ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

187,697 results

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough, which leads us into the ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

40,508 views

1y ago

Trouble- Free
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

6:12
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

212,665 views

4y ago

Microsoft Azure
Authentication fundamentals: The basics | Microsoft Entra ID

In this video, Microsoft Entra ID Program Manager Stuart Kwan explains the basic concepts and fundamental workings of ...

4:33
Authentication fundamentals: The basics | Microsoft Entra ID

278,180 views

6y ago

Abhishek Sharma
Authentication functions and 3 ways to produce authentication | Message authentication

Hello friends! Welcome to my channel. My name is Abhishek Sharma. #abhics789 If you learned something new do like and share ...

11:49
Authentication functions and 3 ways to produce authentication | Message authentication

277,654 views

6y ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

333,216 views

8y ago

SoftsWeb
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

Confused about API authentication? In this video, we break down OAuth, JWT, and API Keys, explaining when and why to use ...

9:42
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

412,891 views

1y ago

IEEE SecDev
For developing Physical Unclonable Functions for Device Authentication

Award acceptance speech by Srinivas Devadas (MIT).

15:19
For developing Physical Unclonable Functions for Device Authentication

885 views

4y ago

Adam Marczak - Azure for Everyone
AZ-900 Episode 25 | Azure Identity Services | Authentication, Authorization & Active Directory (AD)

Identity and Access Management is one of the most important topics for anyone working with Azure. Today we will discuss the ...

11:41
AZ-900 Episode 25 | Azure Identity Services | Authentication, Authorization & Active Directory (AD)

252,888 views

5y ago

dotnet
Authentication for Serverless apps

Security can be tricky, especially when comes to serverless. Azure App Service Auth (also referred to as “Easy Auth”) does ...

17:01
Authentication for Serverless apps

7,960 views

4y ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

This is one of the many videos in the mini-series of HTTPS ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

10,869 views

2y ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

82,573 views

4y ago

RMDCSE
Authentication requirement & Function |CNS| Mrs. S. Logesswari, Assistant Professor, CSE, RMDEC

This video explains the concept of the Authentication requirement & Function in Cryptography Network Security.

8:20
Authentication requirement & Function |CNS| Mrs. S. Logesswari, Assistant Professor, CSE, RMDEC

282 views

3y ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

88,870 views

4y ago

Ekeeda
Authentication Functions | Cryptography and Network Security

Unlock the secrets of secure communication with our latest video on Authentication Functions in Cryptography and Network ...

12:54
Authentication Functions | Cryptography and Network Security

1,034 views

2y ago

DK Technical Point 2.0
Message Authentication |Authentication Functions in Network security

welcome to my channel in this video I explain topic -Mesaage authentication and authentication functions ...

5:53
Message Authentication |Authentication Functions in Network security

5,194 views

3y ago

HebronR G
Authentication Functions

Information Security.

8:39
Authentication Functions

94 views

4y ago

Chirag Bhalodia
Introduction of Message Authentication Code (MAC) | Application of MAC | Cryptographic MAC Function

Follow my blog: https://www.chiragbhalodia.com/2021/10/introduction-of-mac.html Introduction of Message Authentication Code ...

9:37
Introduction of Message Authentication Code (MAC) | Application of MAC | Cryptographic MAC Function

32,936 views

5y ago

I am Tech Arch
Create and Secure Azure Function App with OAuth 2.0 | Step-by-Step Guide

Learn How to Create and Secure an Azure Function App with OAuth 2.0 In this step-by-step tutorial, I'll guide you through: ...

9:06
Create and Secure Azure Function App with OAuth 2.0 | Step-by-Step Guide

2,630 views

1y ago

Jeff Brown Tech
Securing Azure Functions with Keys, Key Vaults, Identity, and Networking

Secrets, keys, and identity—oh my! Learn how to lock down your Azure Function App with Key Vault secrets, identity-based ...

16:22
Securing Azure Functions with Keys, Key Vaults, Identity, and Networking

2,341 views

11mo ago

Web Dev Simplified
Build Node.js User Authentication - Password Login

In this video we are going to build a secure Node.js user authentication system. I will be covering all of the security concerns that ...

13:31
Build Node.js User Authentication - Password Login

574,279 views

6y ago