1.
Pratama FA, Hermanto A, Kusnanto G. Security Assessment of JWKS-Based Authentication: Mitigating JWT Attack Vectors Through Penetration Testing. J. Tek. Inform. (JUTIF) [Internet]. 2026 Apr. 18 [cited 2026 Apr. 30];7(2):1834-52. Available from: https://jutif.if.unsoed.ac.id/index.php/jurnal/article/view/5662