Skip to search formSkip to main contentSkip to account menu

Software token

A software token (sometimes: stoken)is a type of two-factor authentication security device that may be used to authorize the use of computer services… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
We present a graphical pronoun analysis tool and a set of guidelines for manual evaluation to be used with the PROTEST pronoun… 
2016
2016
Term normalization is frequently used in information retrieval task to reduce variant word forms to a common form. The most… 
2015
2015
This report aims to present a way to do lexical analysis incrementally instead of the present norm: sequential analysis. In a… 
2014
2014
This paper investigates several features of reactive tokens, including their distributional properties, their types, their… 
2010
2010
The invention relates to a method for reading the at least one attribute stored in an ID token (106, 106′), wherein the ID token… 
2008
2008
We study fairness with respect to markings in Petri nets, which means no infinite execution sequence such that in the sequence… 
2007
2007
This article addresses the possibility that English question tags may have undergone a process of grammaticalisation, to the… 
2007
2007
The Leaky Bucket mechanism has been studied in many areas. There has been much interest in flow control in High Speed Networks… 
2006
2006
To enable checking of SOAP messages for compliance to a given security policy, extensions to the classical “Schema-only… 
2003
2003
Password-enabled PKI facilitates the private key management by integrating easy-to-use passwords into PKI. In the first PKI…