ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

2,054,051 results

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough, which leads us into the ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

38,110 views

1 year ago

Microsoft Azure
Authentication fundamentals: The basics | Microsoft Entra ID

In this video, Microsoft Entra ID Program Manager Stuart Kwan explains the basic concepts and fundamental workings of ...

4:33
Authentication fundamentals: The basics | Microsoft Entra ID

271,701 views

6 years ago

Azure App Modernization
How to Setup Authentication for Azure Functions

This video describes two ways you can setup authentication in Azure Functions: Key (token) based auth and Azure AD Integrated.

20:44
How to Setup Authentication for Azure Functions

44,422 views

3 years ago

Abhishek Sharma
Authentication functions and 3 ways to produce authentication | Message authentication

Hello friends! Welcome to my channel. My name is Abhishek Sharma. #abhics789 If you learned something new do like and share ...

11:49
Authentication functions and 3 ways to produce authentication | Message authentication

276,208 views

6 years ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

This is one of the many videos in the mini-series of HTTPS ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

9,981 views

2 years ago

Trouble- Free
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

6:12
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

210,524 views

4 years ago

Cybersecurity at St. Cloud State University
16. Message Authentication Code MAC

Message authentication code or mac is a short piece of information used to authenticate the origin and nature of the message it is ...

1:21
16. Message Authentication Code MAC

29,873 views

3 years ago

IEEE SecDev
For developing Physical Unclonable Functions for Device Authentication

Award acceptance speech by Srinivas Devadas (MIT).

15:19
For developing Physical Unclonable Functions for Device Authentication

853 views

4 years ago

T V Nagaraju Technical
TYPES OF AUTHENTICATION  || MESSAGE ENCRYPTION || MESSAGE AUTHENTICATION CODE || HASH FUNCTIONS

In this video we discussed Authentication Requirement, Authentication function and types of authentication. Authentication means ...

30:26
TYPES OF AUTHENTICATION || MESSAGE ENCRYPTION || MESSAGE AUTHENTICATION CODE || HASH FUNCTIONS

38,816 views

6 years ago

SoftsWeb
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

Confused about API authentication? In this video, we break down OAuth, JWT, and API Keys, explaining when and why to use ...

9:42
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

369,652 views

1 year ago

Cosden Solutions
Authentication Flow in Next.js (Complete Tutorial)

Cosden Code → https://cosdencode.com Import React (Newsletter) → https://cosden.solutions/newsletter?s=ytd-afnj Source ...

30:37
Authentication Flow in Next.js (Complete Tutorial)

100,279 views

1 year ago

Sundeep Saradhi Kanthety
13-Message Authentication in Cryptography 🔐 | MAC vs Hash Functions vs Encryption

Three types of Authentications 1. Message Encryption 2. Message Authentication Code 3. Hash Functions.

40:57
13-Message Authentication in Cryptography 🔐 | MAC vs Hash Functions vs Encryption

240,494 views

8 years ago

Cosden Solutions
Role-Based Authentication in React (Complete Tutorial)

Project React → https://cosden.solutions/project-react Import React (Newsletter) ...

26:31
Role-Based Authentication in React (Complete Tutorial)

74,374 views

1 year ago

SPS Tech | Learn Java | Crack Interviews
Authentication & Authorisation in Microservices Short

Detailed Video:- https://youtu.be/tS4tc9qgWbA Your queries:- Authentication & Authorisation in Microservices authentication and ...

0:16
Authentication & Authorisation in Microservices Short

145,778 views

3 years ago

Web Dev Simplified
Build Node.js User Authentication - Password Login

In this video we are going to build a secure Node.js user authentication system. I will be covering all of the security concerns that ...

13:31
Build Node.js User Authentication - Password Login

572,279 views

6 years ago

The Computer Science Engineer
Types of Authentication - Message Encryption, MAC, Hash Functions

Authentication is a critical aspect of information security, and various methods are employed to verify the identity of users, systems, ...

13:39
Types of Authentication - Message Encryption, MAC, Hash Functions

753 views

2 years ago

DevCode
Build a Complete PHP Multi-Role Authentication System | Step-by-Step Tutorial

In this tutorial, we'll build a PHP Multi-Role Authentication System with Admin and User dashboards — using PHP, MySQL, and ...

27:17
Build a Complete PHP Multi-Role Authentication System | Step-by-Step Tutorial

1,478 views

3 months ago

A Binary Code
Authentication vs Authorization

In this video we look at the differences between authentication and authorization. #authentication #authorization #security Please ...

1:00
Authentication vs Authorization

112,067 views

2 years ago

Introduction to Cryptography by Christof Paar
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com.

1:15:07
Lecture 25: MAC (Message Authentication Codes) and HMAC by Christof Paar

64,829 views

12 years ago

RMDCSE
Authentication requirement & Function |CNS| Mrs. S. Logesswari, Assistant Professor, CSE, RMDEC

This video explains the concept of the Authentication requirement & Function in Cryptography Network Security.

8:20
Authentication requirement & Function |CNS| Mrs. S. Logesswari, Assistant Professor, CSE, RMDEC

258 views

3 years ago