Journal articles on the topic 'Security tokens'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security tokens.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Putri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (June 3, 2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.
Full textSkaruz, Jarosław. "Database security: combining neural networks and classification approach." Studia Informatica, no. 23 (December 22, 2020): 95–115. http://dx.doi.org/10.34739/si.2019.23.06.
Full textJánoky, László Viktor, János Levendovszky, and Péter Ekler. "An analysis on the revoking mechanisms for JSON Web Tokens." International Journal of Distributed Sensor Networks 14, no. 9 (September 2018): 155014771880153. http://dx.doi.org/10.1177/1550147718801535.
Full textKlimm, Alexander, Benjamin Glas, Matthias Wachs, Sebastian Vogel, Klaus D. Müller-Glaser, and Jürgen Becker. "A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices." International Journal of Reconfigurable Computing 2011 (2011): 1–19. http://dx.doi.org/10.1155/2011/820454.
Full textMartinez Pedreira, Miguel, Costin Grigoras, Volodymyr Yurchenko, and Maksim Melnik Storetvedt. "The Security model of the ALICE next generation Grid framework." EPJ Web of Conferences 214 (2019): 03042. http://dx.doi.org/10.1051/epjconf/201921403042.
Full textAlabi, Peter Akubo. "AN AUTHENTICATION FOR GROUP COMMUNICATIONS IN AD-HOC NETWORKS." International Journal for Innovation Education and Research 9, no. 2 (February 1, 2021): 396–404. http://dx.doi.org/10.31686/ijier.vol9.iss2.2941.
Full textFrischat, Steffen. "The next generation of USB security tokens." Card Technology Today 20, no. 6 (June 2008): 10–11. http://dx.doi.org/10.1016/s0965-2590(08)70153-1.
Full textEt. al., Wan Nur Izzah Wan Muhamad Fokri,. "Classification of Cryptocurrency: A Review of the Literature." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1353–60. http://dx.doi.org/10.17762/turcomat.v12i5.2027.
Full textLiu, Zhenpeng, Xiaojing Song, Wansheng Tang, Xiaomeng Chang, and Dongdong Zhou. "A message-level security model consisting of multiple security-tokens mechanism." Wuhan University Journal of Natural Sciences 12, no. 1 (January 2007): 1–4. http://dx.doi.org/10.1007/s11859-006-0130-1.
Full textSubramanian, Hemang. "Security tokens: architecture, smart contract applications and illustrations using SAFE." Managerial Finance 46, no. 6 (August 13, 2019): 735–48. http://dx.doi.org/10.1108/mf-09-2018-0467.
Full textChang, Milton, Santanu Das, Dale Montrone, and Tapan Chakraborty. "Systems for Implementing Data Communication with Security Tokens." International Journal of High Speed Electronics and Systems 29, no. 01n04 (March 2020): 2040012. http://dx.doi.org/10.1142/s0129156420400121.
Full textSchellinger, Benjamin. "Optimization of special cryptocurrency portfolios." Journal of Risk Finance 21, no. 2 (May 13, 2020): 127–57. http://dx.doi.org/10.1108/jrf-11-2019-0221.
Full textAldya, Aldy Putra, Alam Rahmatulloh, and Muhammad Nur Arifin. "Stateless Authentication with JSON Web Tokens using RSA-512 Algorithm." JURNAL INFOTEL 11, no. 2 (June 30, 2019): 36. http://dx.doi.org/10.20895/infotel.v11i2.427.
Full textPerera, Maharage Nisansala Sevwandi, and Takeshi Koshiba. "Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation." Cryptography 4, no. 4 (November 30, 2020): 33. http://dx.doi.org/10.3390/cryptography4040033.
Full textYatsyk, Tetiana, and Viktor Shvets. "Cryptoassets as an emerging class of digital assets in the financial accounting." Economic Annals-ХХI 183, no. 5-6 (June 4, 2020): 106–15. http://dx.doi.org/10.21003/ea.v183-10.
Full textTiwari, Neil. "The Commodification of Cryptocurrency." Michigan Law Review, no. 117.3 (2018): 611. http://dx.doi.org/10.36644/mlr.117.3.commodification.
Full textMeka, Likhita, and Srivyshnavi Pagadala. "Providing a Secure Cloud Storage by Using Attribute Based Temporary Key Word Search Scheme." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 117–21. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2825.
Full textLueks, Wouter, Brinda Hampiholi, Greg Alpár, and Carmela Troncoso. "Tandem: Securing Keys by Using a Central Server While Preserving Privacy." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 327–55. http://dx.doi.org/10.2478/popets-2020-0055.
