Return to Article Details Provision of overcoming the weakness of OAuth 2.0 protocol in online social networking Download Download PDF