Malvin et al., 2023 - Google Patents
JSON Web Token leakage avoidance using token split and concatenate in RSA256Malvin et al., 2023
View PDF- Document ID
- 11231509732690901108
- Author
- Malvin M
- Safitri C
- Publication year
- Publication venue
- Indonesian Journal of Computing, Engineering, and Design (IJoCED)
External Links
Snippet
This research aims to protect users from JWT (JSON Web Token) leakage, which is listed plainly in the Response Header in the web browser console. The risk of malicious attackers stealing the JWT is highly dangerous since the API (Application Programming Interface) will …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10484365B2 (en) | Space-time separated and jointly evolving relationship-based network access and data protection system | |
| US9350548B2 (en) | Two factor authentication using a protected pin-like passcode | |
| US10187373B1 (en) | Hierarchical, deterministic, one-time login tokens | |
| Zhao et al. | All your browser-saved passwords could belong to us: A security analysis and a cloud-based new design | |
| Feng et al. | A Formal Analysis of the FIDO UAF Protocol. | |
| Hernandez-Ardieta et al. | A taxonomy and survey of attacks on digital signatures | |
| Ghazizadeh et al. | Trusted computing strengthens cloud authentication | |
| US20240113898A1 (en) | Secure Module and Method for App-to-App Mutual Trust Through App-Based Identity | |
| Dou et al. | Robust insider attacks countermeasure for Hadoop: Design and implementation | |
| Al Kabir et al. | An overview of the present and future of user authentication | |
| Khalil et al. | TPM-based authentication mechanism for apache hadoop | |
| Kim et al. | Security analysis and bypass user authentication bound to device of windows hello in the wild | |
| Malvin et al. | JSON Web Token leakage avoidance using token split and concatenate in RSA256 | |
| Alzomai et al. | The mobile phone as a multi OTP device using trusted computing | |
| Aljawarneh et al. | A web client authentication system using smart card for e-systems: initial testing and evaluation | |
| Sudha et al. | A survey on different authentication schemes in cloud computing environment | |
| Akama et al. | Scrappy: Secure rate assuring protocol with privacy | |
| Paranjape et al. | An approach towards security in private cloud using OTP | |
| KR102094606B1 (en) | Apparatus and method for authentication | |
| Kansro et al. | Users authentication issues and challenges in electronic commerce applications | |
| Al-Rousan et al. | A New Security Model for Web Browser Local Storage | |
| Lin et al. | Enhancing the session security of zen cart based on HMAC-SHA256 | |
| Raji et al. | Enhancing Public Cloud Security by Developing a Model For User Authentication and Data Integrity Checking | |
| Chahal et al. | Challenges and security issues of NoSQL databases | |
| US20240283664A1 (en) | Authentication with Cloud-Based Secure Enclave |