ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

760 results

Computerphile
Man in the Middle & Needham–Schroeder Protocol - Computerphile

There's a reason Needham–Schroeder isn't used any more - Tim Muller demonstrates the weakness in the technique.

24:32
Man in the Middle & Needham–Schroeder Protocol - Computerphile

73,401 views

4 years ago

Pu Wei Jian
Needham-Schroeder Protocol

Some explanation about how Needham-Schroeder Protocol works. Tools used - Microsoft Power Point 2013 Reference from ...

5:22
Needham-Schroeder Protocol

44,347 views

10 years ago

utexascnsquest
Foundations of Computer Security 60

The Needham-Schroeder Protocol.

8:37
Foundations of Computer Security 60

1,706 views

4 years ago

WorthWatching
Needham and Schroeder Protocol

Introduction to Needham and Schroeder Protocol and its Explanation. Download Notes: ...

13:22
Needham and Schroeder Protocol

33,659 views

5 years ago

WorthWatching
Needham and Schroeder Protocol (English Version)

Introduction to Needham and Schroeder Protocol and its Explanation. Download Notes: https://drive.google.com/open?id=1eeK.

12:12
Needham and Schroeder Protocol (English Version)

1,753 views

1 year ago

In Finite Tutorials
Needham Schroeder Protocol - Kay Suet Yee

An Unique Channel for the Technology & Education.

7:06
Needham Schroeder Protocol - Kay Suet Yee

12,231 views

7 years ago

People also watched

Neurash
Beyond Residual Connections: How DeepSeek's mHC & Sinkhorn-Knopp Fix LLM Architecture

In this video, we break down Manifold-Constrained Hyper-Connections (mHC), a new architectural approach by DeepSeek-AI that ...

7:30
Beyond Residual Connections: How DeepSeek's mHC & Sinkhorn-Knopp Fix LLM Architecture

34 views

5 days ago

The Coding Gopher
99% of Developers Don't Get Semaphores

Check out Graphite: https://graphitedev.link/gopher ❤️ Get 40% OFF CodeCrafters: ...

11:25
99% of Developers Don't Get Semaphores

25,780 views

3 weeks ago

NDC Conferences
Distributed Async Await • A new programming model for the cloud - Dominik Tornow - NDC Oslo 2024

This talk was recorded at NDC Oslo in Oslo, Norway. #ndcoslo #ndcconferences #developer #softwaredeveloper Attend the next ...

47:26
Distributed Async Await • A new programming model for the cloud - Dominik Tornow - NDC Oslo 2024

2,269 views

1 year ago

DevOps Toolbox
Stop Relying on HTTP. Use This Instead.

Hostinger is on sale: KVM2 plan is now **61% OFF**! Get an additional 10% off using the coupon code DEVOPSTOOLBOX at ...

13:41
Stop Relying on HTTP. Use This Instead.

10,559 views

6 days ago

ByteByteGo
Top 7 Most-Used Distributed System Patterns

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter.: https://blog.bytebytego.com Animation ...

6:14
Top 7 Most-Used Distributed System Patterns

330,392 views

2 years ago

Nick Chapsas
"You're Doing Validation Wrong in .NET" | Code Cop #023

Check out my courses: https://dometrain.com Subscribe to my weekly newsletter: https://nickchapsas.com Become a Patreon and ...

14:44
"You're Doing Validation Wrong in .NET" | Code Cop #023

51,754 views

1 year ago

NDC Conferences
Modern Observability and Event Driven Architectures - Martin Thwaites & Ian Cooper - NDC London 2025

This talk was recorded at NDC London in London, England. #ndclondon #ndcconferences #developer #softwaredeveloper Attend ...

1:04:49
Modern Observability and Event Driven Architectures - Martin Thwaites & Ian Cooper - NDC London 2025

10,555 views

9 months ago

The Coding Gopher
Hashing Explained (SHA-256, MD5)

Check out Clerk: https://go.clerk.com/X1kC4pR ❤️ Get 40% OFF CodeCrafters: ...

11:27
Hashing Explained (SHA-256, MD5)

24,074 views

2 months ago

ADC - Audio Developer Conference
Wait-Free Thread Synchronisation With the SeqLock - Timur Doumler - ADC 2024

https://audio.dev/ -- @audiodevcon​ --- Wait-Free Thread Synchronisation With the SeqLock - Timur Doumler - ADC 2024 ...

40:19
Wait-Free Thread Synchronisation With the SeqLock - Timur Doumler - ADC 2024

1,021 views

5 months ago

The Coding Gopher
OIDC vs. SAML Explained

Check out Clerk: https://go.clerk.com/WpyJNZI ❤️ Get 40% OFF CodeCrafters: ...

14:18
OIDC vs. SAML Explained

12,162 views

2 months ago

sakib syful
Needham–Schroeder protocol
2:21
Needham–Schroeder protocol

591 views

6 years ago

ganesh kumar
Needham–Schroeder Protocol
2:39
Needham–Schroeder Protocol

26 views

3 weeks ago

Ekeeda
Needham Schroeder Algorithm

Subscribe to Ekeeda Channel to access more videos https://www.youtube.com/c/Ekeeda?sub_confirmation=1 Visit Website: ...

13:31
Needham Schroeder Algorithm

4,150 views

2 years ago

utexascnsquest
Foundations of Computer Security 61

Attacks on Needham-Schroeder.

5:15
Foundations of Computer Security 61

1,351 views

4 years ago

utexascnsquest
Foundations of Computer Security 62

The Otway-Rees Protocol.

7:28
Foundations of Computer Security 62

1,648 views

4 years ago

Network Security Wallah
Needham Schroeder Protocol for generation of Session Keys

lecture by:- Dr. Rajneesh Kumar Gujral.

8:45
Needham Schroeder Protocol for generation of Session Keys

3,646 views

4 years ago

Darlin Amador
Explicación del protocolo de Needham Schroeder
6:54
Explicación del protocolo de Needham Schroeder

662 views

5 years ago

D3
Authentifizierung mittels Needham Schroeder Protocol

In diesem Video stelle ich euch das Needham- Schroeder Protocol und seine funktionsweise vor. Wenn euch das Video gefallen ...

7:09
Authentifizierung mittels Needham Schroeder Protocol

1,509 views

3 years ago

utexascnsquest
Foundations of Computer Security 65

The BAN Logic: Needham-Schroeder.

6:33
Foundations of Computer Security 65

1,731 views

4 years ago

Chirag Bhalodia
Remote User Authentication Using Symmetric Encryption | Needham Shcroeder Protocol

Remote User Authentication Using Symmetric Encryption | Needham Shcroeder Protocol Follow my blog: ...

20:53
Remote User Authentication Using Symmetric Encryption | Needham Shcroeder Protocol

34,823 views

5 years ago

Bharati Kale
Cryptography And Network Security :- needham schroeder protocol -Introduction
3:13
Cryptography And Network Security :- needham schroeder protocol -Introduction

3,297 views

5 years ago

Thunder Bird
Needham Schroeder Public key protocol

Ban Model.

11:58
Needham Schroeder Public key protocol

657 views

6 years ago

motekar@knowledgehub
Needham Schroeder authentication protocol

Needham Schroeder authentication protocol, Cryptography and network security, authentication protocols, Encryption and ...

13:19
Needham Schroeder authentication protocol

5,305 views

5 years ago

Peter Schneider
Security: In practice, what are the identities in the Needham–Schroeder protocol?

In practice, what are the identities in the Needham–Schroeder protocol? I hope you found a solution that worked for you :) The ...

3:31
Security: In practice, what are the identities in the Needham–Schroeder protocol?

11 views

1 year ago