Cryptography

Software token

A software token (a.k.a. soft token) is a piece of a two-factor authentication security device that may be used to authorize the use of computer services. Software tokens are stored on a general-purpose electronic device such as a desktop computer, laptop, PDA, or mobile phone and can be duplicated. (Contrast hardware tokens, where the credentials are stored on a dedicated hardware device and therefore cannot be duplicated — absent physical invasion of the device) Because software tokens are something one does not physically possess, they are exposed to unique threats based on duplication of the underlying cryptographic material - for example, computer viruses and software attacks. Both hardware and software tokens are vulnerable to bot-based man-in-the-middle attacks, or to simple phishing attacks in which the one-time password provided by the token is solicited, and then supplied to the genuine website in a timely manner. Software tokens do have benefits: there is no physical token to carry, they do not contain batteries that will run out, and they are cheaper than hardware tokens. (Wikipedia).

Video thumbnail

Michael Joswig - What is Mathematical Software

What Is Mathematical Software? A short answer to this question is: Mathematical Software is what mathematics receives as a benefit from the digital age. This is relevant because Mathematical Software is useful in many ways. For instance, Mathematical Software serves as a tool to support

From playlist Research Spotlight

Video thumbnail

APIs for Beginners - How to use an API (Full Course / Tutorial)

⚠️ Watch the UPDATED version of this course: https://youtu.be/WXsD0ZgxjRw What is an API? Learn all about APIs (Application Programming Interfaces) in this full tutorial for beginners. You will learn what APIs do, why APIs exist, and the many benefits of APIs. APIs are used all the time i

From playlist Computer Science Concepts

Video thumbnail

Token Authentication for Java Applications

In this presentation, Les will demystify HTTP Authentication and explain how the Next Big Thing - Token Authentication - can be used to secure web applications on the JVM, REST APIs, and 'unsafe' clients while supporting security best practices and even improving your application's perform

From playlist Software Development Lectures

Video thumbnail

What Is Infrastructure As Code?

Infrastructure as code is a central idea in Continuous Delivery. The environment in which our software exists is a dependency of our software, so we need to control that environment as far as we can. If our aim is to release software reliably and repeatedly we need to control the variables

From playlist Software Engineering

Video thumbnail

RailsConf 2017: Portable Sessions with JSON Web Tokens by Lance Ivy

RailsConf 2017: Portable Sessions with JSON Web Tokens by Lance Ivy Ever wonder why applications use sessions and APIs use tokens? Must there really be a difference? JSON Web Tokens are an emerging standard for portable secure messages. We'll talk briefly about how they're built and how t

From playlist RailsConf 2017

Video thumbnail

Demonstration of Gemalto USB Token

Gemalto USB Tokens - An unbeatable data security solution. KDK Software is the Gemalto Certified Partner Enterprise in India. Buy USB Token India reach us at +91-9314517671. Download USB token Driver. Visit Us: www.gemalto.kdksoftware.com

From playlist Cryptography, Security

Video thumbnail

How To Create A Security Token In Ethereum | Session 06 | #blockchain

Don’t forget to subscribe! In this project series, you will learn to create a security token in Ethereum. This tutorial will cover all the details that are necessary to build an Ethereum based security token. You will be guided through all the steps of creating and deploying your securi

From playlist Create A Security Token In Ethereum

Video thumbnail

Language based Pre-training for Drug Discovery | Healthcare NLP Summit 2021

Get your Free Spark NLP and Spark OCR Free Trial: https://www.johnsnowlabs.com/spark-nlp-try-free/ Register for NLP Summit 2021: https://www.nlpsummit.org/2021-events/ Watch all Healthcare NLP Summit 2021 sessions: https://www.nlpsummit.org/ Pretraining has taken the NLP world by storm

From playlist Healthcare NLP Summit 2021

Video thumbnail

The Computer Chronicles - Computer Networks (1985)

This episode explores the constant development of LANs as well as potential applications of dial-up networking. Special thanks to archive.org for hosting these episodes. Downloads of all these episodes and more can be found at: http://archive.org/details/computerchronicles

From playlist The Computer Chronicles 1985 Episodes

Video thumbnail

How To Create A Security Token In Ethereum | Session 04 | #blockchain

Don’t forget to subscribe! In this project series, you will learn to create a security token in Ethereum. This tutorial will cover all the details that are necessary to build an Ethereum based security token. You will be guided through all the steps of creating and deploying your securi

From playlist Create A Security Token In Ethereum

Video thumbnail

What’s new in Stanford NLP and Stanza

Presented by: John Bauer, Research Programmer at Stanford University In this talk, I will discuss updates to Stanza, our Python natural language processing toolkit supporting 70 human languages. Compared to existing widely used toolkits, Stanza features a language-agnostic fully neural pi

From playlist NLP Summit 2021

Video thumbnail

Webinar: Authorizing Access to Science Gateway Resources

Presented by Jim Basney of NCSA & Trusted CI, Marlon Pierce of Indiana University & SGCI, and Tom Barton of the University of Chicago & Internet2 Presentation slides are available on our website: https://sciencegateways.org/-/authorizing-access-to-science-gateway-resources Data use agree

From playlist Center for Applied Cybersecurity Research (CACR)

Video thumbnail

19. Primary Markets, ICOs & Venture Capital, Part 1

MIT 15.S12 Blockchain and Money, Fall 2018 Instructor: Prof. Gary Gensler View the complete course: https://ocw.mit.edu/15-S12F18 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP63UUkfL0onkxF6MYgVa04Fn Prof. Gensler talks about crowdfunding with Initial Coin Offerings (

From playlist MIT 15.S12 Blockchain and Money, Fall 2018

Video thumbnail

Looking For Grammar In All The Right Places | Alethea Power | OpenAI Scholars Demo Day 2020

Learn more: https://openai.com/blog/openai-scholars-2020-final-projects#alethea

From playlist Events and Talks

Video thumbnail

Stanza: A Multi-lingual Multi-domain Python Natural Language Processing Toolkit | NLP Summit 2020

Get your Free Spark NLP and Spark OCR Free Trial: https://www.johnsnowlabs.com/spark-nlp-try-free/ Register for NLP Summit 2021: https://www.nlpsummit.org/2021-events/ Watch all NLP Summit 2020 sessions: https://www.nlpsummit.org/ The growing availability of open-source natural languag

From playlist NLP Summit 2020

Video thumbnail

Decoupling Applications from Architectures - Jeff Hoffer - JSConf US 2019

Software is the most malleable building material we've ever created, and yet Technical Debt continues to plague the choices we make when building applications. When we talk about starting new projects, there's always a debate over getting something out the door knowing we're taking on Tec

From playlist JSConf US 2019

Video thumbnail

Benefits and challenges in de-identifying and linking unstructured records | Healthcare NLP Summit

Get your Free Spark NLP and Spark OCR Free Trial: https://www.johnsnowlabs.com/spark-nlp-try-free/ Register for NLP Summit 2021: https://www.nlpsummit.org/2021-events/ Watch all Healthcare NLP Summit 2021 sessions: https://www.nlpsummit.org/ There are tremendous research benefits of li

From playlist Healthcare NLP Summit 2021

Related pages

Public-key cryptography | Shared secret | Man-in-the-middle attack