[go: up one dir, main page]

Malvin et al., 2023 - Google Patents

JSON Web Token leakage avoidance using token split and concatenate in RSA256

Malvin et al., 2023

View PDF
Document ID
11231509732690901108
Author
Malvin M
Safitri C
Publication year
Publication venue
Indonesian Journal of Computing, Engineering, and Design (IJoCED)

External Links

Snippet

This research aims to protect users from JWT (JSON Web Token) leakage, which is listed plainly in the Response Header in the web browser console. The risk of malicious attackers stealing the JWT is highly dangerous since the API (Application Programming Interface) will …
Continue reading at ojs.sampoernauniversity.ac.id (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US10484365B2 (en) Space-time separated and jointly evolving relationship-based network access and data protection system
US9350548B2 (en) Two factor authentication using a protected pin-like passcode
US10187373B1 (en) Hierarchical, deterministic, one-time login tokens
Zhao et al. All your browser-saved passwords could belong to us: A security analysis and a cloud-based new design
Feng et al. A Formal Analysis of the FIDO UAF Protocol.
Hernandez-Ardieta et al. A taxonomy and survey of attacks on digital signatures
Ghazizadeh et al. Trusted computing strengthens cloud authentication
US20240113898A1 (en) Secure Module and Method for App-to-App Mutual Trust Through App-Based Identity
Dou et al. Robust insider attacks countermeasure for Hadoop: Design and implementation
Al Kabir et al. An overview of the present and future of user authentication
Khalil et al. TPM-based authentication mechanism for apache hadoop
Kim et al. Security analysis and bypass user authentication bound to device of windows hello in the wild
Malvin et al. JSON Web Token leakage avoidance using token split and concatenate in RSA256
Alzomai et al. The mobile phone as a multi OTP device using trusted computing
Aljawarneh et al. A web client authentication system using smart card for e-systems: initial testing and evaluation
Sudha et al. A survey on different authentication schemes in cloud computing environment
Akama et al. Scrappy: Secure rate assuring protocol with privacy
Paranjape et al. An approach towards security in private cloud using OTP
KR102094606B1 (en) Apparatus and method for authentication
Kansro et al. Users authentication issues and challenges in electronic commerce applications
Al-Rousan et al. A New Security Model for Web Browser Local Storage
Lin et al. Enhancing the session security of zen cart based on HMAC-SHA256
Raji et al. Enhancing Public Cloud Security by Developing a Model For User Authentication and Data Integrity Checking
Chahal et al. Challenges and security issues of NoSQL databases
US20240283664A1 (en) Authentication with Cloud-Based Secure Enclave