Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,849,640 papers from all fields of science
Search
Sign In
Create Free Account
Software token
A software token (sometimes: stoken)is a type of two-factor authentication security device that may be used to authorize the use of computer services…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
ABC score
Authentication
Computer virus
Desktop computer
Expand
Broader (2)
Computer access control
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Sentiment Analysis Of Hotel Review Using N-Gram And Naive Bayes Methods
Triyanna Widiyaningtyas
,
Ilham Ari Elbaith Zaeni
,
Riswanda Al Farisi
International Conference on Intelligent Computing
2019
Corpus ID: 211119267
Hotel booking service providers in the form of websites or online-based applications have provided features where consumers can…
Expand
2011
2011
Phonological development of typically developing Kuwaiti Arabic-speaking preschoolers
H. Ayyad
2011
Corpus ID: 112440637
This study documents the development of the phonological skills of typically developing Kuwaiti Arabic-speaking preschool-age…
Expand
2008
2008
Analysis of a Multiple-Token Contention Scheme for Broadband Wireless Access Networks
N. Wattanamongkhol
,
W. Srichavengsup
,
P. Vara-urairat
,
S. Siwamogsatham
,
L. Wuttisiittikulkij
ICC Workshops - IEEE International Conference on…
2008
Corpus ID: 1690604
In this paper, we present a mathematical analysis to evaluate the contention phase of a wireless system in which each contending…
Expand
2007
2007
Customizing Reconfigurable On-Chip Crossbar Scheduler
J. Hur
,
T. Stefanov
,
Stephan Wong
,
S. Vassiliadis
IEEE International Conference on Application…
2007
Corpus ID: 10327239
We present a design of a customized crossbar scheduler for on-chip networks. The proposed scheduler arbitrates on-demand…
Expand
2006
2006
Event-Based SOAP Message Validation for WS-SecurityPolicy-Enriched Web Services
Nils Gruschka
,
N. Luttenberger
,
Ralph Herkenhöner
International Conference on Semantic Web & Web…
2006
Corpus ID: 16404128
To enable checking of SOAP messages for compliance to a given security policy, extensions to the classical “Schema-only…
Expand
2006
2006
Authentication Protocols Using Hoover-Kausik's Software Token
W. Ku
,
Hui-Lung Lee
Journal of information science and engineering
2006
Corpus ID: 2970829
In 1999, Hoover and Kausik introduced a software token using the cryptographic camouflage technique and claimed that it can…
Expand
2005
2005
Synchro-tokens: a deterministic GALS methodology for chip-level debug and test
Matthew W. Heath
,
W. Burleson
,
I. Harris
IEEE transactions on computers
2005
Corpus ID: 29199618
This paper describes a novel deterministic globally-asynchronous locally-synchronous (GALS) methodology called "synchro-tokens…
Expand
2003
2003
Intrusion-Tolerant Password-Enabled PKI
Xunhua Wang
2003
Corpus ID: 18143858
Password-enabled PKI facilitates the private key management by integrating easy-to-use passwords into PKI. In the first PKI…
Expand
1990
1990
Perceptual integration of piloting and navigation
S. Engelson
Proceedings. 5th IEEE International Symposium on…
1990
Corpus ID: 62399013
The crucial issues of modularization and communication using the idea of perception as an integration and communication mechanism…
Expand
1987
1987
Data flow driven computer for embedded control systems
B. Lent
1987
Corpus ID: 56584164
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE