Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,264,626 papers from all fields of science
Search
Sign In
Create Free Account
Software token
A software token (sometimes: stoken)is a type of two-factor authentication security device that may be used to authorize the use of computer services…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
22 relations
ABC score
Authentication
Computer virus
Desktop computer
Expand
Broader (2)
Computer access control
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A Graphical Pronoun Analysis Tool for the PROTEST Pronoun Evaluation Test Suite
Christian Hardmeier
,
Liane Guillou
European Association for Machine Translation…
2016
Corpus ID: 17947292
We present a graphical pronoun analysis tool and a set of guidelines for manual evaluation to be used with the PROTEST pronoun…
Expand
2016
2016
PubTermVariants: biomedical term variants and their use for PubMed search
Lana Yeganova
,
Won Kim
,
+5 authors
W. Wilbur
BioNLP@ACL
2016
Corpus ID: 1737268
Term normalization is frequently used in information retrieval task to reduce variant word forms to a common form. The most…
Expand
2015
2015
A Generator of Incremental Divide-and-Conquer Lexers A Tool to Generate an Incremental Lexer from a Lexical Specification
Kristofer Hansson
,
J. Hugo
2015
Corpus ID: 60101627
This report aims to present a way to do lexical analysis incrementally instead of the present norm: sequential analysis. In a…
Expand
2014
2014
중국어 학습자의 의사소통 능력 향상을 위한 회화교재에 쓰인 반응 발화에 대한 고찰
이지원
2014
Corpus ID: 75015249
This paper investigates several features of reactive tokens, including their distributional properties, their types, their…
Expand
2010
2010
Method of generating a soft token
ディートリッヒ、フランク
2010
Corpus ID: 64921371
The invention relates to a method for reading the at least one attribute stored in an ID token (106, 106′), wherein the ID token…
Expand
2008
2008
Marking fairness in Petri nets
Weiming Lu
Journal of Computational Science and Technology
2008
Corpus ID: 35172394
We study fairness with respect to markings in Petri nets, which means no infinite execution sequence such that in the sequence…
Expand
2007
2007
Can English Tag Questions Grammaticalise
A. Wichmann
2007
Corpus ID: 63531792
This article addresses the possibility that English question tags may have undergone a process of grammaticalisation, to the…
Expand
2007
2007
A Study of Leaky Bucket using Burst Tokens
Dong-Chul Kim
2007
Corpus ID: 60271255
The Leaky Bucket mechanism has been studied in many areas. There has been much interest in flow control in High Speed Networks…
Expand
2006
2006
Event-Based SOAP Message Validation for WS-SecurityPolicy-Enriched Web Services
Nils Gruschka
,
N. Luttenberger
,
Ralph Herkenhöner
International Conference on Semantic Web & Web…
2006
Corpus ID: 16404128
To enable checking of SOAP messages for compliance to a given security policy, extensions to the classical “Schema-only…
Expand
2003
2003
Intrusion-Tolerant Password-Enabled PKI
Xunhua Wang
2003
Corpus ID: 18143858
Password-enabled PKI facilitates the private key management by integrating easy-to-use passwords into PKI. In the first PKI…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE