Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,238,988 papers from all fields of science
Search
Sign In
Create Free Account
RSA SecurID
Known as:
SecurID
, Secure ID token
, SecureID
Expand
RSA SecurID, formerly referred to as SecurID, is a mechanism developed by Security Dynamics (later RSA Security and now RSA, The Security Division of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
BlackBerry
Block cipher
Electronic leash
Exploit (computer security)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Modeling of CMOS Zero-power Timers for Dynamic Authentication of Passive Assets
Liang Zhou
,
S. Chakrabartty
2016
Corpus ID: 28183634
A major limitation in authenticating passive and remotely powered sensors, tags and cards (e.g. radio-frequency identification…
Expand
2015
2015
Use of Continuous Integration Tools for Application Performance Monitoring
V. G. V. Larrea
,
W. Joubert
,
Christopher Fuson
2015
Corpus ID: 19843726
High performance computing systems are becom- ing increasingly complex, both in node architecture and in the multiple layers of…
Expand
Review
2008
Review
2008
Hardened Client Platforms for Secure Internet Banking
Corrado Ronchi
,
Shukhrat Zakhidov
Information Security Solutions Europe
2008
Corpus ID: 19724987
We review the security of e-banking platforms with particular attention to the exploitable attack vectors of three main attack…
Expand
Review
2006
Review
2006
RFID Systems: A Survey on Security Threats and Proposed Solutions
Pedro Peris-López
,
J. Castro
,
J. Tapiador
,
A. Ribagorda
IFIP International Conference on Personal…
2006
Corpus ID: 2415608
Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as smart labels are emerging as one of the most…
Expand
Highly Cited
2006
Highly Cited
2006
Fourth-factor authentication: somebody you know
John G. Brainard
,
A. Juels
,
R. Rivest
,
M. Szydlo
,
M. Yung
Conference on Computer and Communications…
2006
Corpus ID: 1979527
User authentication in computing systems traditionally depends on three factors: something you have (e.g., a hardware token…
Expand
2005
2005
Recent attacks on alleged SecurID and their practical implications
A. Biryukov
,
Joseph Lano
,
B. Preneel
Computers & security
2005
Corpus ID: 39607687
2004
2004
Deploying and Using Public Key Technology: Lessons Learned in Real Life
Richard Guida
,
R. Stahl
,
T. Bunt
,
Gary Secrest
,
Joseph Moorcones
IEEE Security and Privacy
2004
Corpus ID: 34679423
When you think of Johnson & Johnson, images of baby powder and other elements of parenting probably come to mind. The company…
Expand
2004
2004
Fast Software-Based Attacks on SecurID
S. Contini
,
Y. Yin
Fast Software Encryption Workshop
2004
Corpus ID: 5722916
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano…
Expand
2003
2003
Cryptanalysis of the Alleged SecurID Hash Function
A. Biryukov
,
Joseph Lano
,
B. Preneel
ACM Symposium on Applied Computing
2003
Corpus ID: 13968924
The SecurID hash function is used for authenticating users to a corporate computer infrastructure. We analyse an alleged…
Expand
2001
2001
Initial Cryptanalysis of the RSA SecurID Algorithm
2001
Corpus ID: 14638255
Recently, I.C. Wiener published a reverse engineering effort of the RSA SecurID algorithm [1]. There were few speculations on the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE