Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,297,437 papers from all fields of science
Search
Sign In
Create Free Account
Software token
A software token (sometimes: stoken)is a type of two-factor authentication security device that may be used to authorize the use of computer services…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
ABC score
Authentication
Computer virus
Desktop computer
Expand
Broader (2)
Computer access control
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
The simple location-based authentication method using multi-layer display in Korea
kwangjong ahn
,
June-Suh Cho
Journal of Business & Retail Management Research
2019
Corpus ID: 198356418
The importance of selecting an environment appropriate authentication method is the most crucial decision in designing secure…
Expand
2016
2016
A Graphical Pronoun Analysis Tool for the PROTEST Pronoun Evaluation Test Suite
Christian Hardmeier
,
Liane Guillou
European Association for Machine Translation…
2016
Corpus ID: 17947292
We present a graphical pronoun analysis tool and a set of guidelines for manual evaluation to be used with the PROTEST pronoun…
Expand
2016
2016
PubTermVariants: biomedical term variants and their use for PubMed search
Lana Yeganova
,
Won Kim
,
+5 authors
W. Wilbur
BioNLP@ACL
2016
Corpus ID: 1737268
Term normalization is frequently used in information retrieval task to reduce variant word forms to a common form. The most…
Expand
2016
2016
Hardware-assisted credential management scheme for preventing private data analysis from cloning attacks
Jongwon Choi
,
Geonbae Na
,
J. Yi
Multimedia tools and applications
2016
Corpus ID: 37981350
The majority of mobile apps use credentials to provide an automatic login function. Credentials are security tokens based on a…
Expand
2010
2010
A Novel Rubbing Encryption Algorithm and the Implementation of a Web Based One-Time Password Token
Fred Cheng
IEEE 34th Annual Computer Software and…
2010
Corpus ID: 11260806
Using One-time Password (OTP) in a Two-factor Authentication (2FA) system is very popular nowadays. OTP function has been…
Expand
2006
2006
Event-Based SOAP Message Validation for WS-SecurityPolicy-Enriched Web Services
Nils Gruschka
,
N. Luttenberger
,
Ralph Herkenhöner
International Conference on Semantic Web & Web…
2006
Corpus ID: 16404128
To enable checking of SOAP messages for compliance to a given security policy, extensions to the classical “Schema-only…
Expand
2005
2005
Synchro-tokens: a deterministic GALS methodology for chip-level debug and test
Matthew W. Heath
,
W. Burleson
,
I. Harris
IEEE transactions on computers
2005
Corpus ID: 29199618
This paper describes a novel deterministic globally-asynchronous locally-synchronous (GALS) methodology called "synchro-tokens…
Expand
2003
2003
Intrusion-Tolerant Password-Enabled PKI
Xunhua Wang
2003
Corpus ID: 18143858
Password-enabled PKI facilitates the private key management by integrating easy-to-use passwords into PKI. In the first PKI…
Expand
2001
2001
Robust Software Tokens: Towards Securing a Digital Identity
Taekyoung Kwon
IACR Cryptology ePrint Archive
2001
Corpus ID: 15510428
This paper presents a new method called the robust software token for providing users with a stable and portable container in…
Expand
1990
1990
Perceptual integration of piloting and navigation
S. Engelson
Proceedings. 5th IEEE International Symposium on…
1990
Corpus ID: 62399013
The crucial issues of modularization and communication using the idea of perception as an integration and communication mechanism…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE