[go: up one dir, main page]

Harisha et al., 2023 - Google Patents

Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital Signatures

Harisha et al., 2023

Document ID
8698394351475643475
Author
Harisha A
Salian L
Yermal A
Shastry C
Publication year
Publication venue
Advancements in Cybercrime Investigation and Digital Forensics

External Links

Snippet

Only a few authorization protocols could be used to offer protected server resources to Client applications. The requesting entity must generally have a token in order to use authorization methods. The safety of the tokens is crucial because the token is in the hands of an …
Continue reading at www.taylorfrancis.com (other versions)

Similar Documents

Publication Publication Date Title
JP6924798B2 (en) Federated blockchain identity model and personally identifiable and secure information data transmission model for RCS
US9686080B2 (en) System and method to provide secure credential
US20240305476A1 (en) Systems and methods for providing authentication to a plurality of devices
Boyd Getting started with OAuth 2.0
JP6348661B2 (en) Company authentication through third-party authentication support
US8220035B1 (en) System and method for trusted embedded user interface for authentication
US20180183586A1 (en) Assigning user identity awareness to a cryptographic key
David et al. Cloud Security Service for Identifying Unauthorized User Behaviour.
US20100250955A1 (en) Brokered information sharing system
US20100082989A1 (en) Storing Composite Services on Untrusted Hosts
CN102893575B (en) One-time passwords with IPSEC and IKE version 1 authentication
Yildiz et al. Toward interoperable self-sovereign identities
Abdelrazig Abubakar et al. Blockchain-based identity and authentication scheme for MQTT protocol
KR20180080183A (en) Systems and methods for biometric protocol standards
Bichsel et al. An architecture for privacy-ABCs
Abubakar-Sadiq Establishing secure and privacy preserving digital identity with self-sovereign identity
Harisha et al. Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital Signatures
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Farhad et al. Secure backup and recovery of ssi wallets using solid pod technology
Gupta et al. Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications
Fongen et al. The integration of trusted platform modules into a tactical identity management system
Vanella Evolution of Digital Identity in Europe: Experimenting with the eIDAS 2.0 Framework and the EU Digital Identity Wallet
Jeannot Kerberos V5
Benson et al. Security & integrity in FHIR
Keil Social Security