Authentication Protocols Courses
BSidesLV via YouTube Building End-to-End Encryption and User Identity for Video Conferencing - Zoom's Approach
USENIX Enigma Conference via YouTube On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols
Association for Computing Machinery (ACM) via YouTube The Kerberos Key List Attack - The Return of the Read Only Domain Controllers
Ekoparty Security Conference via YouTube Signing Me onto Your Accounts through Facebook and Google - A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services
IEEE via YouTube Finding a Needle in an Encrypted Haystack
Black Hat via YouTube Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0
Black Hat via YouTube Beyond the MCSE - Active Directory for the Security Professional
Black Hat via YouTube Watching the Watchdog - Protecting Kerberos Authentication With Network Monitoring
Black Hat via YouTube Economics, Physics, Psychology & Relation to Technical Aspects of Counter Intelligence
Black Hat via YouTube