Login / Signup
A study on secure user authentication and authorization in OAuth protocol.
Cheol-Joo Chae
Ki-Bong Kim
Han-Jin Cho
Published in:
Clust. Comput. (2019)
Keyphrases
</>
user authentication
security analysis
authentication protocol
security requirements
lightweight
security protocols
real time
authentication scheme
cloud computing
encryption scheme