ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

11,935 results

Luke Briner
Understanding Authentication and Authorisation Protocols

Some background, basic details and comparison of SAML/Shibboleth, OpenID, OAuth2 and OpenID Connect to give an idea of ...

35:57
Understanding Authentication and Authorisation Protocols

11,160 views

9 years ago

OktaDev
"Basic Authentication" in Five Minutes

Learn what "Basic Authentication" is, how it's used, and what the HTTP Request looks like! #Authentication #BasicAuth #HTTP ...

5:07
"Basic Authentication" in Five Minutes

201,935 views

4 years ago

LernenInVerschiedenenFormen
Challenge Response Authentication Method (and its problem)

Created with SimpleScreenRecorder, Audacity, Xournal.

5:36
Challenge Response Authentication Method (and its problem)

16,139 views

5 years ago

RedHatCzech
Simo Sorce - GSSAPI Privilege separation with GSS-Proxy

Slides: http://www.devconf.cz/slides/devconf-2013-gss-proxy.odp GSS-Proxy is a new feature developed in collaboration with the ...

44:31
Simo Sorce - GSSAPI Privilege separation with GSS-Proxy

1,793 views

12 years ago

OWASP Foundation
Securing an API Ecosystem with OAuth 2 0 - Philippe De Ryck

Managed by the OWASP® Foundation https://owasp.org/

56:04
Securing an API Ecosystem with OAuth 2 0 - Philippe De Ryck

295 views

3 years ago

UCIBrenICS
Device Enhanced Authentication: Passwords and Second Factors

Maliheh Shirvanian Visa Research October 12, 2018 11:00am - 12:00pm Donald Bren Hall 6011 "Device Enhanced ...

56:04
Device Enhanced Authentication: Passwords and Second Factors

151 views

7 years ago

FOSSASIA
Unlocking the Power of FIDO2  The Future of Authentication - Suvin Kodituwakku, Sahan Dissanayaka

The Fido2 is a protocol that uses public key cryptography and biometric authentication to improve security and user experience.

12:14
Unlocking the Power of FIDO2 The Future of Authentication - Suvin Kodituwakku, Sahan Dissanayaka

50 views

2 years ago

DEFCONConference
Marina Simakov - Relaying Credentials has Never Been Easier - DEF CON 27 Conference

If it weren't bad enough already, we will present several new ways to abuse this infamous authentication protocol, including a new ...

44:26
Marina Simakov - Relaying Credentials has Never Been Easier - DEF CON 27 Conference

2,195 views

6 years ago

PaceIT Online
PACE-IT: Security + 5.1 - Summary of Authentication Services

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:44
PACE-IT: Security + 5.1 - Summary of Authentication Services

589 views

10 years ago

NPTEL IIT Bombay
Week 4 : Lecture 24 : Authentication: Part 5

Lecture 24 : Authentication: Part 5.

18:10
Week 4 : Lecture 24 : Authentication: Part 5

239 views

11 months ago

FOSS4G
FOSS4GE 2024 | Mastering Security with GeoServer, GeoFence, and OpenID

The authentication part will cover the various supported authentication protocols (e.g. basic/digest authentication, CAS, OAuth2) ...

23:40
FOSS4GE 2024 | Mastering Security with GeoServer, GeoFence, and OpenID

281 views

1 year ago

DEFCONConference
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos

... distance outlines a new and innovative post-exploitation technique to proxy common authentication protocols used in Windows ...

45:02
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos

3,962 views

2 years ago

secappdev.org
Entity Authentication and Symmetric Key Establishment - Bart Preneel

Learning objectives Gain insight into + entity authentication protocols, + the benefits and limitations of authentication factors, + key ...

1:35:00
Entity Authentication and Symmetric Key Establishment - Bart Preneel

2,563 views

11 years ago

media.ccc.de
On the Security and Privacy of Modern Single Sign-On in the Web (33c3)

Mozilla tried to create an authentication protocol that aimed to prevent tracking: BrowserID (a.k.a. Persona). Did their proposition ...

1:04:05
On the Security and Privacy of Modern Single Sign-On in the Web (33c3)

1,004 views

9 years ago

Cisco DevNet
Coding Class - Intro to API Authentication Types Oauth, token HTTP Basic repeated session

A classroom session from the DevNet Zone at Cisco Live Berlin 2017. In this session you'll be introduced to API Authentication ...

42:30
Coding Class - Intro to API Authentication Types Oauth, token HTTP Basic repeated session

419 views

8 years ago

Lawrence Systems
How TOTP  (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

Amazon Affiliate Store ➡️ https://www.amazon.com/shop/lawrencesystemspcpickup Gear we used on Kit (affiliate Links) ...

10:12
How TOTP (Time-based One-time Password Algorithm) Works for 2 Factor Authentication

74,262 views

8 years ago

IACR
Quantum authentication with key recycling

Paper by Christopher Portmann presented at Eurocrypt 2017. See https://iacr.org/cryptodb/data/paper.php?pubkey=28040.

23:21
Quantum authentication with key recycling

142 views

8 years ago

Roel Van de Paar
How can I find out which authentication protocols a WiFinetwork uses?

How can I find out which authentication protocols a WiFinetwork uses? Helpful? Please support me on Patreon: ...

2:10
How can I find out which authentication protocols a WiFinetwork uses?

0 views

4 years ago

The Linux Foundation
Leveraging Cloud Security Protocols as OpenID connect to Secure Vehicle Data Exchanges  - José Bollo

Leveraging Cloud Security Protocols as OpenID connect to Secure Vehicle Data Exchanges - José Bollo.

31:14
Leveraging Cloud Security Protocols as OpenID connect to Secure Vehicle Data Exchanges - José Bollo

29 views

3 years ago

SeamlessAccess
How Federated Authentication Works

An introduction to how Federated Authentication works, as well as Seamless Access and its role in it.

5:53
How Federated Authentication Works

23,240 views

5 years ago