Login / Signup

A study on secure user authentication and authorization in OAuth protocol.

Cheol-Joo ChaeKi-Bong KimHan-Jin Cho
Published in: Clust. Comput. (2019)
Keyphrases
  • user authentication
  • security analysis
  • authentication protocol
  • security requirements
  • lightweight
  • security protocols
  • real time
  • authentication scheme
  • cloud computing
  • encryption scheme