YoVDO

Authentication Protocols Courses

Auth for Encrypted Services with Server Side APT
BSidesLV via YouTube
Building End-to-End Encryption and User Identity for Video Conferencing - Zoom's Approach
USENIX Enigma Conference via YouTube
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols
Association for Computing Machinery (ACM) via YouTube
The Kerberos Key List Attack - The Return of the Read Only Domain Controllers
Ekoparty Security Conference via YouTube
Signing Me onto Your Accounts through Facebook and Google - A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services
IEEE via YouTube
Finding a Needle in an Encrypted Haystack
Black Hat via YouTube
Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0
Black Hat via YouTube
Beyond the MCSE - Active Directory for the Security Professional
Black Hat via YouTube
Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring
Black Hat via YouTube
Economics, Physics, Psychology & Relation to Technical Aspects of Counter Intelligence
Black Hat via YouTube
< Prev Page 2 Next >