Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 223,674,026 papers from all fields of science
Search
Sign In
Create Free Account
Security token
Known as:
Cryptographic token
, Hardware token
, Security-Token
Expand
Security tokens are used to prove one's identity electronically (as in the case of a customer trying to access their bank account). The token is used…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
3-D Secure
Authentication
CCID (protocol)
Claims-based identity
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Security Control Redundancy Allocation Technology and Security Keys Based on Internet of Things
Aimin Yang
,
Yifan Li
,
Fanbei Kong
,
Guoqing Wang
,
Enhong Chen
IEEE Access
2018
Corpus ID: 52897262
The Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core…
Expand
2009
2009
Image encryption using binary key-images
Yicong Zhou
,
K. Panetta
,
S. Agaian
IEEE International Conference on Systems, Man and…
2009
Corpus ID: 15419724
This paper introduces a new concept for image encryption using a binary “key-image”. The key-image is either a bit plane or an…
Expand
Review
2008
Review
2008
An Overview and Evaluation of Web Services Security Performance Optimizations
Robert A. van Engelen
,
Wei Zhang
IEEE International Conference on Web Services
2008
Corpus ID: 14952379
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties…
Expand
2006
2006
Ripple: a wireless token-passing protocol for multi-hop wireless mesh networks
R. Cheng
,
Cun-Yi Wang
,
L. Liao
,
Jen-Shun Yang
IEEE Communications Letters
2006
Corpus ID: 1966975
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing…
Expand
Highly Cited
2006
Highly Cited
2006
A New Authentication Protocol for UMTS Mobile Networks
J. Al-Saraireh
,
S. Yousef
EURASIP Journal on Wireless Communications and…
2006
Corpus ID: 18379577
This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS…
Expand
Highly Cited
2004
Highly Cited
2004
How to Disembed a Program?
Benoît Chevallier-Mames
,
D. Naccache
,
Pascal Paillier
,
D. Pointcheval
IACR Cryptology ePrint Archive
2004
Corpus ID: 8844855
This paper presents the theoretical blueprint of a new secure token called the Externalized Microprocessor (X μ P). Unlike a…
Expand
Highly Cited
2003
Highly Cited
2003
Web Services Security (WS-Security)
Bob Atkinson
2003
Corpus ID: 166854042
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message…
Expand
2001
2001
Hardware and Software Symbiosis Helps Smart Card Evolution
Jean-François Dhem
,
N. Feyt
IEEE Micro
2001
Corpus ID: 1257670
Complementary hardware and software have contributed to the success of smart cards. New chips and operating systems will further…
Expand
2001
2001
MEDICAL DATA PROTECTION WITH A NEW GENERATION OF HARDWARE AUTHENTICATION TOKENS
Stefania Bergamasco
,
M. Bon
,
P. Inchingolo
2001
Corpus ID: 12771067
A buckle device for a water-proof camera is disclosed, including a buckle arm pivotally mounted at its one end to the camera…
Expand
Highly Cited
1997
Highly Cited
1997
Shared Authentication Token Secure Against Replay and Weak Key Attacks
Sung-Ming Yen
,
Kuo-Hong Liao
Information Processing Letters
1997
Corpus ID: 19576179
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE