Login / Signup
Implementation Vulnerability Associated with OAuth 2.0 - A Case Study on Dropbox.
Bruce Wu
Tung Nguyen
Mohammad Husain
Published in:
ITNG (2015)
Keyphrases
</>
efficient implementation
databases
case study
multi agent systems
test bed
implementation details
real time
artificial intelligence
computational complexity
digital libraries
artificial neural networks
general purpose
parallel implementation