Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
38,429 results
Advances in voice, facial and DNA-recognition technology could create a future without keys, wallets, ID cards or passports.
3,390 views
5 years ago
Due to the well-known vulnerabilities in traditional authentication methods through users, passwords and tokens; biometric ...
7,404 views
3 years ago
JA3 is an open source SSL/TLS client fingerprinting tool developed by John Althouse, Josh Atkins, and Jeff Atkinson. Since it's ...
10,378 views
6 years ago
Biometric Passports, a talk by William Henderson Abstract: In today's increasingly interconnected world, biometric passports play ...
132 views
8 months ago
Experiences with Aadhaar in India, or what possibly could go wrong India has rolled out a 'voluntary' biometric ID card to all of its ...
722 views
Our Biometric Future. http://www.weforum.org/
1,597 views
Streamed 5 years ago
by Dmitriy Kostiuk At: FOSDEM 2020 ...
67 views
Was biometrische Daten sind, ist heute weitläufig bekannt. Vielen Menschen ist bewusst, dass ihre Fingerabdrücke, Gesichter, ...
841 views
2 years ago
Biometric systems such as face recognition, voice-print identification is extensively used for personal identification. In recent years ...
2,781 views
1 year ago
One of the keys to success on the mobile web is providing an easy-to-use but still secure auth solution. The challenge, however, is ...
9,664 views
7 years ago
What do design flaws, implementation errors, 0days etc. look like in physical locks? #PhysicalSecurity #Software Walter Belgers.
3,354 views
Introduction to Biometrics.
1,052 views
The Aadhaar project holds at least 3 PB of data and possibly more. It's promise of providing a unique multi-modal biometric ...
2,461 views
Concepts of token-based and biometric authentication; false positives, false negatives in authentication. Course material via: ...
1,128 views
8 years ago
AI in Security, Finance, and eCommerce Speaker: TaeWoo Kim https://twitter.com/taewookim ------------ Description: Abstract: ...
152 views
The era of scratch cards, RSA tokens, SMS codes and different variations of second factor authentication (and authorization) ...
466 views
544 views
Dr. Pramod Varma and Regunath Balasubramanian from the Aadhaar project describe the technical architecture of the world's ...
11,009 views
11 years ago
The lecture explains the SS protocol architecture, the SSH trasnsport protocol, the SSH user authentication protocol as well as ...
2,765 views
Toward Better Password Requirements - Jim Fenton Passwords BSidesLV 2016 - Tuscany Hotel - Aug 02, 2016.
1,901 views