Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,814,975 papers from all fields of science
Search
Sign In
Create Free Account
Keychain
Known as:
Keychain Access
, Apple Keychain
, Keychain (Apple)
Expand
Keychain is password management system in OS X developed by Apple. It was introduced with Mac OS 8.6, and has been included in all subsequent…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
"Classic" Mac OS
1Password
Dashlane
Disk image
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
“Key clip extraction for Quick Browsing from Surveillance Videos”
S. Mr.GuravSachin
,
M. Sudhir
2018
Corpus ID: 212517715
The video information is growing exponentially day by day. Surveillance videos generate hours of videos, the video uploaded on…
Expand
2017
2017
Practical challenges of particle filter based UWB localization in vehicular environments
Daniela Knobloch
International Conference on Indoor Positioning…
2017
Corpus ID: 24232852
In this paper, the challenges of Ultra Wide Band localization for key fob applications in vehicular environments are discussed…
Expand
2016
2016
Emerging LED Technologies for Fluorescence Microscopy
Kavita K. Aswani
Microscopy Today
2016
Corpus ID: 138056245
Abstract Fluorescence microscopy has employed mercury arc lamps for decades because of their high power and broad spectrum…
Expand
2016
2016
Physical unclonable keys for smart lock systems using Bluetooth Low Energy
Miguel A. Prada-Delgado
,
A. Vazquez-Reyes
,
I. Baturone
Annual Conference of the IEEE Industrial…
2016
Corpus ID: 3525565
Nowadays, several smart lock systems use Bluetooth Low Energy (BLE) to stablish a wireless communication between the physical key…
Expand
2012
2012
Long Duration Broadcast Authentication for Wireless Sensor Networks
Yongsheng Liu
,
Jie Li
,
M. Guo
IEEE Vehicular Technology Conference
2012
Corpus ID: 1310657
In the resource constrained Wireless Sensor Networks (WSNs), the broadcast authentication is widely fulfilled by the emerging…
Expand
2011
2011
Battery powered tags for ISO/IEC 14443, actively emulating load modulation
Klaus Finkenzeller
2011
Corpus ID: 10693856
Originally designed for contactless smart cards in the form factor ID1, today ISO/IEC 14443 finds new applications in an…
Expand
2011
2011
Random Number Generation Using AES
T. Prescott
2011
Corpus ID: 18331619
Random number generation has applications in many areas, but this article will focus on the use of these numbers in security…
Expand
2007
2007
Creating Human Machine Interface (HMI) Based Tests within Model-Based Design
Chris Fillyaw
,
J. Friedman
,
S. Prabhu
2007
Corpus ID: 16016501
Many of the multimedia and convenience features in today’s passenger vehicles involve Human Machine Interfaces (HMIs), such as…
Expand
2007
2007
AES Security Protocol Implementation for Automobile Remote Keyless System
X. Ni
,
Weiren Shi
,
V. Fook
IEEE Vehicular Technology Conference
2007
Corpus ID: 779935
The remote keyless system is widely used in automobile industry to lock or unlock the automobile's door, trunk, and start the…
Expand
1999
1999
Bringing sketching tools to keychain computers with an acceleration-based interface
G. Levin
,
P. Yarin
CHI Extended Abstracts
1999
Corpus ID: 1695163
We report the use of an embedded accelerometer as a gestural interface for an extremely small ("keychain") computer. This tilt…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE