[1]
V. Srikanth, J. Sneha Latha, D. Ajay Kumar, and K. Uma Maheswari, “A survey on OAUTH protocol for security”, IJET, vol. 7, no. 1.1, pp. 692–695, Dec. 2017, doi: 10.14419/ijet.v7i1.1.10834.