Academic literature on the topic 'Token system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Token system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Token system"

1

Putri, Marsha Chikita Intania, Parman Sukarno, and Aulia Arif Wardana. "Two factor authentication framework based on ethereum blockchain with dApp as token generation system instead of third-party on web application." Register: Jurnal Ilmiah Teknologi Sistem Informasi 6, no. 2 (June 3, 2020): 74. http://dx.doi.org/10.26594/register.v6i2.1932.

Full text
Abstract:
Authentication is a method for securing an account by verifying the user identity by inputting email with a password. Two factor authentications is an authentication system that combines the first-factor authentication with the second factor. General two factor authentication by entering an email or username with a password are similar. However, two factor authentication requires additional information that must be inputted by the user. Additional information can be in the form of tokens or one-time passwords (OTP). Two factor authentications generally still uses third-party services to generate token or OTP still have vulnerable because can attacked from tokens steal through MITM and found that the generated tokens with the same value. Therefore, we propose a two-factor authentication framework based on ethereum blockchain with dApp as token generation system. Firstly, outcome from the analysis of the system, next succeeded in creating a two-factor authentication system without using third-parties. Second, token system generate up to 3164 different tokens in one second and has been collisions tested. Third, security method to protect token from MITM attack. The attacker unable to get access caused all the checking are done by dApp user authentication.
APA, Harvard, Vancouver, ISO, and other styles
2

Kim, Moon, and Jee Chung. "Sustainable Growth and Token Economy Design: The Case of Steemit." Sustainability 11, no. 1 (December 30, 2018): 167. http://dx.doi.org/10.3390/su11010167.

Full text
Abstract:
Cryptocurrency blockchain technology is attracting worldwide attention, and the number of initial coin offerings (ICOs) is increasing rapidly. This new economic trend, called cryptoeconomics, can program human behavior through incentive design. A cryptocurrency-based incentive system is not only transparent, but also allows businesses to substitute initial investment costs with cryptocurrency tokens until they are on a sustainable growth trajectory in terms of network effects. This study aims to propose a process for building a desirable model of a token economy, based on the case of Steemit—a blogging and social networking website that is creating high values due to its efficient token economy model. We suggest the following design process of a token economy model: (1) Determine token-business fit, (2) determine the chance of success, (3) determine the properties of token, (4) give tokens intrinsic value, (5) establish strategies to raise token value, (6) establish operational strategies of token economy system, (7) establish strategies for token liquidation, and (8) continue modifying the operational base. Considering cryptoeconomics is still at an early stage, it is expected that the guidelines on the token economy model suggested in this paper will lay a significant foundation for the development of cryptoeconomics research.
APA, Harvard, Vancouver, ISO, and other styles
3

Jánoky, László Viktor, János Levendovszky, and Péter Ekler. "An analysis on the revoking mechanisms for JSON Web Tokens." International Journal of Distributed Sensor Networks 14, no. 9 (September 2018): 155014771880153. http://dx.doi.org/10.1177/1550147718801535.

Full text
Abstract:
JSON Web Tokens provide a scalable solution with significant performance benefits for user access control in decentralized, large-scale distributed systems. Such examples would entail cloud-based, micro-services styled systems or typical Internet of Things solutions. One of the obstacles still preventing the wide-spread use of JSON Web Token–based access control is the problem of invalidating the issued tokens upon clients leaving the system. Token invalidation presently takes a considerable processing overhead or a drastically increased architectural complexity. Solving this problem without losing the main benefits of JSON Web Tokens still remains an open challenge which will be addressed in the article. We are going to propose some solutions to implement low-complexity token revocations and compare their characteristics in different environments with the traditional solutions. The proposed solutions have the benefit of preserving the advantages of JSON Web Tokens, while also adhering to stronger security constraints and possessing a finely tuneable performance cost.
APA, Harvard, Vancouver, ISO, and other styles
4

Bockelman, Brian, Andrea Ceccanti, Thomas Dack, Dave Dykstra, Maarten Litmaath, Mischa Sallé, and Hannah Short. "WLCG Token Usage and Discovery." EPJ Web of Conferences 251 (2021): 02028. http://dx.doi.org/10.1051/epjconf/202125102028.

Full text
Abstract:
Since 2017, the Worldwide LHC Computing Grid (WLCG) has been working towards enabling token based authentication and authorisation throughout its entire middleware stack. Following the publication of the WLCG Common JSON Web Token (JWT) Schema v1.0 [1] in 2019, middleware developers have been able to enhance their services to consume and validate the JWT-based [2] OAuth2.0 [3] tokens and process the authorization information they convey. Complex scenarios, involving multiple delegation steps and command line flows, are a key challenge to be addressed in order for the system to be fully operational. This paper expands on the anticipated token based workflows, with a particular focus on local storage of tokens and their discovery by services. The authors include a walk-through of this token flow in the RUCIO managed data-transfer scenario, including delegation to FTS and authorised access to storage elements. Next steps are presented, including the current target of submitting production jobs authorised by Tokens within 2021.
APA, Harvard, Vancouver, ISO, and other styles
5

Hao, Yong Ping, Xiao Lei Xu, Wei Ping Shao, and Peng Fei Zeng. "A Method of Business Process Modeling Based on Petri Net." Key Engineering Materials 450 (November 2010): 413–16. http://dx.doi.org/10.4028/www.scientific.net/kem.450.413.

Full text
Abstract:
Through the analysis of the execution and dispatching principle of the Petri net, the business process management mode based on Petri net is proposed. We merge the place node and the transition node, and reside the token in the node. The only token in process instances and the sub-token in parallel process are introduced, which can avoid conflicts caused by multi-tokens. The business process model for the drawings design and approval is established, and it is verified by the workflow modeling system.
APA, Harvard, Vancouver, ISO, and other styles
6

Wilding, Denise, Clare Rowan, Bill Maurer, Denise Schmandt-Besserat, Denise Wilding, Clare Rowan, Bill Maurer, and Denise Schmandt-Besserat. "Tokens, Writing and (Ac)counting: A Conversation with Denise Schmandt-Besserat and Bill Maurer." Exchanges: The Interdisciplinary Research Journal 5, no. 1 (October 27, 2017): 1–14. http://dx.doi.org/10.31273/eirj.v5i1.196.

Full text
Abstract:
In her foundational study of Neolithic clay tokens, the renowned archaeologist Denise Schmandt-Besserat identified that different token shapes represented different goods and were used in accounting and distribution. When these tokens came to be stored in sealed clay envelopes (likely representing a debt), each token was impressed on the outside of the envelope before being placed inside (thus allowing people to see quickly what was within). Three-dimensional objects were thus reduced to two-dimensional representations, the first form of writing (and contributing to cuneiform script). These clay envelopes in turn developed into pictographic tablets; here each token did not have to be impressed into the clay in a 'one, one, one' system, but instead quantity was indicated by a numerical symbol - abstract number was born. Much of Schmandt-Besserat’s work can be found online at https://sites.utexas.edu/dsb/. Her book ‘How Writing Came About’ was listed by American Scientist magazine as one of the 100 books that shaped science in the 20th century, and she remains an active expert on all things ‘token’.
APA, Harvard, Vancouver, ISO, and other styles
7

Reynolds, Graham J. "A Token Based Graphics System." Computer Graphics Forum 5, no. 2 (June 1986): 139–45. http://dx.doi.org/10.1111/j.1467-8659.1986.tb00283.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scott, Derek W., and Rodger Ll Wood. "The Role of Food Substitutes in a Token Economy System." British Journal of Psychiatry 150, no. 6 (June 1987): 864–67. http://dx.doi.org/10.1192/bjp.150.6.864.

Full text
Abstract:
Data from five behaviour management (token economy) units were analysed for periods of 10–20 weeks before and after the use of a food substitute (Complan®), provided when insufficient tokens had been earned to buy a full- or part-meal. The efficacy of this form of negative punishment to control disturbed and aggressive behaviour was examined. No evidence was found to suggest that the contingent use of a food substitute made any contribution to the therapeutic process.
APA, Harvard, Vancouver, ISO, and other styles
9

Engelmann, Felix, Lukas Müller, Andreas Peter, Frank Kargl, and Christoph Bösch. "SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 270–90. http://dx.doi.org/10.2478/popets-2021-0070.

Full text
Abstract:
Abstract Decentralized token exchanges allow for secure trading of tokens without a trusted third party. However, decentralization is mostly achieved at the expense of transaction privacy. For a fair exchange, transactions must remain private to hide the participants and volumes while maintaining the possibility for noninteractive execution of trades. In this paper we present a swap confidential transaction system (SwapCT) which is related to ring confidential transactions (e.g. used in Monero) but supports multiple token types to trade among and enables secure, partial transactions for noninteractive swaps. We prove that SwapCT is secure in a strict, formal model and present its efficient performance in a prototype implementation with logarithmic signature sizes for large anonymity sets. For our construction we design an aggregatable signature scheme which might be of independent interest. Our SwapCT system thereby enables a secure and private exchange for tokens without a trusted third party.
APA, Harvard, Vancouver, ISO, and other styles
10

Winkler, Robin C. "Twenty Years of Token Economies in Psychiatric Institutions: Some Basic Issues." Behaviour Change 2, no. 2 (June 1985): 111–18. http://dx.doi.org/10.1017/s0813483900008925.

Full text
Abstract:
Developments over the last twenty years in the use of token economies in psychiatric institutions are reviewed. Token economies are considered in the context of two systems: the internal social system of psychiatric institutions and the mental health service system as a whole. Two themes emerge: the first concerns difficulties in establishing and maintaining token economies and the second, the impact of deinstitutionalization policies. It is argued that, although token economies remain viable for intervention goals internal to the institution, they have not been proven viable in furthering the goals of deinstitutionalization. Post-institutional programmes and community alternatives to institutions are of more current value than token economies in institutions.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Token system"

1

Nalli, Sehar K. "SYNCHRONIZED TOKEN GENERATOR SYSTEM." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1146151257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Jongbum. "Parallel token processing in an asynchronous trigger system." [Florida] : State University System of Florida, 1999. http://etd.fcla.edu/etd/uf/1999/amg2152/park%5Fj.pdf.

Full text
Abstract:
Thesis (Ph. D.)--University of Florida, 1999.
Title from first page of PDF file. Document formatted into pages; contains xiii, 166 p.; also contains graphics. Vita. Includes bibliographical references (p. 160-165).
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Bo. "On the optimization of the token bucket control mechanism." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26339.

Full text
Abstract:
During the past years, there has been an increasing interest in the design and development of network traffic controllers capable of ensuring the QoS requirements of a wide range of applications. In this thesis, based on previous work, we use a systems approach to construct a dynamic model for the token bucket mechanism: a traffic controller widely used in various QoS-aware protocol architectures. An enhanced model of multiplexor is also added into the multiple token buckets system model. In this way, the model represents a complete system at the access node of the network. We then develop an optimization algorithm based on a dynamic programming and genetic algorithm approach. Applying two MPEG-1 video traces and two self-similar traffic traces, we conduct an extensive campaign of numerical experiments allowing us to gain insight into the operation of the controller and evaluate the benefits of using a genetic algorithm approach to speed up the computation process based on dynamic programming. Our results show that the optimization is not only capable of getting the best cost, but also balancing the costs corresponding to different aspects. The results also shows that the use of the genetic algorithm proves particular useful in reducing the computation time required to optimize the operation of a system consisting of multiple token-bucket regulated sources.
APA, Harvard, Vancouver, ISO, and other styles
4

McNeely, Mitchell P. "A Comparison of Fixed- and Variable-Ratio Token Exchange-Production Schedules with Children with Autism Spectrum Disorder." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404526/.

Full text
Abstract:
The token economy is a widely used and versatile motivational system within applied behavior analysis. Moreover, token reinforcement procedures have been shown to be highly effective in the treatment of children with autism spectrum disorder (ASD). In the experimental analysis of behavior, token reinforcement contingencies are conceptualized as three interconnected schedule components: (1) the token-production schedule, (2) the exchange-production schedule, and (3) the token-exchange schedule. Basic work with nonhuman subjects has demonstrated that the exchange-production schedule is the primary driver of performance in these arrangements, and that variable-ratio exchange-production results in reduced pre-ratio pausing and greater overall rates of responding relative to fixed-ratio exchange-production schedules. However, little applied research has been conducted to assess the generality of these findings within applied settings. The purpose of this study was to determine if fixed- and variable-ratio token exchange-production schedules would exert differential effects on pre-ratio pausing and overall rates of responding for three children with ASD during a free-operant sorting task. The results showed that pre-ratio pausing and overall rates of responding were not differentially effected by the fixed- and variable-ratio exchange-production schedules. Discrepancies between the experimental work and the current study are discussed along with additional limitations.
APA, Harvard, Vancouver, ISO, and other styles
5

Wenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada
Security hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
APA, Harvard, Vancouver, ISO, and other styles
6

Waggy, Kimberly. "The effects of a token economy system in comparison to social praise on the manifest behaviors of elementary learning disabled students." Huntington, WV : [Marshall University Libraries], 2002. http://www.marshall.edu/etd/descript.asp?ref=441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bursum, Kim. "Initial Comparative Empirical Usability Testing for the Collaborative Authentication System." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6614.

Full text
Abstract:
The Collaborative Authentication (co-authentication) system is an authentication system that relies on some or all members of a pre-registered set of secure hardware tokens being concurrently present to an authentication server at the moment of authentication. Previous researchers have compared various embodiments of the co-authentication system to each other including using Quick Response (QR) codes/cellphone cameras and Near Field Communication (NFC) between tokens. This thesis concerns the initial design and implementation of empirical comparative testing mechanisms between one embodiment of the co-authentication system and other commonly used authentication systems. One contribution is the simulated standard user ID and password login in a computer browser and a simulated RSA SecureID ® one time password (OTP) and login with embedded usability testing mechanisms. Another contribution is the development and implementation of a new Bluetooth communication functionality between tokens. A third contribution is the addition of usability testing mechanisms to two versions of this new functionality.
APA, Harvard, Vancouver, ISO, and other styles
8

Tomaka, Ashley. "Evaluation of a level system with a built in token economy to decrease inappropriate behaviors of individuals with mental retardation." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0003116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Löbler, Helge. "When trust makes it worse - rating agencies as disembedded service systems in the U.S. financial crisis." Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-218169.

Full text
Abstract:
Rating agencies provide service by offering information about different kinds of securities and/or investment opportunities. This paper addresses questions often asked during the 2008 U.S. financial crisis: Why did no one see this coming? Why were all the explanations given afterward, not given before as precautions? Or if they were given before, why did nobody listen? Using Giddens’ idea of disembedded systems [Giddens A (1991a) The Consequences of Modernity (Polity Press, Cambridge, UK)], the paper describes and frames the phenomenon of U.S. financial crisis and the role of rating agencies in particular as a disembedded service system. Hereby it offers an explanation of the crises in contrast to the common incentive-oriented or moralizing perspectives. The paper shows that the U.S. financial crisis emerged from a disembedded service system, a simulacrum of ratings, which after a while was no more connected to the reality of securities. Information-providing service systems are in danger to become simulacra, and with it they can disembed. The paper offers a new insightful perspective on how to analyze and understand information-providing service systems and hence offers a perspective to avoid crises based on disembedded systems. This is the first paper to our knowledge to analyze information-providing service systems based on Giddens’ theory of abstract disembedded systems. It provides a new understanding of information-providing service systems that can help to avoid crises based on disembedded systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Löbler, Helge. "When trust makes it worse - rating agencies as disembedded service systems in the U.S. financial crisis." Informs, 2014. https://ul.qucosa.de/id/qucosa%3A15267.

