ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

3,269 results

Luke Briner
Understanding Authentication and Authorisation Protocols

Some background, basic details and comparison of SAML/Shibboleth, OpenID, OAuth2 and OpenID Connect to give an idea of ...

35:57
Understanding Authentication and Authorisation Protocols

11,160 views

9 years ago

FOSS4G
FOSS4GE 2024 | Mastering Security with GeoServer, GeoFence, and OpenID

The authentication part will cover the various supported authentication protocols (e.g. basic/digest authentication, CAS, OAuth2) ...

23:40
FOSS4GE 2024 | Mastering Security with GeoServer, GeoFence, and OpenID

281 views

1 year ago

LernenInVerschiedenenFormen
Challenge Response Authentication Method (and its problem)

Created with SimpleScreenRecorder, Audacity, Xournal.

5:36
Challenge Response Authentication Method (and its problem)

16,139 views

5 years ago

FOSSASIA
Unlocking the Power of FIDO2  The Future of Authentication - Suvin Kodituwakku, Sahan Dissanayaka

The Fido2 is a protocol that uses public key cryptography and biometric authentication to improve security and user experience.

12:14
Unlocking the Power of FIDO2 The Future of Authentication - Suvin Kodituwakku, Sahan Dissanayaka

50 views

2 years ago

IACR
Message Authentication, Revisited.

Talk at eurocrypt 2012. Authors: Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs.

21:10
Message Authentication, Revisited.

374 views

13 years ago

Daniel Bosk
Principles for secure protocols
24:09
Principles for secure protocols

123 views

5 years ago

DEFCONConference
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos

... distance outlines a new and innovative post-exploitation technique to proxy common authentication protocols used in Windows ...

45:02
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos

3,962 views

2 years ago

Roel Van de Paar
How can I find out which authentication protocols a WiFinetwork uses?

How can I find out which authentication protocols a WiFinetwork uses? Helpful? Please support me on Patreon: ...

2:10
How can I find out which authentication protocols a WiFinetwork uses?

0 views

4 years ago

NorthSec
NSEC2021 - Evelyn Lam - Authentication challenges in SaaS integration and Cloud transformation

... by adopting the industry-standard authentication protocols and moving away from homegrown authentication methodologies.

29:28
NSEC2021 - Evelyn Lam - Authentication challenges in SaaS integration and Cloud transformation

177 views

3 years ago

UCIBrenICS
Device Enhanced Authentication: Passwords and Second Factors

Maliheh Shirvanian Visa Research October 12, 2018 11:00am - 12:00pm Donald Bren Hall 6011 "Device Enhanced ...

56:04
Device Enhanced Authentication: Passwords and Second Factors

151 views

7 years ago

EFF-Austin
OAuth: The Most Widely Used Online Authorization Protocol

EFF-Austin is sustained via the contributions of supporters like you. Donate via the Paypal link on our website at the top of the ...

1:17:14
OAuth: The Most Widely Used Online Authorization Protocol

31 views

1 year ago

PaceIT Online
PACE-IT: Security + 5.1 - Summary of Authentication Services

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:44
PACE-IT: Security + 5.1 - Summary of Authentication Services

589 views

10 years ago

Open Research Institute Inc.
User Authentication for Amateur Satellites

Ham Expo presentation from September 2022 by Paul Williamson, KB5MU Satellite communications systems are subject to a ...

36:40
User Authentication for Amateur Satellites

103 views

3 years ago

Vu Hung Nguyen (Hưng)
23 Internet Authentication

Network administrators and engineers looking to deepen their understanding of authentication protocols. • IT professionals ...

7:14
23 Internet Authentication

21 views

3 months ago

Rob Slade
CISSP 8 32 remote authentication protocols 20240326 172643

CISSP 8.32 remote authentication protocols #cissp #isc2 #infosec #security #cissptraining #research #securitymanagement ...

11:07
CISSP 8 32 remote authentication protocols 20240326 172643

26 views

1 year ago

The Linux Foundation
Leveraging Cloud Security Protocols as OpenID connect to Secure Vehicle Data Exchanges  - José Bollo

Leveraging Cloud Security Protocols as OpenID connect to Secure Vehicle Data Exchanges - José Bollo.

31:14
Leveraging Cloud Security Protocols as OpenID connect to Secure Vehicle Data Exchanges - José Bollo

29 views

3 years ago

OWASP Foundation
Securing an API Ecosystem with OAuth 2 0 - Philippe De Ryck

Managed by the OWASP® Foundation https://owasp.org/

56:04
Securing an API Ecosystem with OAuth 2 0 - Philippe De Ryck

295 views

3 years ago

secappdev.org
Entity Authentication and Symmetric Key Establishment - Bart Preneel

Learning objectives Gain insight into + entity authentication protocols, + the benefits and limitations of authentication factors, + key ...

1:35:00
Entity Authentication and Symmetric Key Establishment - Bart Preneel

2,563 views

11 years ago

Tom Olzak
Communications and Network Security Part 20 – Communication Channel and Authentication Protocols

Review the Table of Contents below. In this lesson, we look secure communication channels and authentication protocols.

7:59
Communications and Network Security Part 20 – Communication Channel and Authentication Protocols

1,216 views

3 years ago

RedHatCzech
Simo Sorce - GSSAPI Privilege separation with GSS-Proxy

Slides: http://www.devconf.cz/slides/devconf-2013-gss-proxy.odp GSS-Proxy is a new feature developed in collaboration with the ...

44:31
Simo Sorce - GSSAPI Privilege separation with GSS-Proxy

1,793 views

12 years ago