Author of the publication

A study on secure user authentication and authorization in OAuth protocol.

, , and . Clust. Comput., 22 (Suppl 1): 1991-1999 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Public Key Infrastructure Systems for Authentication., , , , and . PDPTA, page 187-192. CSREA Press, (1999)Development of low-complexity all-digital frequency locked loop as 500 MHz reference clock generator for field-programmable gate array., , , , and . IET Circuits Devices Syst., 8 (2): 73-81 (2014)Object Recognition and Tracking based on Object Feature Extracting., , , and . J. Internet Serv. Inf. Secur., 5 (3): 48-57 (2015)Enhanced secure device authentication algorithm in P2P-based smart farm system., and . Peer-to-Peer Netw. Appl., 11 (6): 1230-1239 (2018)Research of multi-object detection and tracking using machine learning based on knowledge for video surveillance system., and . Pers. Ubiquitous Comput., 26 (2): 385-394 (2022)Photo quality enhancement by relocating subjects., and . Clust. Comput., 19 (2): 939-948 (2016)A study on secure user authentication and authorization in OAuth protocol., , and . Clust. Comput., 22 (Suppl 1): 1991-1999 (2019)A low complexity image stitching using advanced feature matching in mobile environments., , , and . J. Comput. Virol. Hacking Tech., 10 (2): 129-136 (2014)Genetic algorithm to find the shortest path on raster data., , , , and . ICCAIS, page 144-147. IEEE, (2014)User Authentication Algorithm Guaranteeing Reusability of Biometric Data in BioPKI System., and . Wireless Personal Communications, 93 (1): 67-79 (2017)