Full text
Abstract:
Rating agencies provide service by offering information about different kinds of securities and/or investment opportunities. This paper addresses questions often asked during the 2008 U.S. financial crisis: Why did no one see this coming? Why were all the explanations given afterward, not given before as precautions? Or if they were given before, why did nobody listen? Using Giddens’ idea of disembedded systems [Giddens A (1991a) The Consequences of Modernity (Polity Press, Cambridge, UK)], the paper describes and frames the phenomenon of U.S. financial crisis and the role of rating agencies in particular as a disembedded service system. Hereby it offers an explanation of the crises in contrast to the common incentive-oriented or moralizing perspectives. The paper shows that the U.S. financial crisis emerged from a disembedded service system, a simulacrum of ratings, which after a while was no more connected to the reality of securities. Information-providing service systems are in danger to become simulacra, and with it they can disembed. The paper offers a new insightful perspective on how to analyze and understand information-providing service systems and hence offers a perspective to avoid crises based on disembedded systems. This is the first paper to our knowledge to analyze information-providing service systems based on Giddens’ theory of abstract disembedded systems. It provides a new understanding of information-providing service systems that can help to avoid crises based on disembedded systems.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Token system"

1

Token Ring. Wokingham, Eng: Addison Wesley, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nilausen, Jesper. Token ring networks. New York: Prentice Hall, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Token Ring troubleshooting guide. Carmel, IN: New Riders Pub., 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Token ring network design. Wokingham, England: Addison-Wesley, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Booth, Todd. Designing large token-ring networks. Patchogue, N.Y., U.S.A. (180 E. Main St., Patchogue 11772): Computer Technology Research Corp., 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

The token-ring management guide. New York: McGraw-Hill, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ethernet and Token Ring optimization. New York: M&T Books, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Client access token-ring connectivity. Loveland, Colo: Duke Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Networking with the IBM Token-Ring. Blue Ridge Summit, PA: TAB Books, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

IBM's token-ring networking handbook. New York: McGraw-Hill, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Token system"

1

Reynolds, G. J. "A Token Based Graphics System." In GKS Theory and Practice, 67–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 1987. http://dx.doi.org/10.1007/978-3-642-72930-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sasikala, K., F. Sweety, T. Kalyani, and D. G. Thomas. "Partial Array Token Petri Net and P System." In Membrane Computing, 135–52. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77102-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kalyani, T., T. T. Raman, D. G. Thomas, K. Bhuvaneswari, and P. Ravichandran. "Triangular Array Token Petri Net and P System." In Membrane Computing, 78–93. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77102-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moon, Daesung, Youn Hee Gil, Sung Bum Pan, and Yongwha Chung. "Implementation of the USB Token System for Fingerprint Verification." In Image Analysis, 998–1005. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-45103-x_131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Krishnamoorthy, A., V. C. Joshua, and Dhanya Babu. "A Token Based Parallel Processing Queueing System with Priority." In Communications in Computer and Information Science, 231–39. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66836-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liebau, Nicolas, Oliver Heckmann, Aleksandra Kovacevic, Andreas Mauthe, and Ralf Steinmetz. "Charging in Peer-to-Peer Systems Based on a Token Accounting System." In Performability Has its Price, 49–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11780502_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maurel, Denis, Brigitte Le Pévédic, and Olivier Rousseau. "The Syntactic Prediction with Token Automata: Application to HandiAS System." In Lecture Notes in Computer Science, 100–109. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48057-9_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cousin, B. "Digital video transmission and the FDDI token ring protocol." In Network and Operating System Support for Digital Audio and Video, 375–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/3-540-55639-7_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ho, Purdy, and John Armington. "A Dual-Factor Authentication System Featuring Speaker Verification and Token Technology." In Lecture Notes in Computer Science, 128–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44887-x_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chakravarthi, Veena S., and M. Shilpa. "Ingress Flow Based Triple Token Bucket Traffic Control System for Distributed Networks." In Lecture Notes in Electrical Engineering, 435–41. India: Springer India, 2013. http://dx.doi.org/10.1007/978-81-322-1524-0_51.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Token system"