Full textBockelman, Brian, Andrew Hanushevsky, Oliver Keeble, Mario Lassnig, Paul Millar, Derek Weitzel, and Wei Yang. "Bootstrapping a New LHC Data Transfer Ecosystem." EPJ Web of Conferences 214 (2019): 04045. http://dx.doi.org/10.1051/epjconf/201921404045.
Full textFischer, Marius. "Zur Regulierung dezentraler Sekundärmärkte." Zeitschrift für Bankrecht und Bankwirtschaft 32, no. 3 (June 16, 2020): 158–67. http://dx.doi.org/10.15375/zbb-2020-0304.
Full textDíaz, Antonio F., Ilia Blokhin, Mancia Anguita, Julio Ortega, and Juan J. Escobar. "Multiprotocol Authentication Device for HPC and Cloud Environments Based on Elliptic Curve Cryptography." Electronics 9, no. 7 (July 16, 2020): 1148. http://dx.doi.org/10.3390/electronics9071148.
Full textWeir, Catherine S., Gary Douglas, Martin Carruthers, and Mervyn Jack. "User perceptions of security, convenience and usability for ebanking authentication tokens." Computers & Security 28, no. 1-2 (February 2009): 47–62. http://dx.doi.org/10.1016/j.cose.2008.09.008.
Full textMuftic, Sead. "BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger." Ledger 1 (December 21, 2016): 19–37. http://dx.doi.org/10.5195/ledger.2016.27.
Full textMyalo, A. S. "Comparative Analysis of ICO, DAOICO, IEO and STO. Case Study." Finance: Theory and Practice 23, no. 6 (December 24, 2019): 6–25. http://dx.doi.org/10.26794/2587-5671-2019-23-6-6-25.
Full textMiglo, Anton. "STO vs. ICO: A Theory of Token Issues under Moral Hazard and Demand Uncertainty." Journal of Risk and Financial Management 14, no. 6 (May 21, 2021): 232. http://dx.doi.org/10.3390/jrfm14060232.
Full textKozhanova, A. V. "ICO AND STO AS MODERN TOOLS FOR CROWDFUNDING STARTUPS." Vestnik Universiteta, no. 2 (April 23, 2020): 41–48. http://dx.doi.org/10.26425/1816-4277-2020-2-41-48.
Full textSelokar, Pradip Ram, and P. T. Karule. "Security Enhancement in Networked Embedded System." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 4 (August 1, 2017): 1867. http://dx.doi.org/10.11591/ijece.v7i4.pp1867-1873.
Full textDas, Sanchari, Joshua Streiff, Lesa L. Huber, and L. Jean Camp. "WHY DON’T ELDERS ADOPT TWO-FACTOR AUTHENTICATION? BECAUSE THEY ARE EXCLUDED BY DESIGN." Innovation in Aging 3, Supplement_1 (November 2019): S325—S326. http://dx.doi.org/10.1093/geroni/igz038.1186.
Full textKent, Adrian. "S-money: virtual tokens for a relativistic economy." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 475, no. 2225 (May 2019): 20190170. http://dx.doi.org/10.1098/rspa.2019.0170.
Full textSan Nicolas-Rocca, Tonia, and Lorne Olfman. "End User Security Training for Identification and Access Management." Journal of Organizational and End User Computing 25, no. 4 (October 2013): 75–103. http://dx.doi.org/10.4018/joeuc.2013100104.
Full textChung, Kai-Min, Marios Georgiou, Ching-Yi Lai, and Vassilis Zikas. "Cryptography with Disposable Backdoors." Cryptography 3, no. 3 (August 20, 2019): 22. http://dx.doi.org/10.3390/cryptography3030022.
Full textCeccanti, Andrea, Enrico Vianello, and Diego Michelotto. "Token-based authorization in StoRM WebDAV." EPJ Web of Conferences 245 (2020): 04020. http://dx.doi.org/10.1051/epjconf/202024504020.
Full textBroadbent, Anne, Sevag Gharibian, and Hong-Sheng Zhou. "Towards Quantum One-Time Memories from Stateless Hardware." Quantum 5 (April 8, 2021): 429. http://dx.doi.org/10.22331/q-2021-04-08-429.
Full textB. K., Chethan, M. Siddappa, and Jayanna H. S. "Novel framework using dynamic passphrase towards secure and energy-efficient communication in MANET." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1552. http://dx.doi.org/10.11591/ijece.v10i2.pp1552-1560.
