{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups\" title=\"Security &amp; Cryptography II - Comparison of Schemes &amp; Arranging into the OSI Layers\" src=\"https://dud-video.inf.tu-dresden.de/videos/embed/4d691853-67ac-4f9a-bb4e-e387e8dbb5c9\" frameborder=\"0\" allowfullscreen></iframe>","width":560,"height":315,"title":"Security & Cryptography II - Comparison of Schemes & Arranging into the OSI Layers","author_name":"Security & Cryptography II","author_url":"https://dud-video.inf.tu-dresden.de/video-channels/sac2","provider_name":"PeerTube","provider_url":"https://dud-video.inf.tu-dresden.de","thumbnail_url":"https://dud-video.inf.tu-dresden.de/lazy-static/previews/4d691853-67ac-4f9a-bb4e-e387e8dbb5c9.jpg","thumbnail_width":850,"thumbnail_height":480}