A comprehensive formal security analysis of OAuth 2.0

D Fett, R Küsters, G Schmitz - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on
(SSO) protocols and also serves as the foundation for the new SSO standard OpenID …

Analysis of security and privacy issues of information management of big data in B2B based healthcare systems

BB Gupta, A Gaurav, PK Panigrahi - Journal of Business Research, 2023 - Elsevier
The healthcare industry may benefit from the implementation of a system that facilitates safe
and efficient data transmission if business-to-business (B2B) methods were more widely …

Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services

R Wang, S Chen, XF Wang - 2012 IEEE Symposium on …, 2012 - ieeexplore.ieee.org
With the boom of software-as-a-service and social networking, web-based single sign-on
(SSO) schemes are being deployed by more and more commercial websites to safeguard …

A blockchain footprint for authentication of IoT-enabled smart devices in smart cities: state-of-the-art advancements, challenges and future research directions

U Khalil, OA Malik, S Hussain - IEEE Access, 2022 - ieeexplore.ieee.org
The mechanisms based on the distributed environment have become an obvious choice for
solutions, while they have not been limited only to a specific domain (ie, crypto-currency) …

Oauth demystified for mobile application developers

EY Chen, Y Pei, S Chen, Y Tian, R Kotcher… - Proceedings of the 2014 …, 2014 - dl.acm.org
OAuth has become a highly influential protocol due to its swift and wide adoption in the
industry. The initial objective of the protocol was specific: it serves the authorization needs …

A thermal-driven floorplanning algorithm for 3D ICs

J Cong, J Wei, Y Zhang - IEEE/ACM International Conference …, 2004 - ieeexplore.ieee.org
As the technology progresses, interconnect delays have become bottlenecks of chip
performance. 3D integrated circuits are proposed as one way to address this problem …

A comparative analysis on blockchain versus centralized authentication architectures for IoT-enabled smart devices in smart cities: a comprehensive review, recent …

U Khalil, OA Malik, M Uddin, CL Chen - Sensors, 2022 - mdpi.com
Smart devices have become an essential part of the architectures such as the Internet of
Things (IoT), Cyber-Physical Systems (CPSs), and Internet of Everything (IoE). In contrast …

A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks

K Hasan, MJM Chowdhury, K Biswas, K Ahmed… - Computer Networks, 2022 - Elsevier
In the past few years, blockchain has proven its necessity and unprecedented prospects in
providing a secure environment for information exchange between two parties. The …

New privacy issues in mobile telephony: fix and verification

M Arapinis, L Mancini, E Ritter, M Ryan… - Proceedings of the …, 2012 - dl.acm.org
Mobile telephony equipment is daily carried by billions of subscribers everywhere they go.
Avoiding linkability of subscribers by third parties, and protecting the privacy of those …

[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …