Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
124 results
Lecture 20 : Authentication: Part 1.
512 views
11 months ago
Lecture 23 : Authentication: Part 4.
331 views
TOTP and HOTP are algorithms for generating 2-factor authentication codes. Let's take a look at how these work, starting with the ...
29,958 views
5 years ago
Are you still using passwords? Passkeys are a new authentication technology that enables creating online accounts and signing ...
712,500 views
2 years ago
What is a Digital Signature? In this animation, we will explain how digital signatures work using cryptography. In some ways ...
826,353 views
7 years ago
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...
234 views
10 years ago
SMS OTP is widely used for phone number verification, 2 step verification, account recovery, and payment verification. However ...
34,447 views
Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4.
315 views
SUMMARY ======= ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes (MACs) ...
24 views
This project was created as part of the University of Washington CSE 481S: Computer Security Capstone. We created a set of ...
178 views
3 years ago
Lecture 16 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1.
469 views
188 views
Lecture 18 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 3.
281 views
Socrates SUMMARY ======= ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes ...
11 views
In this video, we discuss the three areas cryptography can provide threat mitigations in -- confidentiality, integrity, and authenticity ...
677 views
4 years ago
By: Ms. Shahina Anwaru.
429 views
6 years ago
Keywords ### #vanets #intelligenttransportationsystem #certificatelessanonymousauthentication #aggregationverification ...
28 views
Sophos Central: Enroll and use authenticators A step-by-step tutorial showing you how to enroll and use authenticators for ...
2 months ago
Need to set up 2FA on github or discord but don't have a phone to use? There is a solution that is less invasive than *another* ...
23,966 views
Learn what the CRC is, the technology behind it, and how it's performed.
145,359 views
9 years ago
... Symbol Unpredictability with Application to Galileo Open Service Navigation Message Authentication Authors: Cillian O'Driscoll ...
50 views
1 year ago
This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/NaCl_(software) 00:01:02 1 Basic functions 00:01:13 ...
37 views
Norton QR Code Authenticator Not Working. How To Reset & Reenable. Step By Step Guide: Resolving issues when using the ...
18 views
3 weeks ago
I'm Richard, a CISSP certified information security professional with over 15 years IT experience. This is an overview of two factor ...
157 views