Tokenization (data security)

Known as: Token, Tokenization 
Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Semantic Textual Similarity (STS) measures the meaning similarity of sentences. Applications include machine translation (MT… (More)
  • table 1
  • table 2
  • table 3
  • table 5
  • table 6
Is this relevant?
Highly Cited
2016
Highly Cited
2016
Automatically recognizing entailment relations between pairs of natural language sentences has so far been the dominion of… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We describe the MADA+TOKAN toolkit, a versatile and freely available system that can derive extensive morphological and… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this paper, we study the effect of different word-level preprocessing decisions for Arabic on SMT quality. Our results show… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We present an approach to using a morphological analyzer for tokenizing and morphologically tagging (including partof-speech… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Entity relation detection is a form of information extraction that finds predefined relations between pairs of entities in text… (More)
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
To date, there are no fully automated systems addressing the community’s need for fundamental language processing tools for… (More)
  • table 1
  • table 2
  • table 4
  • table 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The Cross-Language Evaluation Forum has encouraged research in text retrieval methods for numerous European languages and has… (More)
  • table 1
  • table 2
  • figure 1
  • figure 1
  • figure 1
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We propose a new efficient automatic verification technique, Athena, for security protocol analysis. It uses a new efficient… (More)
  • figure 1
Is this relevant?
Highly Cited
1994
Highly Cited
1994
We present a stochastic finite-state model for segmenting Chinese text into dictionary entries and productively derived words… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?