Skip to search formSkip to main contentSkip to account menu

Security token

Known as: Cryptographic token, Hardware token, Security-Token 
Security tokens are used to prove one's identity electronically (as in the case of a customer trying to access their bank account). The token is used… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Key derivation function (KDF) is used to generate security key in LTE network. For MD5 and SHA1 algorithms in LTE networks… 
2009
2009
This paper introduces a new concept for image encryption using a binary “key-image”. The key-image is either a bit plane or an… 
Review
2008
Review
2008
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties… 
2006
2006
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing… 
Highly Cited
2006
Highly Cited
2006
This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS… 
2004
2004
In the last couple of years, several European countries have started projects which intend to provide their citizens with… 
Highly Cited
2003
Highly Cited
2003
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message… 
2002
2002
We consider the problem of of floading secure access-controlled content from central origin servers to distributed caches so… 
2001
2001
Complementary hardware and software have contributed to the success of smart cards. New chips and operating systems will further… 
2001
2001
A buckle device for a water-proof camera is disclosed, including a buckle arm pivotally mounted at its one end to the camera…