An OAuth based authentication mechanism for IoT networks
暂无分享,去创建一个
Ki-Hyung Kim | Kangseok Kim | Young-Kyu Choi | DongYeop Hwang | Shamini Emerson | Kangseok Kim | Dongyeop Hwang | Ki-Hyung Kim | YoungJun Choi | S. Emerson
[1] Richard Barnes,et al. The OAuth Security Model for Delegated Authorization , 2009 .
[2] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[3] Dick Hardt,et al. The OAuth 2.0 Authorization Framework , 2012, RFC.
[4] Feng Yang,et al. A security analysis of the OAuth protocol , 2013, 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM).
[5] Hannes Tschofenig,et al. OAuth 2.0 Security: Going Beyond Bearer Tokens , 2012 .
[6] Kiseok Choi,et al. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access , 2015 .
[7] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.
[8] Eran Hammer-Lahav,et al. The OAuth 1.0 Protocol , 2010, RFC.
[9] Luca Veltri,et al. IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios , 2015, IEEE Sensors Journal.
[10] Hannes Tschofenig. The OAuth 2.0 Internet of Things (IoT) Client Credentials Grant , 2015 .