暂无分享,去创建一个
[1] Yuan Tian,et al. OAuth Demystified for Mobile Application Developers , 2014, CCS.
[2] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Michael D. Ernst,et al. Automatic Trigger Generation for Rule-based Smart Homes , 2016, PLAS@CCS.
[4] Earlence Fernandes,et al. Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[5] Daniel Jackson,et al. Multi-representational security analysis , 2016, SIGSOFT FSE.
[6] Dick Hardt,et al. The OAuth 2.0 Authorization Framework , 2012, RFC.
[7] Sylvia Ratnasamy,et al. BlindBox: Deep Packet Inspection over Encrypted Traffic , 2015, SIGCOMM.
[8] XiaoFeng Wang,et al. Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services , 2012, 2012 IEEE Symposium on Security and Privacy.
[9] Hao Chen,et al. Simple Encrypted Arithmetic Library - SEAL v2.1 , 2016, Financial Cryptography Workshops.
[10] Fadi Mohsen,et al. Towards Enhancing the Security of OAuth Implementations in Smart Phones , 2014, 2014 IEEE International Conference on Mobile Services.
[11] Hui Liu,et al. Vulnerability Assessment of OAuth Implementations in Android Applications , 2015, ACSAC 2015.
[12] Konstantin Beznosov,et al. The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems , 2012, CCS.
[13] Blase Ur,et al. Practical trigger-action programming in the smart home , 2014, CHI.
[14] Jiyun Lee,et al. Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes , 2016, CHI.
[15] Ralf Küsters,et al. A Comprehensive Formal Security Analysis of OAuth 2.0 , 2016, CCS.
[16] Rui Wang,et al. Unauthorized origin crossing on mobile platforms: threats and mitigation , 2013, CCS.