Skip to search formSkip to main contentSkip to account menu

Access token

Known as: Token, Token (Windows NT architecture) 
In computer systems, an access token contains the security credentials for a login session and identifies the user, the user's groups, the user's… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
OAuth is used by many FinTech applications for authorization purposes and there are many implementations of OAuth protocol. Some… 
2017
2017
..................................................................................................................... IV… 
2017
2017
With the development of mobile communication, users put forward a higher security requirement in the process of intelligent… 
2016
2016
Twitter provides an extremely rich and open source of data for studying human behaviour at scale. It has been used to advance our… 
2014
2014
Kahn process networks are a popular programming model for programming multi-core systems. They ensure determinacy of applications… 
2014
2014
An increasing number of datasets and analytics resources have been made available on the Web. Often, those resources are hosted… 
2013
2013
Hadoop is a distributed Big Data storage and processing framework hugely adopted in different sectors from online media… 
2012
2012
University of Minnesota Ph.D. dissertation. July 2012. Major: Computer science. Advisor:Prof. Nicholas Hopper. 1 computer file… 
2011
2011
  • Hidehito Gomi
  • 2011
  • Corpus ID: 2044985
Delegation of authority is an act whereby an entity delegates his or her rights to use personal information to another entity. It… 
2009
2009
We take a look into the REST architectural style of making scalable web applications and find out the critical requirements that…