Login / Signup

Breaking and Fixing Mobile App Authentication with OAuth2.0-based Protocols.

Ronghai YangWing Cheong LauShangcheng Shi
Published in: ACNS (2017)
Keyphrases
  • mobile apps
  • authentication protocol
  • key distribution
  • mobile applications
  • business models
  • analytic tools
  • mobile devices
  • smart card
  • smart phones
  • database
  • mobile phone
  • secret key