_version_ 1780992802377695232
annif_keywords_txtF_mv Internet data security phishing information networks authentication
annif_uris_txtF_mv http://www.yso.fi/onto/yso/p20405 http://www.yso.fi/onto/yso/p5479 http://www.yso.fi/onto/yso/p27723 http://www.yso.fi/onto/yso/p12936 http://www.yso.fi/onto/yso/p24130
author Vijayan, Anoop
author2 Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Mobile Technology and Business (maisteriohjelma) Master's Degree Programme in Mobile Technology and Business 601
author_facet Vijayan, Anoop Informaatioteknologian tiedekunta Faculty of Information Technology Informaatioteknologia Information Technology Jyväskylän yliopisto University of Jyväskylä Mobile Technology and Business (maisteriohjelma) Master's Degree Programme in Mobile Technology and Business 601 Vijayan, Anoop
author_sort Vijayan, Anoop
building Jyväskylän yliopisto JYX-julkaisuarkisto
datasource_str_mv jyx
first_indexed 2021-01-04T21:01:24Z
format Pro gradu
format_ext_str_mv Opinnäyte Maisterivaiheen työ
free_online_boolean 1
fullrecord <?xml version="1.0"?> <qualifieddc schemaLocation="http://purl.org/dc/terms/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dcterms.xsd http://purl.org/dc/elements/1.1/ http://dublincore.org/schemas/xmls/qdc/2006/01/06/dc.xsd"><title>Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks</title><creator>Vijayan, Anoop</creator><contributor type="tiedekunta" lang="fi">Informaatioteknologian tiedekunta</contributor><contributor type="tiedekunta" lang="en">Faculty of Information Technology</contributor><contributor type="laitos" lang="fi">Informaatioteknologia</contributor><contributor type="laitos" lang="en">Information Technology</contributor><contributor type="yliopisto" lang="fi">Jyv&#xE4;skyl&#xE4;n yliopisto</contributor><contributor type="yliopisto" lang="en">University of Jyv&#xE4;skyl&#xE4;</contributor><contributor type="oppiaine" lang="fi">Mobile Technology and Business (maisteriohjelma)</contributor><contributor type="oppiaine" lang="en">Master's Degree Programme in Mobile Technology and Business</contributor><contributor type="oppiainekoodi">601</contributor><subject type="other">OpenID</subject><subject type="other">OAuth</subject><subject type="other">Kerberos</subject><subject type="yso">Internet</subject><subject type="yso">todentaminen</subject><subject type="yso">verkkourkinta</subject><subject type="yso">Internet</subject><subject type="yso">authentication</subject><subject type="yso">phishing</subject><available>2021-01-04T07:37:36Z</available><issued>2012</issued><type lang="en">Master&#x2019;s thesis</type><type lang="fi">Pro gradu -tutkielma</type><identifier type="uri">https://jyx.jyu.fi/handle/123456789/73529</identifier><identifier type="urn">URN:NBN:fi:jyu-202101041010</identifier><language type="iso">en</language><rights type="copyright" lang="fi">Julkaisu on tekij&#xE4;noikeuss&#xE4;&#xE4;nn&#xF6;sten alainen. Teosta voi lukea ja tulostaa henkil&#xF6;kohtaista k&#xE4;ytt&#xF6;&#xE4; varten. K&#xE4;ytt&#xF6; kaupallisiin tarkoituksiin on kielletty.</rights><rights type="copyright" lang="en">This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.</rights><permaddress type="urn">http://www.urn.fi/URN:NBN:fi:jyu-202101041010</permaddress><file bundle="ORIGINAL" href="https://jyx.jyu.fi/bitstream/123456789/73529/1/URN%3aNBN%3afi%3ajyu-202101041010.pdf" name="URN:NBN:fi:jyu-202101041010.pdf" type="application/pdf" length="936740" sequence="1"/><recordID>123456789_73529</recordID></qualifieddc>
hierarchy_parent_title Institutional Repository
id jyx.123456789_73529
institution JYU
language eng
last_indexed 2023-07-03T20:13:30Z
main_date 2012-01-01T00:00:00Z
main_date_str 2012
media_type_str_mv 0/application/ 1/application/pdf/
online_boolean 1
online_urls_str_mv {"url":"https:\/\/jyx.jyu.fi\/bitstream\/123456789\/73529\/1\/URN%3aNBN%3afi%3ajyu-202101041010.pdf","text":"URN:NBN:fi:jyu-202101041010.pdf","source":"jyx","mediaType":"application\/pdf"}
publication_first_indexed 2012-01-04T21:01:24Z
publishDate 2012
record_format qdc
source_str_mv jyx
spellingShingle Vijayan, Anoop Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks OpenID OAuth Kerberos Internet todentaminen verkkourkinta authentication phishing
thumbnail https://jyu.finna.fi/Cover/Show?source=Solr&id=jyx.123456789_73529&index=0&size=large
title Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
title_full Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
title_fullStr Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
title_full_unstemmed Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
title_short Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
title_sort extending oauth2 0 for kerberos like authentication to avoid internet phishing attacks
title_txtP Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
topic OpenID OAuth Kerberos Internet todentaminen verkkourkinta authentication phishing
topic_facet Internet Kerberos OAuth OpenID authentication phishing todentaminen verkkourkinta
url https://jyx.jyu.fi/handle/123456789/73529 http://www.urn.fi/URN:NBN:fi:jyu-202101041010
work_keys_str_mv AT vijayananoop extendingoauth20forkerberoslikeauthenticationtoavoidinternetphishingattacks