Security token

Known as: Cryptographic token, Hardware token, Security-Token 
Security tokens are used to prove one's identity electronically (as in the case of a customer trying to access their bank account). The token is used… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
While the open nature of radio propagation enables convenient “anywhere” wireless access, it becomes the root of security… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Passwords are current ly t he most widely used au t hent ica t ion mechanism. However, as shown in t he li terat ure numerous t… (More)
  • table 3.1
  • figure 5.1
  • figure 5.2
  • figure 5.3
  • figure 5.4
Is this relevant?
2011
2011
Today security concerns are on the rise in all areas industries such as banks, governmental applications, healthcare industry… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We show how to extract sensitive cryptographic keys from a variety of commercially available tamper resistant cryptographic… (More)
  • figure 1
  • figure 2
  • table 1
  • table 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In… (More)
Is this relevant?
2009
2009
The protection of digital identities is getting more and more crucial. The usage of passwords for authentication is no longer… (More)
Is this relevant?
2004
2004
In the last couple of years, several European countries have started projects which intend to provide their citizens with… (More)
  • figure 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Before the computer age, authenticating a user was a relatively simple process. One person could authenticate another by visual… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
 
  • figure 3
  • figure 6
Is this relevant?
Highly Cited
1990
Highly Cited
1990
ions. A modular abstraction can be included in many places even though it is never directly exposed to a user. The invoice… (More)
Is this relevant?