All
Search
Images
Videos
Shorts
Maps
News
More
Shopping
Flights
Travel
Notebook
Report an inappropriate content
Please select one of the options below.
Not Relevant
Offensive
Adult
Child Sexual Abuse
Length
All
Short (less than 5 minutes)
Medium (5-20 minutes)
Long (more than 20 minutes)
Date
All
Past 24 hours
Past week
Past month
Past year
Resolution
All
Lower than 360p
360p or higher
480p or higher
720p or higher
1080p or higher
Source
All
Dailymotion
Vimeo
Metacafe
Hulu
VEVO
Myspace
MTV
CBS
Fox
CNN
MSN
Price
All
Free
Paid
Clear filters
SafeSearch:
Moderate
Strict
Moderate (default)
Off
Filter
Deterministic Encryption: Theory and Applications
Oct 31, 2009
Microsoft
Explain why a deterministic public-key encryption scheme is ins... | Filo
5 months ago
askfilo.com
What is SHA? What is SHA used for? | Encryption Consulting
Apr 5, 2024
encryptionconsulting.com
26:01
Salesforce Shield Platform Encryption
Mar 28, 2022
apexhours.com
5:49
Database Encryption: Techniques & Applications
6.4K views
Jul 28, 2023
Study.com
An overview of the column level SQL Server encryption
168 views
Jan 14, 2020
sqlshack.com
Seed Lab Psuedo Random Number Generator Generate 256-bit Encry
…
5 months ago
weebly.com
13:32
Build Excel VBA Symmetric Encryption - IV, XOR & Bitwise Ro
…
64 views
5 months ago
YouTube
The World Of Algorithms
8:45
Deterministic Ed25519 Key Generation in Zig 0.15 | Zig Examp
…
1 month ago
YouTube
CodeAndExecute
9:58
【暗号化AI】個人情報を守りながら学習する技術、ヤバすぎる
10 views
1 month ago
YouTube
海外論文研究ラジオ
3:56
Qui Intelligent System Evocation - Teaser 1
34 views
6 days ago
YouTube
Qui
8:25
New TEE.Fail Attack Exposes Intel and AMD Secure Enclaves
277 views
2 months ago
YouTube
Infosec Now
Cloud-Dependent Systems Fail, Ours Keep Running | Brendan Bak
…
4 days ago
linkedin.com
Trusted Robotics Toolkit: Post-Quantum Secure, AI-Ready and T
…
2 months ago
nxp.com
1:21:51
Stochastic Modeling
76.1K views
Jul 28, 2015
YouTube
MIT OpenCourseWare
4:21
Turing Machines
496.9K views
Aug 23, 2013
YouTube
EngMicroLectures
2:10
Shoulder Rides
47.4K views
Jun 1, 2009
YouTube
ZaDoctor93
0:33
Simulated Annealing
56.7K views
May 2, 2013
YouTube
Andreas Müller
58:16
Lec-19 Network Models
284.2K views
Jan 28, 2010
YouTube
nptelhrd
5:25
Turing Machines Explained - Computerphile
1.2M views
Aug 29, 2014
YouTube
Computerphile
50:35
5. Discrete Random Variables I
309.2K views
Nov 9, 2012
YouTube
MIT OpenCourseWare
7:59
The Enigma Machine Explained
983.5K views
May 14, 2013
YouTube
World Science Festival
10:12
What is Environmental History?
52.9K views
Jan 24, 2014
YouTube
Jan Oosthoek
0:31
WhatsApp end-to-end encryption
48M views
Jan 14, 2019
YouTube
WhatsApp
7:17
Symmetric and Asymmetric Encryption
8.6K views
Aug 28, 2018
YouTube
MrBrownCS
6:45
Symmetric Key and Public Key Encryption
681.5K views
Jun 18, 2013
YouTube
ITFreeTraining
1:33:37
Lecture 5: Data Encryption Standard (DES): Encryption by Christof Paar
239.3K views
Jan 30, 2014
YouTube
Introduction to Cryptography by Christof Paar
24:47
Bioinformatics part 11 Sequence motifs and PROSITE notations
68.9K views
Oct 29, 2013
YouTube
Shomu's Biology
8:12
Hashing Algorithms and Security - Computerphile
1.6M views
Nov 8, 2013
YouTube
Computerphile
1:08
Harlequins' guide to the perfect lineout lift
160.2K views
Sep 4, 2013
YouTube
Harlequins
See more videos
More like this
Feedback