ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,177,479 results

Practical Networking
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

In this video we explore the concepts of MACs. We first explore why Hashing alone is not enough, which leads us into the ...

6:52
MAC / HMAC - Message Authentication Code / Hash Bashed Message Authentication Codes

37,949 views

1 year ago

Microsoft Azure
Authentication fundamentals: The basics | Microsoft Entra ID

In this video, Microsoft Entra ID Program Manager Stuart Kwan explains the basic concepts and fundamental workings of ...

4:33
Authentication fundamentals: The basics | Microsoft Entra ID

271,163 views

6 years ago

Azure App Modernization
How to Setup Authentication for Azure Functions

This video describes two ways you can setup authentication in Azure Functions: Key (token) based auth and Azure AD Integrated.

20:44
How to Setup Authentication for Azure Functions

44,395 views

3 years ago

Abhishek Sharma
Authentication functions and 3 ways to produce authentication | Message authentication

Hello friends! Welcome to my channel. My name is Abhishek Sharma. #abhics789 If you learned something new do like and share ...

11:49
Authentication functions and 3 ways to produce authentication | Message authentication

276,104 views

6 years ago

SoftsWeb
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

Confused about API authentication? In this video, we break down OAuth, JWT, and API Keys, explaining when and why to use ...

9:42
API Authentication EXPLAINED! 🔐 OAuth vs JWT vs API Keys 🚀

364,979 views

1 year ago

Trouble- Free
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

Abroad Education Channel : https://www.youtube.com/channel/UC9sgREj-cfZipx65BLiHGmw Company Specific HR Mock ...

6:12
#33 Message Authentication & Authentication Functions in Cryptography |CNS|

210,442 views

4 years ago

IEEE SecDev
For developing Physical Unclonable Functions for Device Authentication

Award acceptance speech by Srinivas Devadas (MIT).

15:19
For developing Physical Unclonable Functions for Device Authentication

850 views

4 years ago

JayPMedia
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

This is one of the many videos in the mini-series of HTTPS ...

6:09
HMAC & Message Authentication Codes (MACs) - Why Hashing alone is NOT ENOUGH for data integrity

9,905 views

2 years ago

Cybersecurity at St. Cloud State University
16. Message Authentication Code MAC

Message authentication code or mac is a short piece of information used to authenticate the origin and nature of the message it is ...

1:21
16. Message Authentication Code MAC

29,857 views

3 years ago

T V Nagaraju Technical
TYPES OF AUTHENTICATION  || MESSAGE ENCRYPTION || MESSAGE AUTHENTICATION CODE || HASH FUNCTIONS

In this video we discussed Authentication Requirement, Authentication function and types of authentication. Authentication means ...

30:26
TYPES OF AUTHENTICATION || MESSAGE ENCRYPTION || MESSAGE AUTHENTICATION CODE || HASH FUNCTIONS

38,794 views

6 years ago

Sundeep Saradhi Kanthety
13-Message Authentication in Cryptography 🔐 | MAC vs Hash Functions vs Encryption

Three types of Authentications 1. Message Encryption 2. Message Authentication Code 3. Hash Functions.

40:57
13-Message Authentication in Cryptography 🔐 | MAC vs Hash Functions vs Encryption

240,372 views

8 years ago

Cosden Solutions
Authentication Flow in Next.js (Complete Tutorial)

Cosden Code → https://cosdencode.com Import React (Newsletter) → https://cosden.solutions/newsletter?s=ytd-afnj Source ...

30:37
Authentication Flow in Next.js (Complete Tutorial)

100,101 views

1 year ago

The Computer Science Engineer
Types of Authentication - Message Encryption, MAC, Hash Functions

Authentication is a critical aspect of information security, and various methods are employed to verify the identity of users, systems, ...

13:39
Types of Authentication - Message Encryption, MAC, Hash Functions

749 views

2 years ago

Coding Droplets
Blazor Authentication Tutorial - How to Authorize in Blazor [Blazor Tutorial]

Get Source Code by Supporting on Patreon: https://patreon.com/CodingDroplets Blazor Tutorial Series Playlist link: ...

14:25
Blazor Authentication Tutorial - How to Authorize in Blazor [Blazor Tutorial]

83,736 views

2 years ago

Web Dev Simplified
Build Node.js User Authentication - Password Login

In this video we are going to build a secure Node.js user authentication system. I will be covering all of the security concerns that ...

13:31
Build Node.js User Authentication - Password Login

572,005 views

6 years ago

DevCode
Build a Complete PHP Multi-Role Authentication System | Step-by-Step Tutorial

In this tutorial, we'll build a PHP Multi-Role Authentication System with Admin and User dashboards — using PHP, MySQL, and ...

27:17
Build a Complete PHP Multi-Role Authentication System | Step-by-Step Tutorial

1,456 views

3 months ago

Cosden Solutions
Role-Based Authentication in React (Complete Tutorial)

Project React → https://cosden.solutions/project-react Import React (Newsletter) ...

26:31
Role-Based Authentication in React (Complete Tutorial)

74,264 views

1 year ago

RMDCSE
Authentication requirement & Function |CNS| Mrs. S. Logesswari, Assistant Professor, CSE, RMDEC

This video explains the concept of the Authentication requirement & Function in Cryptography Network Security.

8:20
Authentication requirement & Function |CNS| Mrs. S. Logesswari, Assistant Professor, CSE, RMDEC

258 views

3 years ago

vlogize
Azure Functions Authentication with ASP.NET Identity and JWT Token

Disclaimer/Disclosure: Some of the content was synthetically produced using various Generative AI (artificial intelligence) tools; so ...

3:35
Azure Functions Authentication with ASP.NET Identity and JWT Token

381 views

1 year ago

Ekeeda
Authentication Functions | Cryptography and Network Security

Unlock the secrets of secure communication with our latest video on Authentication Functions in Cryptography and Network ...

12:54
Authentication Functions | Cryptography and Network Security

1,008 views

2 years ago