[1]
F. A. Pratama, A. Hermanto, and G. Kusnanto, “Security Assessment of JWKS-Based Authentication: Mitigating JWT Attack Vectors Through Penetration Testing”, J. Tek. Inform. (JUTIF), vol. 7, no. 2, pp. 1834–1852, Apr. 2026.