[1]
P. R. Yadav, “Flaws in OAuth 2.0: Can OAuth be used as a Security Server”, IJRESM, vol. 4, no. 7, pp. 107–109, Jul. 2021, Accessed: Apr. 30, 2024. [Online]. Available: https://journal.ijresm.com/index.php/ijresm/article/view/982