OAuth Hacks A gentle introduction to OAuth 2 and Apache Oltu
Internet
The OAuth 2.0 Authorization Protocol - cleesh.com · The OAuth 2.0 Authorization Protocol draft-ietf-oauth-v2-25 Abstract The OAuth 2.0 authorization protocol enables a third-party
Documents
Development of Twitter Application #3 - OAuth
Technology
Single-User Twitter OAuth Programming - 140Dev.com140dev.com/download/single-user-oauth.pdf · Single-User Twitter OAuth Programming 1 Welcome to Twitter OAuth The simplest way to
Single-User Twitter OAuth Programming -
The Essential OAuth Primer: Understanding OAuth for Securing Cloud
OAuth 2.0 Security IETF OAuth WG Conference Call, 14th December 2012.
Everything OAuth
Twitter4R OAuth
Decentralised authorisation: OAuth2€¦ · OAuth history • OAuth 1.0 released in 2007 • Twitter developers realised that OpenID was not going to support delegated API access
Abusing Twitter API & OAuth Implementation - HITBconference.hitb.org/hitbsecconf2013ams/materials/D1T2 - Nicolas... · Abusing Twitter API & OAuth Implementation Nicolas Seriot April
Abusing Twitter API & OAuth Implementationseriot.ch/resources/abusing_twitter_api/abusing_twitter... · 2013. 4. 11. · After studying how Twitter API uses OAuth, it turns out that
Abusing twitter api oauth 2013
Understanding OAuth | Implementing 'Sign-in with Twitter' in Android apps
Twitter API & OAuth 101 TVUG October 2009
Twitter oauth #idcon7
H. Tschofenig OAuth 2.0 Security: OAuth Open Redirector · OAuth 2.0 Security: OAuth Open Redirector draft-bradley-oauth-open-redirector-02.txt Abstract This document gives additional
Abusing Twitter API & OAuth Implementation · Abusing Twitter API & OAuth Implementation Nicolas Seriot April 10th, 2013 Hack In The Box Amsterdam, NL. ... • iOS / Cocoa dev. ...