[关闭]
@EricaHe
2016-01-18T09:45:00.000000Z
字数
125
阅读
536
各平台的OAuth文档
资料整理
新浪微博OAuth2.0说明
微信获得用户信息说明
QQOAuth2.0说明
百度OAuth2.0说明
人人网OAuth2.0说明
小米开放平台官方文档
开心网OAuth1.0文档
开心网OAuth2.0文档
支付宝服务窗平台开发者文档
内容目录
Authentication
1
Enhanced certificate transparency and end-to-end encrypted mail
Multiparty
1
Securing Multiparty Online Services via Certification of Symbolic Transactions
OAuth
1
OAuth Demystified for Mobile Application Developers
OpenIDConnect
1
Analysing the Security of Google's implementation of OpenID Connect
SSL
5
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations
Bulletproof SSL and TLS - Chapter 6(I)
Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security
The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software(Simplified ver.)
The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software
SSO
2
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel
Your Software at my Service:Security Analysis of SaaS Single Sign-On Solutions in the Cloud
Verification
1
Securing Multiparty Online Services via Certification of Symbolic Transactions
信安数基
3
信息安全的数学基础——第十章 环
信息安全数学基础——第九章 群的结构
信息安全数学基础——第八章 群
大三上
3
信息安全的数学基础——第十章 环
信息安全数学基础——第九章 群的结构
信息安全数学基础——第八章 群
文献综述
1
恶意软件检测的国内外研究现状
期末复习
3
信息安全的数学基础——第十章 环
信息安全数学基础——第九章 群的结构
信息安全数学基础——第八章 群
论文笔记
15
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition
Towards Understanding the Advertiser's Perspective of Smartphone User Privacy
Should You Use the App for That? - Comparing the Privacy Implications of App- and Web-based Online Services
Information Sharing and User Privacy in the Third-party Identity Management Landscape
Analysing the Security of Google's implementation of OpenID Connect
Enhanced certificate transparency and end-to-end encrypted mail
Securing Multiparty Online Services via Certification of Symbolic Transactions
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel
Your Software at my Service:Security Analysis of SaaS Single Sign-On Solutions in the Cloud
OAuth Demystified for Mobile Application Developers
Understanding Mobile Traffic Patterns of Large Scale Cellular Towers in Urban Environment
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations
Why Eve and Mallory Love Android: An Analysis of Android SSL (In)Security
The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software(Simplified ver.)
The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software
读书笔记
1
Bulletproof SSL and TLS - Chapter 6(I)
资料整理
1
各平台的OAuth文档
以下【标签】将用于标记这篇文稿:
下载客户端
关注开发者
报告问题,建议
联系我们
添加新批注
在作者公开此批注前,只有你和作者可见。
私有
公开
删除
查看更早的 5 条回复
回复批注
×
通知