ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

124 results

NPTEL IIT Bombay
Week 4 : Lecture 20 : Authentication: Part 1

Lecture 20 : Authentication: Part 1.

31:19
Week 4 : Lecture 20 : Authentication: Part 1

512 views

11 months ago

NPTEL IIT Bombay
Week 4 : Lecture 23 : Authentication: Part 4

Lecture 23 : Authentication: Part 4.

30:13
Week 4 : Lecture 23 : Authentication: Part 4

331 views

11 months ago

iter
How HOTP and TOTP work

TOTP and HOTP are algorithms for generating 2-factor authentication codes. Let's take a look at how these work, starting with the ...

4:20
How HOTP and TOTP work

29,958 views

5 years ago

Chrome for Developers
Understand passkeys in 4 minutes

Are you still using passwords? Passkeys are a new authentication technology that enables creating online accounts and signing ...

3:49
Understand passkeys in 4 minutes

712,500 views

2 years ago

Lisk
What are Digital Signatures and How Do They Work?

What is a Digital Signature? In this animation, we will explain how digital signatures work using cryptography. In some ways ...

2:52
What are Digital Signatures and How Do They Work?

826,353 views

7 years ago

PaceIT Online
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 2)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:44
PACE-IT: Security + 6.1 - Introduction to Cryptography (part 2)

234 views

10 years ago

Chrome for Developers
SMS OTP form best practices

SMS OTP is widely used for phone number verification, 2 step verification, account recovery, and payment verification. However ...

8:25
SMS OTP form best practices

34,447 views

5 years ago

NPTEL IIT Bombay
Week 3 : Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4

Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4.

27:53
Week 3 : Lecture 19 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 4

315 views

11 months ago

wikipedia tts
ISO/IEC 9797-1 | Wikipedia audio article

SUMMARY ======= ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes (MACs) ...

11:11
ISO/IEC 9797-1 | Wikipedia audio article

24 views

7 years ago

Max Campbell
Creating a messaging platform in 10 weeks - LoRaCrypt - CSE481S

This project was created as part of the University of Washington CSE 481S: Computer Security Capstone. We created a set of ...

20:14
Creating a messaging platform in 10 weeks - LoRaCrypt - CSE481S

178 views

3 years ago

NPTEL IIT Bombay
Week 3 : Lecture 16 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1

Lecture 16 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1.

26:55
Week 3 : Lecture 16 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 1

469 views

11 months ago

PaceIT Online
PACE-IT: Security + 5.2 - Authentication and Authorization Basics (part 2)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

9:37
PACE-IT: Security + 5.2 - Authentication and Authorization Basics (part 2)

188 views

10 years ago

NPTEL IIT Bombay
Week 3 : Lecture 18 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 3

Lecture 18 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 3.

22:18
Week 3 : Lecture 18 : Message Integrity, Cryptographic Hash Functions and Digital Signatures: Part 3

281 views

11 months ago

wikipedia tts
ISO/IEC 9797-1 | Wikipedia audio article

Socrates SUMMARY ======= ISO/IEC 9797-1 Information technology – Security techniques – Message Authentication Codes ...

10:34
ISO/IEC 9797-1 | Wikipedia audio article

11 views

7 years ago

cs615asa
CS615 System Administration, Week 11, Segment 4 - System Security IV: Crypto means Cryptography

In this video, we discuss the three areas cryptography can provide threat mitigations in -- confidentiality, integrity, and authenticity ...

19:31
CS615 System Administration, Week 11, Segment 4 - System Security IV: Crypto means Cryptography

677 views

4 years ago

Computing for All
Cyber security techniques   II

By: Ms. Shahina Anwaru.

59:23
Cyber security techniques II

429 views

6 years ago

Social RTCL TV
Blockchain-based anonymous authentication for traffic reporting in VANETs | RTCL.TV

Keywords ### #vanets #intelligenttransportationsystem #certificatelessanonymousauthentication #aggregationverification ...

0:23
Blockchain-based anonymous authentication for traffic reporting in VANETs | RTCL.TV

28 views

2 years ago

SophosGlobalHub
Sophos Central - Enroll and use authenticators

Sophos Central: Enroll and use authenticators A step-by-step tutorial showing you how to enroll and use authenticators for ...

6:25
Sophos Central - Enroll and use authenticators

11 views

2 months ago

LP Programming
Github 2FA without a phone

Need to set up 2FA on github or discord but don't have a phone to use? There is a solution that is less invasive than *another* ...

0:52
Github 2FA without a phone

23,966 views

2 years ago

Wisc-Online
CRC - Cyclic Redundancy Check

Learn what the CRC is, the technology behind it, and how it's performed.

6:05
CRC - Cyclic Redundancy Check

145,359 views

9 years ago

PaceIT Online
PACE-IT: Security + 6.2 - Cryptographic Methods (part 1)

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

6:28
PACE-IT: Security + 6.2 - Cryptographic Methods (part 1)

234 views

10 years ago

Social RTCL TV
Mapping Bit to Symbol Unpredictability with Application to Galileo Open Service Navig... | RTCL.TV

... Symbol Unpredictability with Application to Galileo Open Service Navigation Message Authentication Authors: Cillian O'Driscoll ...

0:27
Mapping Bit to Symbol Unpredictability with Application to Galileo Open Service Navig... | RTCL.TV

50 views

1 year ago

wikipedia tts
NaCl (software) | Wikipedia audio article

This is an audio version of the Wikipedia Article: https://en.wikipedia.org/wiki/NaCl_(software) 00:01:02 1 Basic functions 00:01:13 ...

4:30
NaCl (software) | Wikipedia audio article

37 views

6 years ago

Norton Customer Service Phone Number
Norton QR Code Authenticator Not Working. How To Reset & Reenable. Step By Step Guide:

Norton QR Code Authenticator Not Working. How To Reset & Reenable. Step By Step Guide: Resolving issues when using the ...

2:56
Norton QR Code Authenticator Not Working. How To Reset & Reenable. Step By Step Guide:

18 views

3 weeks ago

Cyber Skills
TWO FACTOR AUTHENTICATION EXPLAINED! 2019

I'm Richard, a CISSP certified information security professional with over 15 years IT experience. This is an overview of two factor ...

12:56
TWO FACTOR AUTHENTICATION EXPLAINED! 2019

157 views

6 years ago