Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Security token
Known as:
Cryptographic token
, Hardware token
, Security-Token
Expand
Security tokens are used to prove one's identity electronically (as in the case of a customer trying to access their bank account). The token is used…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
3-D Secure
Authentication
CCID (protocol)
Claims-based identity
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris
Mr. P. Balakumar
,
Dr. R. Venkatesan
2011
Corpus ID: 16648223
Exact and automatic recognition and authentication of users are a essential difficulty in all systems. Shared secrets like…
Expand
2009
2009
Image encryption using binary key-images
Yicong Zhou
,
K. Panetta
,
S. Agaian
IEEE International Conference on Systems, Man and…
2009
Corpus ID: 15419724
This paper introduces a new concept for image encryption using a binary “key-image”. The key-image is either a bit plane or an…
Expand
2008
2008
Trust-enhanced Security in Location-based Adaptive Authentication
G. Lenzini
,
M. Bargh
,
B. Hulsebosch
STM@ESORICS
2008
Corpus ID: 1167418
2006
2006
Ripple: a wireless token-passing protocol for multi-hop wireless mesh networks
R. Cheng
,
Cun-Yi Wang
,
L. Liao
,
Jen-Shun Yang
IEEE Communications Letters
2006
Corpus ID: 1966975
This work presents a wireless token-passing protocol, named Ripple, for wireless mesh networks (WMNs). In contrast to existing…
Expand
Highly Cited
2006
Highly Cited
2006
A New Authentication Protocol for UMTS Mobile Networks
J. Al-Saraireh
,
S. Yousef
EURASIP Journal on Wireless Communications and…
2006
Corpus ID: 18379577
This paper analyzes the authentication and key agreement (AKA) protocol for universal mobile telecommunications system (UMTS…
Expand
2004
2004
Threat Modelling for Security Tokens in Web Applications
D. D. Cock
,
K. Wouters
,
Dries Schellekens
,
Dave Singelée
,
B. Preneel
Communications and Multimedia Security
2004
Corpus ID: 3805778
In the last couple of years, several European countries have started projects which intend to provide their citizens with…
Expand
Highly Cited
2003
Highly Cited
2003
Web Services Security (WS-Security)
Bob Atkinson
2003
Corpus ID: 166854042
WS-Security describes enhancements to SOAP messaging to provide quality of protection through message integrity, message…
Expand
2002
2002
Authentication for Distributed Web Caches
J. Giles
,
R. Sailer
,
D. Verma
,
Suresh Chari
European Symposium on Research in Computer…
2002
Corpus ID: 13466610
We consider the problem of of floading secure access-controlled content from central origin servers to distributed caches so…
Expand
2001
2001
MEDICAL DATA PROTECTION WITH A NEW GENERATION OF HARDWARE AUTHENTICATION TOKENS
Stefania Bergamasco
,
M. Bon
,
P. Inchingolo
2001
Corpus ID: 12771067
A buckle device for a water-proof camera is disclosed, including a buckle arm pivotally mounted at its one end to the camera…
Expand
1997
1997
A Basic Classification of Legal Institutions
Dick W. P. Ruiter
1997
Corpus ID: 29885548
The author offers a general definition of legal institutions. A distinction between institutional legal concepts, legal…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE