[1]
, A.P.A.S.I.K.K. 2015. Provision of overcoming the weakness of OAuth 2.0 protocol in online social networking. International Journal on Recent and Innovation Trends in Computing and Communication. 3, 3 (Mar. 2015), 1657–1661. DOI:https://doi.org/10.17762/ijritcc.v3i3.4099.