Four Attacks on OAuth - How to Secure Your OAuth Implementation

A technical study of an emerging open-protocol technology and its security implications.
By
March 24, 2011

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg