Skip to search formSkip to main contentSkip to account menu

Security token

Known as: Cryptographic token, Hardware token, Security-Token 
Security tokens are used to prove one's identity electronically (as in the case of a customer trying to access their bank account). The token is used… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The Internet of Things (IoT) is widely valued by governments, academia, and industry for its huge application prospects. The core… 
2009
2009
This paper introduces a new concept for image encryption using a binary “key-image”. The key-image is either a bit plane or an… 
Review
2008
Review
2008
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties… 
2006
2006
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing… 
Highly Cited
2006
Highly Cited
2006
This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS… 
Highly Cited
2004
Highly Cited
2004
This paper presents the theoretical blueprint of a new secure token called the Externalized Microprocessor (X μ P). Unlike a… 
Highly Cited
2003
Highly Cited
2003
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message… 
2001
2001
Complementary hardware and software have contributed to the success of smart cards. New chips and operating systems will further… 
2001
2001
A buckle device for a water-proof camera is disclosed, including a buckle arm pivotally mounted at its one end to the camera…