1

Lim, Kiho, and Ismail M. Abumuhfouz. "STORS: Secure token reward system for vehicular clouds." In SoutheastCon 2015. IEEE, 2015. http://dx.doi.org/10.1109/secon.2015.7132920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kunyu, Peng, Zheng Jiande, and Yang Jing. "An identity authentication system based on mobile phone token." In 2009 IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC 2009). IEEE, 2009. http://dx.doi.org/10.1109/icnidc.2009.5360974.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, M. Fahim Ferdous, and Ken Sakamura. "A tamper-resistant digital token-based rights management system." In 2017 International Carnahan Conference on Security Technology (ICCST). IEEE, 2017. http://dx.doi.org/10.1109/ccst.2017.8167837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chimaladinne, Lavanya, and Nagaraju Sonti. "Automatic token allocation system through mobile in primary care." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017. http://dx.doi.org/10.1109/icecds.2017.8390181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wahjuni, Sri, and Rizky Pristian. "Android-based token authentication for securing the online transaction system." In 2016 International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2016. http://dx.doi.org/10.1109/ictc.2016.7763462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zouina, Mouad, and Benaceur Outtai. "Towards a distributed token based payment system using blockchain technology." In 2019 International Conference on Advanced Communication Technologies and Networking (CommNet). IEEE, 2019. http://dx.doi.org/10.1109/commnet.2019.8742380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Megalingam, Rajesh Kannan, P. S. Sreenath, Devidayal Soman, P. A. Jessin, and S. Srikanth. "Low Power Microcontroller Based Simple Smart Token Number Display System." In Fifth International Conference on MEMS, Nano, and Smart Systems (ICMENS 2009). IEEE, 2009. http://dx.doi.org/10.1109/icmens.2009.42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Anandasivam, Arun, and Dirk Neumann. "Token Exchange System as incentive mechanism for e-Science Grid." In Seventh IEEE International Symposium on Cluster Computing and the Grid. IEEE, 2007. http://dx.doi.org/10.1109/ccgrid.2007.114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Androulaki, Elli, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, and Björn Tackmann. "Privacy-preserving auditable token payments in a permissioned blockchain system." In AFT '20: 2nd ACM Conference on Advances in Financial Technologies. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3419614.3423259.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bardsley, Andrew, Luis Tarazona, and Doug Edwards. "Teak: A Token-Flow Implementation for the Balsa Language." In 2009 Ninth International Conference on Application of Concurrency to System Design (ACSD). IEEE, 2009. http://dx.doi.org/10.1109/acsd.2009.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Token system"

1

Kud, A. A. Figures and Tables. Reprinted from “Comprehensive сlassification of virtual assets”, A. A. Kud, 2021, International Journal of Education and Science, 4(1), 52–75. KRPOCH, 2021. http://dx.doi.org/10.26697/reprint.ijes.2021.1.6.a.kud.

Full text
Abstract:
Figure. Distributed Ledger Token Accounting System. Figure. Subjects of Social Relations Based on the Decentralized Information Platform. Figure. Derivativeness of a Digital Asset. Figure. Semantic Features of the Concept of a “Digital Asset” in Economic and Legal Aspects. Figure. Derivativeness of Polyassets and Monoassets. Figure. Types of Tokenized Assets Derived from Property. Figure. Visual Representation of the Methods of Financial and Management Accounting of Property Using Various Types of Tokenized Assets. Figure. Visual Representation of the Classification of Virtual Assets Based on the Complexity of Their Nature. Table. Comparison of Properties of Various Types of Virtual Assets of the Distributed Ledger Derivative of the Original Asset. Table. Main Properties and Parameters of Types of Tokenized Assets. Table. Classification of Virtual Assets as Tools for Implementing the Methods of Financial and Management Accounting of Property.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography