Login / Signup
Universally Composable Security Analysis of OAuth v2.0.
Suresh Chari
Charanjit S. Jutla
Arnab Roy
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
security analysis
smart card
security requirements
public key
image encryption
security model
high security
mutual authentication
security properties
authentication protocol
encryption algorithm
encryption scheme
private key
database systems
real time
data access
third party
authentication scheme
data integration