Full textOh, Se-Ra, and Young-Gab Kim. "AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090638. http://dx.doi.org/10.1177/1550147720906388.
Full textCheng, Fred. "Security Attack Safe Mobile and Cloud-based One-time Password Tokens Using Rubbing Encryption Algorithm." Mobile Networks and Applications 16, no. 3 (April 12, 2011): 304–36. http://dx.doi.org/10.1007/s11036-011-0303-9.
Full textZagidullin, Daniyal Rashidovich, and Nataliya Sergeevna Pulyavina. "The prospects for the development of blockchain technology in the NFT format." Lizing (Leasing), no. 1 (May 26, 2021): 40–44. http://dx.doi.org/10.33920/vne-03-2107-06.
Full textZhang, Lianfeng, and Yuriy Danko. "RESEARCH ON INNOVATION OF BLOCKCHAIN TECHNOLOGY IN TOURISM SERVICE INDUSTRY." ГРААЛЬ НАУКИ, no. 2-3 (April 7, 2021): 79–82. http://dx.doi.org/10.36074/grail-of-science.02.04.2021.014.
Full textDykstra, Dave, Mine Altunay, and Jeny Teheran. "Secure Command Line Solution for Token-based Authentication." EPJ Web of Conferences 251 (2021): 02036. http://dx.doi.org/10.1051/epjconf/202125102036.
Full textSanthana Devi, G., and M. Germanus Alex. "Efficient Multilevel Privacy Preserving Authentication Scheme for Emergency Message Communication in VANE." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 216. http://dx.doi.org/10.14419/ijet.v7i3.6.14973.
Full textHausawi, Yasser. "Role of Usability on using Biometrics for Cybersecurity." Transactions on Networks and Communications 7, no. 4 (November 8, 2019): 19–26. http://dx.doi.org/10.14738/tnc.74.7244.
Full textEdy, Edy, Ferdiansyah Ferdiansyah, Wahyu Pramusinto, and Sejati Waluyo. "Pengamanan Restful API menggunakan JWT untuk Aplikasi Sales Order." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 3, no. 2 (August 1, 2019): 106–12. http://dx.doi.org/10.29207/resti.v3i2.860.
Full textRen, Qing, Feng Tian, Xiangyi Lu, Yumeng Shen, Zhenqiang Wu, and Xiaolin Gui. "A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks." Security and Communication Networks 2021 (September 7, 2021): 1–12. http://dx.doi.org/10.1155/2021/5317062.
Full textMbabazi, Veneranda, Resty Naiga, and Nkabala Nambalirwa Helen. "Towards Gendered Peacebuilding Processes for Sustainable Peace." Jadavpur Journal of International Relations 24, no. 2 (March 12, 2020): 133–51. http://dx.doi.org/10.1177/0973598419896441.
Full textBartolucci, Silvia, and Andrei Kirilenko. "A model of the optimal selection of crypto assets." Royal Society Open Science 7, no. 8 (August 2020): 191863. http://dx.doi.org/10.1098/rsos.191863.
Full textAl-Ameen, Mahdi Nasrullah, S. M. Taiabul Haque, and Matthew Wright. "Leveraging autobiographical memory for two-factor online authentication." Information & Computer Security 24, no. 4 (October 10, 2016): 386–99. http://dx.doi.org/10.1108/ics-01-2016-0005.
Full textKeerthana, N., Viji Vinod, and Sudhakar Sengan. "Slicing, Tokenization, and Encryption Based Combinational Approach to Protect Data-at-Rest in Cloud Using TF-Sec Model." Journal of Computational and Theoretical Nanoscience 17, no. 12 (December 1, 2020): 5296–306. http://dx.doi.org/10.1166/jctn.2020.9421.
Full textZhou, Hui, Zuo Hua Ding, and Hong Yun Huang. "A Petri Net Based Public-Key Cryptosystem." Applied Mechanics and Materials 380-384 (August 2013): 2858–61. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2858.
Full textDillon, Stuart, Florian Stahl, and Gottfried Vossen. "BYOD and Governance of the Personal Cloud." International Journal of Cloud Applications and Computing 5, no. 2 (April 2015): 23–35. http://dx.doi.org/10.4018/ijcac.2015040102.
Full textPartida, Alberto, Regino Criado, and Miguel Romance. "Visibility Graph Analysis of IOTA and IoTeX Price Series: An Intentional Risk-Based Strategy to Use 5G for IoT." Electronics 10, no. 18 (September 17, 2021): 2282. http://dx.doi.org/10.3390/electronics10182282.
Full text