Login / Signup
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations.
Wanpeng Li
Chris J. Mitchell
Thomas M. Chen
Published in:
Security Protocols Workshop (2018)
Keyphrases
</>
source code
efficient implementation
database
learning environment
multi agent systems
lower bound
error detection
error correcting
error correcting codes
malicious code