The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access
Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, YounJu Shin, Journal of Internet Computing and Services, Vol. 16, No. 1, pp. 21-28, Feb. 2015
Keywords: OAuth Protocol, Authorization, authentication, Access Token, E-mail Authentication
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Chae, C., Choi, K., Choi, K., Yae, Y., & Shin, Y. (2015). The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access. Journal of Internet Computing and Services, 16(1), 21-28. DOI: 10.7472/jksii.2015.16.1.21.
[IEEE Style]
C. Chae, K. Choi, K. Choi, Y. Yae, Y. Shin, "The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access," Journal of Internet Computing and Services, vol. 16, no. 1, pp. 21-28, 2015. DOI: 10.7472/jksii.2015.16.1.21.
[ACM Style]
Cheol-Joo Chae, Kwang-Nam Choi, Kiseok Choi, Yong-Hee Yae, and YounJu Shin. 2015. The Extended Authentication Protocol using E-mail Authentication in OAuth 2.0 Protocol for Secure Granting of User Access. Journal of Internet Computing and Services, 16, 1, (2015), 21-28. DOI: 10.7472/jksii.2015.16.1.21.

