Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
571 results
Azure Functions Interview Questions & Answers | Azure Serverless | ZoomInData In this video, we cover the most important Azure ...
9 views
2 weeks ago
This lecture talks about Message Authentication Code ( MAC ) in the subject Cryptography & System Security in Hindi. This lecture ...
1,014 views
4 weeks ago
Hash Function vs MAC Explained Simply | Data Security Basics with Real-Life Examples In this video, we explain Hash Functions ...
19 views
10 days ago
A hash function can detect changes in data, but it cannot prove who sent the message. This is where Message Authentication ...
0 views
2 days ago
In a previous role as the tech lead of a team building a digital identity solution, Eric often saw developers using cryptography ...
84 views
Big thank you to DeleteMe for sponsoring this video. Use my link http://joindeleteme.com/Bombal to receive a 20% discount or use ...
220,668 views
Answers to questions regarding Verification, KD coins, function activation and recharge #keydiy#
31 views
3 weeks ago
Full Stack Java Developer Program (Discount Code - YTBE15) ...
2,064 views
In this comprehensive video, we delve into the intricacies of PBKDF2 (Password-Based Key Derivation Function 2) and its ...
This video provides an expert-level explanation of the 5G Registration Procedure, including NAS packet structure, authentication ...
50 views
Hashing ensures that data remains unchanged during storage or transmission—a core requirement for integrity. In this episode ...
3 views
Modern digital security relies on two distinct but complementary processes known as authentication and authorization.
13 days ago
Wednesday, January 21st, 2026 | 8:00AM – 9:00AM (PT, Redmond Time webinar recording date) Microsoft Entra | Microsoft Agent ...
1,012 views
Remote PUF (Physical Unclonable Function) authentication provides a lightweight, hardware-rooted security solution for IoT ...
0:00 Lecture 11: Hashing and Data Integrity 0:14 Introduction 1:21 Part 1: Cryptographic Hash Function Fundamentals / What is a ...
Speaker: Amey Shukla, University of Connecticut Host: Melissa Chase Despite decades of effort, a chasm existed between the ...
367 views
Learn the history and inner workings of password security, how hackers steal passwords, and what you can do about it.
71 views
How does two-factor authentication actually work, and why is it so effective at protecting accounts? In this video, we explain how ...
10 views
Learn to protect your FastAPI routes using JWT tokens! Implement authentication middleware and secure your API endpoints.
525 views
1 month ago
How Passwords Actually Work (Explained Simply) Ever wondered how passwords actually work behind the scenes? In this video ...