ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

10,384 results

Luke Briner
Understanding Authentication and Authorisation Protocols

Some background, basic details and comparison of SAML/Shibboleth, OpenID, OAuth2 and OpenID Connect to give an idea of ...

35:57
Understanding Authentication and Authorisation Protocols

11,160 views

9 years ago

OktaDev
"Basic Authentication" in Five Minutes

Learn what "Basic Authentication" is, how it's used, and what the HTTP Request looks like! #Authentication #BasicAuth #HTTP ...

5:07
"Basic Authentication" in Five Minutes

202,006 views

4 years ago

LernenInVerschiedenenFormen
Challenge Response Authentication Method (and its problem)

Created with SimpleScreenRecorder, Audacity, Xournal.

5:36
Challenge Response Authentication Method (and its problem)

16,146 views

5 years ago

UCIBrenICS
Device Enhanced Authentication: Passwords and Second Factors

Maliheh Shirvanian Visa Research October 12, 2018 11:00am - 12:00pm Donald Bren Hall 6011 "Device Enhanced ...

56:04
Device Enhanced Authentication: Passwords and Second Factors

151 views

7 years ago

secappdev.org
Entity Authentication and Symmetric Key Establishment - Bart Preneel

Learning objectives Gain insight into + entity authentication protocols, + the benefits and limitations of authentication factors, + key ...

1:35:00
Entity Authentication and Symmetric Key Establishment - Bart Preneel

2,563 views

11 years ago

FOSSASIA
Unlocking the Power of FIDO2  The Future of Authentication - Suvin Kodituwakku, Sahan Dissanayaka

The Fido2 is a protocol that uses public key cryptography and biometric authentication to improve security and user experience.

12:14
Unlocking the Power of FIDO2 The Future of Authentication - Suvin Kodituwakku, Sahan Dissanayaka

50 views

2 years ago

PaceIT Online
PACE-IT: Security + 5.1 - Summary of Authentication Services

CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for ...

7:44
PACE-IT: Security + 5.1 - Summary of Authentication Services

589 views

10 years ago

OWASP Foundation
Securing an API Ecosystem with OAuth 2 0 - Philippe De Ryck

Managed by the OWASP® Foundation https://owasp.org/

56:04
Securing an API Ecosystem with OAuth 2 0 - Philippe De Ryck

295 views

3 years ago

Roel Van de Paar
Check Primary Authentication Protocol for Active Directory (NTLM or Kerberos?) (2 Solutions!!)

Check Primary Authentication Protocol for Active Directory (NTLM or Kerberos?) Helpful? Please support me on Patreon: ...

2:44
Check Primary Authentication Protocol for Active Directory (NTLM or Kerberos?) (2 Solutions!!)

122 views

4 years ago

RedHatCzech
Simo Sorce - GSSAPI Privilege separation with GSS-Proxy

Slides: http://www.devconf.cz/slides/devconf-2013-gss-proxy.odp GSS-Proxy is a new feature developed in collaboration with the ...

44:31
Simo Sorce - GSSAPI Privilege separation with GSS-Proxy

1,793 views

12 years ago

NPTEL IIT Bombay
Week 4 : Lecture 24 : Authentication: Part 5

Lecture 24 : Authentication: Part 5.

18:10
Week 4 : Lecture 24 : Authentication: Part 5

240 views

11 months ago

U-tube
CEH19-4 Cryptographic protocol

CEH Ethical Hacking Course! Please Subscribe my channel !!!!!

6:51
CEH19-4 Cryptographic protocol

130 views

6 years ago

Roel Van de Paar
How can I find out which authentication protocols a WiFinetwork uses?

How can I find out which authentication protocols a WiFinetwork uses? Helpful? Please support me on Patreon: ...

2:10
How can I find out which authentication protocols a WiFinetwork uses?

0 views

4 years ago

Cisco DevNet
Coding Class - Intro to API Authentication Types Oauth, token HTTP Basic repeated session

A classroom session from the DevNet Zone at Cisco Live Berlin 2017. In this session you'll be introduced to API Authentication ...

42:30
Coding Class - Intro to API Authentication Types Oauth, token HTTP Basic repeated session

419 views

8 years ago

SeamlessAccess
How Federated Authentication Works

An introduction to how Federated Authentication works, as well as Seamless Access and its role in it.

5:53
How Federated Authentication Works

23,243 views

5 years ago

FOSS4G
FOSS4GE 2024 | Mastering Security with GeoServer, GeoFence, and OpenID

The authentication part will cover the various supported authentication protocols (e.g. basic/digest authentication, CAS, OAuth2) ...

23:40
FOSS4GE 2024 | Mastering Security with GeoServer, GeoFence, and OpenID

284 views

1 year ago

DEFCONConference
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos

... distance outlines a new and innovative post-exploitation technique to proxy common authentication protocols used in Windows ...

45:02
DEF CON 31 - Spooky Authentication at a Distance - Tamas Jos

3,963 views

2 years ago

EduSense
3 4 1 User Authentication and AAA Technical Principles

3 4 1 User Authentication and AAA Technical Principles.

27:04
3 4 1 User Authentication and AAA Technical Principles

127 views

2 years ago

IACR
Quantum authentication with key recycling

Paper by Christopher Portmann presented at Eurocrypt 2017. See https://iacr.org/cryptodb/data/paper.php?pubkey=28040.

23:21
Quantum authentication with key recycling

143 views

8 years ago

The Debug Zone
Fix SequelizeConnectionError: Client Does Not Support Authentication Protocol

In this video, we tackle a common issue faced by developers using Sequelize with MySQL: the SequelizeConnectionError related ...

2:18
Fix SequelizeConnectionError: Client Does Not Support Authentication Protocol

10 views

5 months ago