Jike Lei

Learn More
Ideally, security protocol implementations should be formally verified before they are deployed. However, this is not true in practice. Numerous high-profile vulnerabilities have been found in web authentication protocol implementations , especially in single-sign on (SSO) protocols implementations recently. Much of the prior work on authentica-tion(More)
  • 1