[1]
A. P. A. S. I. K. K., “Provision of overcoming the weakness of OAuth 2.0 protocol in online social networking”, IJRITCC, vol. 3, no. 3, pp. 1657–1661, Mar. 2015.