Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Shangcheng Shi"'
Publikováno v:
Proceedings 2022 Network and Distributed System Security Symposium.
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030900212
SecureComm (2)
SecureComm (2)
Recently, mobile apps increasingly integrate with payment services, enabling the user to pay orders with a third-party payment service provider, namely Cashier. During the payment process, both the app and Cashier rely on some credentials to secure t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::71e2f622d57c3e978ebef225d84fc049
https://doi.org/10.1007/978-3-030-90022-9_5
https://doi.org/10.1007/978-3-030-90022-9_5
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030783747
ACNS (2)
ACNS (2)
Riding on the widespread user adoption of mobile payment, a growing number of mobile apps have integrated the service from third-party payment service providers or so-called Cashiers. Despite its prevalence and critical nature, no existing standard c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7c2e4db14097da38d59a20a532d31852
https://doi.org/10.1007/978-3-030-78375-4_1
https://doi.org/10.1007/978-3-030-78375-4_1
Publikováno v:
AsiaCCS
Mobile applications today increasingly integrate Single Sign-On (SSO) into their account management mechanisms. Unfortunately, the involved multi-party protocol, i.e., OAuth 2.0, was originally designed to serve websites for authorization purpose. Du
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783319612034
ACNS
ACNS
Although the OAuth2.0 protocol was originally designed to serve the authorization need for websites, mainstream identity providers like Google and Facebook have made significant changes on this protocol to support authentication for mobile apps. Prio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fa9fe4f2ca5b9ec2473ded96acfa5347
https://doi.org/10.1007/978-3-319-61204-1_16
https://doi.org/10.1007/978-3-319-61204-1_16
Autor:
JUNIOR, MISAEL C.1 misaeljr@usp.br, AMALFITANO, DOMENICO2 domenico.amalfitano@unina.it, GARCES, LINA3 lina@unifei.edu.br, FASOLINO, ANNA RITA2 fasolino@unina.it, ANDRADE, STEVÃO A.1 stevao@usp.br, DELAMARO, MÁRCIO1 delamaro@icmc.usp.br
Publikováno v:
ACM Computing Surveys. 2022 Suppl 10, Vol. 54, p1-38. 38p.
Autor:
Jackson, Donny
Publikováno v:
Urgent Communications Exclusive Insight; 12/14/2020, pN.PAG-N.PAG, 1p
Autor:
Kazue Sako, Nils Ole Tippenhauer
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the p
This two-volume set LNICST 398 and 399 constitutes the post-conference proceedings of the 17th International Conference on Security and Privacy in Communication Networks, SecureComm 2021, held in September 2021. Due to COVID-19 pandemic the conferenc
This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017.The 34 papers presented in this volume were carefully reviewed and selected from 1