & Key Exchange in Cellular | Computer Networks Ep. 8.8.2 | Kurose & Ross

3,748 views

4 years ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

88,057 views

4 years ago

ComTech Network Solutions
Multi-Factor Authentication (MFA): Why You Need It & How to Use It

Ethan from ComTech explains the best practices for setting up Multi-Factor Authentication (MFA) to secure your accounts.

6:18
Multi-Factor Authentication (MFA): Why You Need It & How to Use It

666 views

1 year ago

The Computer Science Engineer
Types of Authentication - Message Encryption, MAC, Hash Functions

Authentication is a critical aspect of information security, and various methods are employed to verify the identity of users, systems, ...

13:39
Types of Authentication - Message Encryption, MAC, Hash Functions

749 views

2 years ago

Web Dev Simplified
Build Node.js User Authentication - Password Login

In this video we are going to build a secure Node.js user authentication system. I will be covering all of the security concerns that ...

13:31
Build Node.js User Authentication - Password Login

571,997 views

6 years ago

Coding Droplets
Blazor Authentication Tutorial - How to Authorize in Blazor [Blazor Tutorial]

Get Source Code by Supporting on Patreon: https://patreon.com/CodingDroplets Blazor Tutorial Series Playlist link: ...

14:25
Blazor Authentication Tutorial - How to Authorize in Blazor [Blazor Tutorial]

83,738 views

2 years ago

dotnet
Authentication for Serverless apps

Security can be tricky, especially when comes to serverless. Azure App Service Auth (also referred to as “Easy Auth”) does ...

17:01
Authentication for Serverless apps

7,949 views

4 years ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

331,581 views

8 years ago