_version_ |
1780992802377695232
|
annif_keywords_txtF_mv |
Internet
data security
phishing
information networks
authentication
|
annif_uris_txtF_mv |
http://www.yso.fi/onto/yso/p20405
http://www.yso.fi/onto/yso/p5479
http://www.yso.fi/onto/yso/p27723
http://www.yso.fi/onto/yso/p12936
http://www.yso.fi/onto/yso/p24130
|
author |
Vijayan, Anoop
|
author2 |
Informaatioteknologian tiedekunta
Faculty of Information Technology
Informaatioteknologia
Information Technology
Jyväskylän yliopisto
University of Jyväskylä
Mobile Technology and Business (maisteriohjelma)
Master's Degree Programme in Mobile Technology and Business
601
|
author_facet |
Vijayan, Anoop
Informaatioteknologian tiedekunta
Faculty of Information Technology
Informaatioteknologia
Information Technology
Jyväskylän yliopisto
University of Jyväskylä
Mobile Technology and Business (maisteriohjelma)
Master's Degree Programme in Mobile Technology and Business
601
Vijayan, Anoop
|
author_sort |
Vijayan, Anoop
|
building |
Jyväskylän yliopisto
JYX-julkaisuarkisto
|
datasource_str_mv |
jyx
|
first_indexed |
2021-01-04T21:01:24Z
|
format |
Pro gradu
|
format_ext_str_mv |
Opinnäyte
Maisterivaiheen työ
|
free_online_boolean |
1
|
fullrecord |
<?xml version="1.0"?>
<qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks</title><creator>Vijayan, Anoop</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyväskylän yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyväskylä</contributor><contributor type="oppiaine" lang="fi">Mobile Technology and Business (maisteriohjelma)</contributor><contributor type="oppiaine" lang="en">Master's Degree Programme in Mobile Technology and Business</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">OpenID</subject><subject type="other">OAuth</subject><subject type="other">Kerberos</subject><subject type="yso">Internet</subject><subject type="yso">todentaminen</subject><subject type="yso">verkkourkinta</subject><subject type="yso">Internet</subject><subject type="yso">authentication</subject><subject type="yso">phishing</subject><available>2021-01-04T07:37:36Z</available><issued>2012</issued><type lang="en">Master’s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/73529</identifier><identifier type="urn">URN:NBN:fi:jyu-202101041010</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202101041010</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/73529/1/URN%3aNBN%3afi%3ajyu-202101041010.pdf" name="URN:NBN:fi:jyu-202101041010.pdf" type="application/pdf" length="936740" sequence="1"/><recordID>123456789_73529</recordID></qualifieddc>
|
hierarchy_parent_title |
Institutional Repository
|
id |
jyx.123456789_73529
|
institution |
JYU
|
language |
eng
|
last_indexed |
2023-07-03T20:13:30Z
|
main_date |
2012-01-01T00:00:00Z
|
main_date_str |
2012
|
media_type_str_mv |
0/application/
1/application/pdf/
|
online_boolean |
1
|
online_urls_str_mv |
{"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/73529\/1\/URN%3aNBN%3afi%3ajyu-202101041010.pdf","text":"URN:NBN:fi:jyu-202101041010.pdf","source":"jyx","mediaType":"application\/pdf"}
|
publication_first_indexed |
2012-01-04T21:01:24Z
|
publishDate |
2012
|
record_format |
qdc
|
source_str_mv |
jyx
|
spellingShingle |
Vijayan, Anoop
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
OpenID
OAuth
Kerberos
Internet
todentaminen
verkkourkinta
authentication
phishing
|
thumbnail |
https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_73529&index=0&size=large
|
title |
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
|
title_full |
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
|
title_fullStr |
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
|
title_full_unstemmed |
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
|
title_short |
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
|
title_sort |
extending oauth2 0 for kerberos like authentication to avoid internet phishing attacks
|
title_txtP |
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
|
topic |
OpenID
OAuth
Kerberos
Internet
todentaminen
verkkourkinta
authentication
phishing
|
topic_facet |
Internet
Kerberos
OAuth
OpenID
authentication
phishing
todentaminen
verkkourkinta
|
url |
https://jyx.jyu.fi/handle/123456789/73529
http://www.urn.fi/URN:NBN:fi:jyu-202101041010
|
work_keys_str_mv |
AT vijayananoop extendingoauth20forkerberoslikeauthenticationtoavoidinternetphishingattacks
|