This video belongs to the openHPI course Digital Identities. Do you want to see more?
Previous
1.6 Authentication Methods: Knowledge, Ownership, Biometrics, Behavior
Next
1.7 Secure Communication with Kerberos