-
1
Authorized authentication evaluation framework for constrained environments
Published 2016JYX-julkaisuarkisto / JYX Digital Archive
Master's thesis -
2
Extending OAuth2.0 for Kerberos-like authentication to avoid Internet phishing attacks
Published 2012Get full text Get full textMaster's thesis