videoandmovie.top logo
  • Films
  • Videos
  • Live
  • Login
  • Home
  • Films
  • Videos
  • Live
  • Đăng nhập
  • Films
    Movies Movies 2025Movies 2024Movies 2023Movies 2022Movies 2021Movies 2020Movies before 2020 TV Dramas United States of AmericaKoreaJapanChinaHong KongIndiaThailandFranceTaiwanAustraliaEnglandCanadaRussia
  • Best on Vidoe
    • Hoang Giang Share
    • Janusz
    • 办美国文凭加拿大文凭澳洲文凭英国文凭学位证毕业证成绩单
    • Veinas bọt EPE máy móc
    • Wendy Ye
Dr Nitin Naik - Aston University, UK
  • Videos
  • About
 

Distributed Consensus: Definition & Properties of Consensus, Steps & Fault-Tolerance in Consen. ALG.
9:20
Distributed Consensus: Definition & Properties of Consensus, Steps & Fault-Tolerance in Consen. ALG.
ChatGPT Failed the First Exam But…
6:15
ChatGPT Failed the First Exam But…
Vector Clocks for Ordering of Events in Distributed Systems
9:35
Vector Clocks for Ordering of Events in Distributed Systems
Lamport’s Logical Clocks for Ordering of Events in Distributed Systems
7:16
Lamport’s Logical Clocks for Ordering of Events in Distributed Systems
Ordering of Events: Logical Time and Logical Clock, Happened-Before Relationship, Causality
12:50
Ordering of Events: Logical Time and Logical Clock, Happened-Before Relationship, Causality
Network Time Protocol (NTP) for Clock Synchronization
6:56
Network Time Protocol (NTP) for Clock Synchronization
Berkeley’s Algorithm for Clock Synchronization
7:10
Berkeley’s Algorithm for Clock Synchronization
Cristian’s Algorithm for Clock Synchronization
5:09
Cristian’s Algorithm for Clock Synchronization
Time and Clocks: Quartz Clock, Atomic Clock, Definition of Second, TAI, UTC, What is a Leap Second?
9:53
Time and Clocks: Quartz Clock, Atomic Clock, Definition of Second, TAI, UTC, What is a Leap Second?
Peer-to-Peer Architectural Model: Overlay Network, Unstructured & Structured P2P, Advtgs & Disadvtgs
8:02
Peer-to-Peer Architectural Model: Overlay Network, Unstructured & Structured P2P, Advtgs & Disadvtgs
Client-Server Architectural Model: 3-Layer & 3-Tier Architectures, Advantages and Disadvantages
8:18
Client-Server Architectural Model: 3-Layer & 3-Tier Architectures, Advantages and Disadvantages
What is a Distributed System? Definition, Examples, Benefits, and Challenges of Distributed Systems
7:31
What is a Distributed System? Definition, Examples, Benefits, and Challenges of Distributed Systems
4 Modular Arithmetic for Cryptography- Part 3: Modular Congruence and its Properties
7:36
4 Modular Arithmetic for Cryptography- Part 3: Modular Congruence and its Properties
11 Cryptographic Hash Function and its Properties: Pre-image, Second Pre-image, Collision Resistance
8:56
11 Cryptographic Hash Function and its Properties: Pre-image, Second Pre-image, Collision Resistance
10 Hashing and Hash Function:  Definition, Properties,  Hash Pre-image and Hash Collision Attack
8:30
10 Hashing and Hash Function: Definition, Properties, Hash Pre-image and Hash Collision Attack
1 Message/Data Confidentiality, Message/Data Integrity, Message/Data Authentication, Non-repudiation
10:20
1 Message/Data Confidentiality, Message/Data Integrity, Message/Data Authentication, Non-repudiation
2 Modular Arithmetic for Cryptography-Part 1: Modulo, Prime Number, Composite Number, Coprime Number
6:14
2 Modular Arithmetic for Cryptography-Part 1: Modulo, Prime Number, Composite Number, Coprime Number
3 Modular Arithmetic for Cryptography- Part 2: GCD, Bézout’s Identity, Extended Euclidean Algorithm
12:37
3 Modular Arithmetic for Cryptography- Part 2: GCD, Bézout’s Identity, Extended Euclidean Algorithm
5 Modular Arithmetic for Cryptography- Part 4:  Totient Function, Euler’s & Fermat’s Little Theorem
6:37
5 Modular Arithmetic for Cryptography- Part 4: Totient Function, Euler’s & Fermat’s Little Theorem
6 Modular Arithmetic for Cryptography- Part 5: Primitive Root Modulo, A Method to Find & Count it
9:15
6 Modular Arithmetic for Cryptography- Part 5: Primitive Root Modulo, A Method to Find & Count it
7 Modular Arithmetic for Cryptography-Part 6: Modular Multiplicative Inverse, Extended Euclidean ALG
8:17
7 Modular Arithmetic for Cryptography-Part 6: Modular Multiplicative Inverse, Extended Euclidean ALG
8 Diffie-Hellman Key Exchange (DHKE) Algorithm
6:49
8 Diffie-Hellman Key Exchange (DHKE) Algorithm
9 RSA Encryption Algorithm
13:37
9 RSA Encryption Algorithm
  • Show more

© Copyright 2025 Vidoe. All Rights Reserved.

To claim DCMA copyright, please email to [email protected].
ViDoe Login
Upload videos, create your own free channel with ViDoe.Top after login

Login with Google Login with Discord