Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
ISO/IEC 9798-1 (1997) Information technology – security techniques – entity authentication – Part 1: General
FIPS 196 (1997) Entity authentication using public key cryptography. Federal Information Processing Standards Publication 196, U.S. Department of Commerce/NIST, National Technical Information Service, Springfield, Virginia
M’Raihi D, Bellare M, Hoornaert F, Naccache D, Ranen O (2005). HOTP: an HMAC-based one-time password algorithm. RFC 4226
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Zuccherato, R. (2011). Authentication Token. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_68
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_68
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering