A comprehensive formal security analysis of OAuth 2.0
The OAuth 2.0 protocol is one of the most widely deployed authorization/single sign-on
(SSO) protocols and also serves as the foundation for the new SSO standard OpenID …
(SSO) protocols and also serves as the foundation for the new SSO standard OpenID …
Analysis of security and privacy issues of information management of big data in B2B based healthcare systems
BB Gupta, A Gaurav, PK Panigrahi - Journal of Business Research, 2023 - Elsevier
The healthcare industry may benefit from the implementation of a system that facilitates safe
and efficient data transmission if business-to-business (B2B) methods were more widely …
and efficient data transmission if business-to-business (B2B) methods were more widely …
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
With the boom of software-as-a-service and social networking, web-based single sign-on
(SSO) schemes are being deployed by more and more commercial websites to safeguard …
(SSO) schemes are being deployed by more and more commercial websites to safeguard …
A blockchain footprint for authentication of IoT-enabled smart devices in smart cities: state-of-the-art advancements, challenges and future research directions
The mechanisms based on the distributed environment have become an obvious choice for
solutions, while they have not been limited only to a specific domain (ie, crypto-currency) …
solutions, while they have not been limited only to a specific domain (ie, crypto-currency) …
Oauth demystified for mobile application developers
OAuth has become a highly influential protocol due to its swift and wide adoption in the
industry. The initial objective of the protocol was specific: it serves the authorization needs …
industry. The initial objective of the protocol was specific: it serves the authorization needs …
A thermal-driven floorplanning algorithm for 3D ICs
As the technology progresses, interconnect delays have become bottlenecks of chip
performance. 3D integrated circuits are proposed as one way to address this problem …
performance. 3D integrated circuits are proposed as one way to address this problem …
A comparative analysis on blockchain versus centralized authentication architectures for IoT-enabled smart devices in smart cities: a comprehensive review, recent …
Smart devices have become an essential part of the architectures such as the Internet of
Things (IoT), Cyber-Physical Systems (CPSs), and Internet of Everything (IoE). In contrast …
Things (IoT), Cyber-Physical Systems (CPSs), and Internet of Everything (IoE). In contrast …
A blockchain-based secure data-sharing framework for Software Defined Wireless Body Area Networks
In the past few years, blockchain has proven its necessity and unprecedented prospects in
providing a secure environment for information exchange between two parties. The …
providing a secure environment for information exchange between two parties. The …
New privacy issues in mobile telephony: fix and verification
Mobile telephony equipment is daily carried by billions of subscribers everywhere they go.
Avoiding linkability of subscribers by third parties, and protecting the privacy of those …
Avoiding linkability of subscribers by third parties, and protecting the privacy of those …