[1]
Pratama, F.A., Hermanto, A. and Kusnanto, G. 2026. Security Assessment of JWKS-Based Authentication: Mitigating JWT Attack Vectors Through Penetration Testing. Jurnal Teknik Informatika (Jutif). 7, 2 (Apr. 2026), 1834–1852. DOI:https://doi.org/10.52436/1.jutif.2026.7.2.5662.