Login / Signup
Modular Security Analysis of OAuth 2.0 in the Three-Party Setting.
Xinyu Li
Jing Xu
Zhenfeng Zhang
Xiao Lan
Yuchen Wang
Published in:
EuroS&P (2020)
Keyphrases
</>
security analysis
smart card
public key
security requirements
high security
image encryption
authentication protocol
security model
security properties
mutual authentication
user authentication
encryption scheme
proxy signature scheme
data mining
encryption algorithm
information security
data model
multiresolution