Consuming OAuth intelligently in Rails#oauth#rails#ruby#authentication#programming·stakeventures.com·Jul 23, 2009Consuming OAuth intelligently in Rails
The Rails Way: Users and Passwords#rails#security#authentication#ruby#programming·therailsway.com·Sep 20, 2009The Rails Way: Users and Passwords
Why you should never use hash functions for message authentication | The If Works#security#crypto#authentication#programming·blog.jcoglan.com·Jun 10, 2012Why you should never use hash functions for message authentication | The If Works