Harisha et al., 2023 - Google Patents
Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital SignaturesHarisha et al., 2023
- Document ID
- 8698394351475643475
- Author
- Harisha A
- Salian L
- Yermal A
- Shastry C
- Publication year
- Publication venue
- Advancements in Cybercrime Investigation and Digital Forensics
External Links
Snippet
Only a few authorization protocols could be used to offer protected server resources to Client applications. The requesting entity must generally have a token in order to use authorization methods. The safety of the tokens is crucial because the token is in the hands of an …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6924798B2 (en) | Federated blockchain identity model and personally identifiable and secure information data transmission model for RCS | |
US9686080B2 (en) | System and method to provide secure credential | |
US20240305476A1 (en) | Systems and methods for providing authentication to a plurality of devices | |
Boyd | Getting started with OAuth 2.0 | |
JP6348661B2 (en) | Company authentication through third-party authentication support | |
US8220035B1 (en) | System and method for trusted embedded user interface for authentication | |
US20180183586A1 (en) | Assigning user identity awareness to a cryptographic key | |
David et al. | Cloud Security Service for Identifying Unauthorized User Behaviour. | |
US20100250955A1 (en) | Brokered information sharing system | |
US20100082989A1 (en) | Storing Composite Services on Untrusted Hosts | |
CN102893575B (en) | One-time passwords with IPSEC and IKE version 1 authentication | |
Yildiz et al. | Toward interoperable self-sovereign identities | |
Abdelrazig Abubakar et al. | Blockchain-based identity and authentication scheme for MQTT protocol | |
KR20180080183A (en) | Systems and methods for biometric protocol standards | |
Bichsel et al. | An architecture for privacy-ABCs | |
Abubakar-Sadiq | Establishing secure and privacy preserving digital identity with self-sovereign identity | |
Harisha et al. | Open Standard Authorization Protocol: OAuth 2.0 Defenses and Working Using Digital Signatures | |
Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
Farhad et al. | Secure backup and recovery of ssi wallets using solid pod technology | |
Gupta et al. | Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications | |
Fongen et al. | The integration of trusted platform modules into a tactical identity management system | |
Vanella | Evolution of Digital Identity in Europe: Experimenting with the eIDAS 2.0 Framework and the EU Digital Identity Wallet | |
Jeannot | Kerberos V5 | |
Benson et al. | Security & integrity in FHIR | |
Keil | Social Security |