Academic literature on the topic 'Token system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Token system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Token system"
Putri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (June 3, 2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.
Full textKim, Moon, and Jee Chung. "Sustainable Growth and Token Economy Design: The Case of Steemit." Sustainability 11, no. 1 (December 30, 2018): 167. http://dx.doi.org/10.3390/su11010167.
Full textJánoky, László Viktor, János Levendovszky, and Péter Ekler. "An analysis on the revoking mechanisms for JSON Web Tokens." International Journal of Distributed Sensor Networks 14, no. 9 (September 2018): 155014771880153. http://dx.doi.org/10.1177/1550147718801535.
Full textBockelman, Brian, Andrea Ceccanti, Thomas Dack, Dave Dykstra, Maarten Litmaath, Mischa Sallé, and Hannah Short. "WLCG Token Usage and Discovery." EPJ Web of Conferences 251 (2021): 02028. http://dx.doi.org/10.1051/epjconf/202125102028.
Full textHao, Yong Ping, Xiao Lei Xu, Wei Ping Shao, and Peng Fei Zeng. "A Method of Business Process Modeling Based on Petri Net." Key Engineering Materials 450 (November 2010): 413–16. http://dx.doi.org/10.4028/www.scientific.net/kem.450.413.
Full textWilding, Denise, Clare Rowan, Bill Maurer, Denise Schmandt-Besserat, Denise Wilding, Clare Rowan, Bill Maurer, and Denise Schmandt-Besserat. "Tokens, Writing and (Ac)counting: A Conversation with Denise Schmandt-Besserat and Bill Maurer." Exchanges: The Interdisciplinary Research Journal 5, no. 1 (October 27, 2017): 1–14. http://dx.doi.org/10.31273/eirj.v5i1.196.
Full textReynolds, Graham J. "A Token Based Graphics System." Computer Graphics Forum 5, no. 2 (June 1986): 139–45. http://dx.doi.org/10.1111/j.1467-8659.1986.tb00283.x.
Full textScott, Derek W., and Rodger Ll Wood. "The Role of Food Substitutes in a Token Economy System." British Journal of Psychiatry 150, no. 6 (June 1987): 864–67. http://dx.doi.org/10.1192/bjp.150.6.864.
Full textEngelmann, Felix, Lukas Müller, Andreas Peter, Frank Kargl, and Christoph Bösch. "SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 270–90. http://dx.doi.org/10.2478/popets-2021-0070.
Full textWinkler, Robin C. "Twenty Years of Token Economies in Psychiatric Institutions: Some Basic Issues." Behaviour Change 2, no. 2 (June 1985): 111–18. http://dx.doi.org/10.1017/s0813483900008925.
Full textDissertations / Theses on the topic "Token system"
Nalli, Sehar K. "SYNCHRONIZED TOKEN GENERATOR SYSTEM." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1146151257.
Full textPark, Jongbum. "Parallel token processing in an asynchronous trigger system." [Florida] : State University System of Florida, 1999. http://etd.fcla.edu/etd/uf/1999/amg2152/park%5Fj.pdf.
Full textTitle from first page of PDF file. Document formatted into pages; contains xiii, 166 p.; also contains graphics. Vita. Includes bibliographical references (p. 160-165).
Li, Bo. "On the optimization of the token bucket control mechanism." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26339.
Full textMcNeely, Mitchell P. "A Comparison of Fixed- and Variable-Ratio Token Exchange-Production Schedules with Children with Autism Spectrum Disorder." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404526/.
Full textWenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.
Full textSecurity hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
Waggy, Kimberly. "The effects of a token economy system in comparison to social praise on the manifest behaviors of elementary learning disabled students." Huntington, WV : [Marshall University Libraries], 2002. http://www.marshall.edu/etd/descript.asp?ref=441.
Full textBursum, Kim. "Initial Comparative Empirical Usability Testing for the Collaborative Authentication System." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6614.
Full textTomaka, Ashley. "Evaluation of a level system with a built in token economy to decrease inappropriate behaviors of individuals with mental retardation." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0003116.
Full textLöbler, Helge. "When trust makes it worse - rating agencies as disembedded service systems in the U.S. financial crisis." Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-218169.
Full textLöbler, Helge. "When trust makes it worse - rating agencies as disembedded service systems in the U.S. financial crisis." Informs, 2014. https://ul.qucosa.de/id/qucosa%3A15267.
Full textBooks on the topic "Token system"
Token Ring. Wokingham, Eng: Addison Wesley, 1992.
Find full textNilausen, Jesper. Token ring networks. New York: Prentice Hall, 1992.
Find full textToken Ring troubleshooting guide. Carmel, IN: New Riders Pub., 1992.
Find full textToken ring network design. Wokingham, England: Addison-Wesley, 1994.
Find full textBooth, Todd. Designing large token-ring networks. Patchogue, N.Y., U.S.A. (180 E. Main St., Patchogue 11772): Computer Technology Research Corp., 1989.
Find full textThe token-ring management guide. New York: McGraw-Hill, 1993.
Find full textEthernet and Token Ring optimization. New York: M&T Books, 1995.
Find full textClient access token-ring connectivity. Loveland, Colo: Duke Press, 1996.
Find full textNetworking with the IBM Token-Ring. Blue Ridge Summit, PA: TAB Books, 1987.
Find full textIBM's token-ring networking handbook. New York: McGraw-Hill, 1993.
Find full textBook chapters on the topic "Token system"
Reynolds, G. J. "A Token Based Graphics System." In GKS Theory and Practice, 67–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 1987. http://dx.doi.org/10.1007/978-3-642-72930-0_7.
Full textSasikala, K., F. Sweety, T. Kalyani, and D. G. Thomas. "Partial Array Token Petri Net and P System." In Membrane Computing, 135–52. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77102-7_8.
Full textKalyani, T., T. T. Raman, D. G. Thomas, K. Bhuvaneswari, and P. Ravichandran. "Triangular Array Token Petri Net and P System." In Membrane Computing, 78–93. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77102-7_5.
Full textMoon, Daesung, Youn Hee Gil, Sung Bum Pan, and Yongwha Chung. "Implementation of the USB Token System for Fingerprint Verification." In Image Analysis, 998–1005. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-45103-x_131.
Full textKrishnamoorthy, A., V. C. Joshua, and Dhanya Babu. "A Token Based Parallel Processing Queueing System with Priority." In Communications in Computer and Information Science, 231–39. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66836-9_19.
Full textLiebau, Nicolas, Oliver Heckmann, Aleksandra Kovacevic, Andreas Mauthe, and Ralf Steinmetz. "Charging in Peer-to-Peer Systems Based on a Token Accounting System." In Performability Has its Price, 49–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11780502_6.
Full textMaurel, Denis, Brigitte Le Pévédic, and Olivier Rousseau. "The Syntactic Prediction with Token Automata: Application to HandiAS System." In Lecture Notes in Computer Science, 100–109. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48057-9_9.
Full textCousin, B. "Digital video transmission and the FDDI token ring protocol." In Network and Operating System Support for Digital Audio and Video, 375–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/3-540-55639-7_32.
Full textHo, Purdy, and John Armington. "A Dual-Factor Authentication System Featuring Speaker Verification and Token Technology." In Lecture Notes in Computer Science, 128–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44887-x_16.
Full textChakravarthi, Veena S., and M. Shilpa. "Ingress Flow Based Triple Token Bucket Traffic Control System for Distributed Networks." In Lecture Notes in Electrical Engineering, 435–41. India: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-1524-0_51.
Full textConference papers on the topic "Token system"
Lim, Kiho, and Ismail M. Abumuhfouz. "STORS: Secure token reward system for vehicular clouds." In SoutheastCon 2015. IEEE, 2015. http://dx.doi.org/10.1109/secon.2015.7132920.
Full textKunyu, Peng, Zheng Jiande, and Yang Jing. "An identity authentication system based on mobile phone token." In 2009 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2009). IEEE, 2009. http://dx.doi.org/10.1109/icnidc.2009.5360974.
Full textKhan, M. Fahim Ferdous, and Ken Sakamura. "A tamper-resistant digital token-based rights management system." In 2017 International Carnahan Conference on Security Technology (ICCST). IEEE, 2017. http://dx.doi.org/10.1109/ccst.2017.8167837.
Full textChimaladinne, Lavanya, and Nagaraju Sonti. "Automatic token allocation system through mobile in primary care." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017. http://dx.doi.org/10.1109/icecds.2017.8390181.
Full textWahjuni, Sri, and Rizky Pristian. "Android-based token authentication for securing the online transaction system." In 2016 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2016. http://dx.doi.org/10.1109/ictc.2016.7763462.
Full textZouina, Mouad, and Benaceur Outtai. "Towards a distributed token based payment system using blockchain technology." In 2019 International Conference on Advanced Communication Technologies and Networking (CommNet). IEEE, 2019. http://dx.doi.org/10.1109/commnet.2019.8742380.
Full textMegalingam, Rajesh Kannan, P. S. Sreenath, Devidayal Soman, P. A. Jessin, and S. Srikanth. "Low Power Microcontroller Based Simple Smart Token Number Display System." In Fifth International Conference on MEMS, Nano, and Smart Systems (ICMENS 2009). IEEE, 2009. http://dx.doi.org/10.1109/icmens.2009.42.
Full textAnandasivam, Arun, and Dirk Neumann. "Token Exchange System as incentive mechanism for e-Science Grid." In Seventh IEEE International Symposium on Cluster Computing and the Grid. IEEE, 2007. http://dx.doi.org/10.1109/ccgrid.2007.114.
Full textAndroulaki, Elli, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, and Björn Tackmann. "Privacy-preserving auditable token payments in a permissioned blockchain system." In AFT '20: 2nd ACM Conference on Advances in Financial Technologies. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3419614.3423259.
Full textBardsley, Andrew, Luis Tarazona, and Doug Edwards. "Teak: A Token-Flow Implementation for the Balsa Language." In 2009 Ninth International Conference on Application of Concurrency to System Design (ACSD). IEEE, 2009. http://dx.doi.org/10.1109/acsd.2009.15.
Full textReports on the topic "Token system"
Kud, A. A. Figures and Tables. Reprinted from “Comprehensive сlassification of virtual assets”, A. A. Kud, 2021, International Journal of Education and Science, 4(1), 52–75. KRPOCH, 2021. http://dx.doi.org/10.26697/reprint.ijes.2021.1.6.a.kud.
Full text