Skip to search formSkip to main contentSkip to account menu

YubiKey

Known as: Yubico 
The YubiKey is a hardware authentication device manufactured by Yubico that supports one-time passwords, public key encryption and authentication… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Two Factor U2F added Its now possible to activate Two Factor Authentication with U2F devices like the Yubikey. Another way to… 
2017
2017
Concerned about the technical and social aspects at the root causes of security incidents and how they can hide security… 
2016
2016
Busy Linux administrators often need to use insecure terminals, such as a co-worker's desktop, to get their jobs done. Todd A… 
2015
2015
Computer security has been a significant importance in today’s world. Many researches have been done in order to improve the… 
2015
2015
The current MIT ID card system presents many flaws in various regards. MIT ID cards are used to establish security across campus… 
2014
2014
Abstract : The JSpOC Mission System (JMS) is a modern service-oriented architecture (SOA) infrastructure with increased process… 
2013
2013
In this document, we formally analyze security in electronic voting and electronic auctions. On-line voting over is now available… 
2013
2013
  • 2013
  • Corpus ID: 211195398
Embedded devices have become omnipresent both in business applications and in the private sector. Various, highly diverse types… 
2012
2012
This master thesis project aims to improve the security of managed software developed at SCANIA's research and development group…