Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,354,999 papers from all fields of science
Search
Sign In
Create Free Account
Session ID
Known as:
Session identifier
, Session token
, Token
In computer science, a session identifier, session ID or session token is a piece of data that is used in network communications (often over HTTP) to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Basic access authentication
Brute-force search
Client (computing)
Computer science
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Asynchronous Timed Session Types - From Duality to Time-Sensitive Processes
L. Bocchi
,
Maurizio Murgia
,
V. Vasconcelos
,
N. Yoshida
European Symposium on Programming
2019
Corpus ID: 104292646
We present a behavioural typing system for a higher-order timed calculus using session types to model timed protocols…
Expand
2018
2018
The Cognitive Therapy Scale and Cognitive Therapy Scale-Revised as Measures of Therapist Competence in Cognitive Behavior Therapy for Depression: Relations with Short and Long Term Outcome
N. Kazantzis
,
Xavier Clayton
,
T. Cronin
,
D. Farchione
,
K. Limburg
,
K. Dobson
Cognitive Therapy and Research
2018
Corpus ID: 21712762
Therapist competence is an important factor in treatment integrity. This study reports on a direct comparison of the original…
Expand
2012
2012
Privacy-Preserving Enforcement of Spatially Aware RBAC
Michael S. Kirkpatrick
,
G. Ghinita
,
E. Bertino
IEEE Transactions on Dependable and Secure…
2012
Corpus ID: 11355058
Several models for incorporating spatial constraints into role-based access control (RBAC) have been proposed, and researchers…
Expand
Highly Cited
2011
Highly Cited
2011
Universally Composable Security Analysis of OAuth v2.0
Suresh Chari
,
C. Jutla
,
Arnab Roy
IACR Cryptology ePrint Archive
2011
Corpus ID: 18869120
This paper defines an ideal functionality for delegation of web access to a third-party where the authentication mechanism is…
Expand
2011
2011
A test-bed for the dynamic adaptive streaming over HTTP featuring session mobility
Christopher Müller
,
C. Timmerer
ACM SIGMM Conference on Multimedia Systems
2011
Corpus ID: 207185370
In this paper, we present a multimedia test-bed enabling session mobility in the context of the emerging ISO/IEC MPEG standard…
Expand
2011
2011
ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems
Zhuzhong Qian
,
Ce Chen
,
I. You
,
Sanglu Lu
Fifth International Conference on Innovative…
2011
Corpus ID: 14081735
2010
2010
Two notions of sub-behaviour for session-based client/server systems
Franco Barbanera
,
Ugo de'Liguoro
ACM-SIGPLAN International Conference on…
2010
Corpus ID: 24388800
We propose a refinement and a simplification of the behavioural semantics of session types, based on the concepts of compliance…
Expand
2010
2010
Seamless BGP Migration with Router Grafting
Eric Keller
,
J. Rexford
,
J. Merwe
Symposium on Networked Systems Design and…
2010
Corpus ID: 342809
Network operators are under tremendous pressure to make their networks highly reliable to avoid service disruptions. Yet…
Expand
2007
2007
An Architecture for Secure and Accountable Multicasting
J. William Atwood
IEEE Conference on Local Computer Networks
2007
Corpus ID: 11988312
Delivery of streaming media to individual users is very successful, and the e-commerce models for this are well established…
Expand
2002
2002
A recursive session token protocol for use in computer forensics and TCP traceback
Brian D. Carrier
,
C. Shields
Proceedings.Twenty-First Annual Joint Conference…
2002
Corpus ID: 6585834
We introduce a new protocol designed to assist in the forensic investigation of malicious network-based activity, specifically…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE