Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,979,792 papers from all fields of science
Search
Sign In
Create Free Account
YubiKey
Known as:
Yubico
The YubiKey is a hardware authentication device manufactured by Yubico that supports one-time passwords, public key encryption and authentication…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Android Privacy Guard
Code signing
Docker
FIDO Alliance
Expand
Broader (2)
Computer access control
USB
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Portknox Update March
S. Lindner
2018
Corpus ID: 65129904
Two Factor U2F added Its now possible to activate Two Factor Authentication with U2F devices like the Yubikey. Another way to…
Expand
2017
2017
An Information Security Management for Socio-Technical Analysis of System Security
Jean-Louis Huynen
,
G. Lenzini
International Conference on Information Systems…
2017
Corpus ID: 52079084
Concerned about the technical and social aspects at the root causes of security incidents and how they can hide security…
Expand
2016
2016
Secure token-based authentication with YubiKey 4
T. Jacobs
2016
Corpus ID: 63929777
Busy Linux administrators often need to use insecure terminals, such as a co-worker's desktop, to get their jobs done. Todd A…
Expand
2015
2015
Modified USB Security Token for User Authentication
W. M. AlOmari
,
H. Abusaimeh
Computer and Information Science
2015
Corpus ID: 13843086
Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the…
Expand
2015
2015
Enhanced MIT ID Security via One-Time Passcode
Emma Christie
,
Nchinda Nchinda
,
Hannah Hailan Pang
,
Hyungie Sung emchris
2015
Corpus ID: 17031348
The current MIT ID card system presents many flaws in various regards. MIT ID cards are used to establish security across campus…
Expand
2014
2014
The Joint Space Operations Center (JSpOC) Mission System (JMS) and the Advanced Research, Collaboration, and Application Development Environment (ARCADE)
J. Murray-Krezan
,
C. Sabol
,
A. Runco
,
P. Zetocha
,
Juan Echeverry
,
Richard Kim
2014
Corpus ID: 107026178
Abstract : The JSpOC Mission System (JMS) is a modern service-oriented architecture (SOA) infrastructure with increased process…
Expand
2013
2013
Formal Verification of Voting and Auction Protocols : From Privacy to Fairness and Verifiability
Jannik Dreier
2013
Corpus ID: 167157938
In this document, we formally analyze security in electronic voting and electronic auctions. On-line voting over is now available…
Expand
2013
2013
zur Erlangung des Grades eines Doktor-Ingenieurs
2013
Corpus ID: 211195398
Embedded devices have become omnipresent both in business applications and in the private sector. Various, highly diverse types…
Expand
2012
2012
A Security Study for Non-Internet Connected Managed Software
Tommaso Galassi De Orchi
2012
Corpus ID: 107222416
This master thesis project aims to improve the security of managed software developed at SCANIA's research and development group…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE