ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

185,448 results

Abhishek Sharma
Authentication functions and 3 ways to produce authentication | Message authentication

Hello friends! Welcome to my channel. My name is Abhishek Sharma. #abhics789 If you learned something new do like and share ...

11:49
Authentication functions and 3 ways to produce authentication | Message authentication

277,448 views

6 years ago

Trouble- Free
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

6:12
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

212,286 views

4 years ago

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough, which leads us into the ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

40,351 views

1 year ago

Microsoft Azure
Authentication fundamentals: The basics | Microsoft Entra ID

In this video, Microsoft Entra ID Program Manager Stuart Kwan explains the basic concepts and fundamental workings of ...

4:33
Authentication fundamentals: The basics | Microsoft Entra ID

277,852 views

6 years ago

Computerphile
Securing Stream Ciphers (HMAC) - Computerphile

Bit flipping a stream cipher could help you hit the Jackpot! But not with HMAC. Dr Mike Pound explains. Correction : "pseudo" is ...

9:24
Securing Stream Ciphers (HMAC) - Computerphile

333,115 views

8 years ago

SoftsWeb
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

Confused about API authentication? In this video, we break down OAuth, JWT, and API Keys, explaining when and why to use ...

9:42
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

410,832 views

1 year ago

Practical Networking
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

Data Integrity seeks to assure that data has not been modified in transit between a sender and receiver. This assurance is ...

7:24
Data Integrity - How Hashing is used to ensure data isn't modified - HMAC - Cryptography

82,499 views

4 years ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

This is one of the many videos in the mini-series of HTTPS ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

10,778 views

2 years ago

IEEE SecDev
For developing Physical Unclonable Functions for Device Authentication

Award acceptance speech by Srinivas Devadas (MIT).

15:19
For developing Physical Unclonable Functions for Device Authentication

884 views

4 years ago

Adam Marczak - Azure for Everyone
AZ-900 Episode 25 | Azure Identity Services | Authentication, Authorization & Active Directory (AD)

Identity and Access Management is one of the most important topics for anyone working with Azure. Today we will discuss the ...

11:41
AZ-900 Episode 25 | Azure Identity Services | Authentication, Authorization & Active Directory (AD)

252,765 views

5 years ago

dotnet
Authentication for Serverless apps

Security can be tricky, especially when comes to serverless. Azure App Service Auth (also referred to as “Easy Auth”) does ...

17:01
Authentication for Serverless apps

7,959 views

4 years ago

Jan Goebel
HMAC explained | keyed hash message authentication code

More exclusive content: https://productioncoder.com/you-decide-what-we-build-next Twitter: https://twitter.com/_jgoebel Blog: ...

6:33
HMAC explained | keyed hash message authentication code

88,823 views

4 years ago

DK Technical Point 2.0
Message Authentication |Authentication Functions in Network security

welcome to my channel in this video I explain topic -Mesaage authentication and authentication functions ...

5:53
Message Authentication |Authentication Functions in Network security

5,194 views

3 years ago

Ekeeda
Authentication Functions | Cryptography and Network Security

Unlock the secrets of secure communication with our latest video on Authentication Functions in Cryptography and Network ...

12:54
Authentication Functions | Cryptography and Network Security

1,032 views

2 years ago

RMDCSE
Authentication requirement & Function |CNS| Mrs. S. Logesswari, Assistant Professor, CSE, RMDEC

This video explains the concept of the Authentication requirement & Function in Cryptography Network Security.

8:20
Authentication requirement & Function |CNS| Mrs. S. Logesswari, Assistant Professor, CSE, RMDEC

281 views

3 years ago

Trouble- Free
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

7:13
#35 MAC ( Message Authentication Code ) - Working and Significance |CNS|

243,952 views

4 years ago

Chirag Bhalodia
Introduction of Message Authentication Code (MAC) | Application of MAC | Cryptographic MAC Function

Follow my blog: https://www.chiragbhalodia.com/2021/10/introduction-of-mac.html Introduction of Message Authentication Code ...

9:37
Introduction of Message Authentication Code (MAC) | Application of MAC | Cryptographic MAC Function

32,912 views

5 years ago

Web Dev Simplified
Build Node.js User Authentication - Password Login

In this video we are going to build a secure Node.js user authentication system. I will be covering all of the security concerns that ...

13:31
Build Node.js User Authentication - Password Login

574,179 views

6 years ago

Perfect Computer Engineer
Message Authentication Code ( MAC )

This lecture talks about Message Authentication Code ( MAC ) in the subject Cryptography & System Security in Hindi. This lecture ...

9:41
Message Authentication Code ( MAC )

1,925 views

1 month ago

HebronR G
Authentication Functions

Information Security.

8:39
Authentication Functions

94 views

4 years ago