Abstract
In almost every organization where user sensitive data is available, security and privacy of the data plays a vital role. As far as computer science is concerned, it is just a game of saving data in unrecognizable format and accessible to authorized person. User sensitive data mainly includes passwords which are required for the sessions but need to be handled and stored safely.As storage of these information is overhead in database, Tokens are generated which handles sessions and also self contains user details. One of such widely used stateless token is Json Web Token. This paper deals with the introduction, working and algorithms of Json web token. Also pros, cons, hacking possibilities, Proper usage and security measures of JWT are discussed.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Management of Technology and Innovation,General Engineering
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. JSON Web Tokens Lifecycle-Based Threat Classification;2024 IEEE 25th International Conference of Young Professionals in Electron Devices and Materials (EDM);2024-06-28
2. DynaTests: Tailored Tests and Progress Insights;International Journal of Advanced Research in Science, Communication and Technology;2024-04-21
3. Improvising JSON Web Token Authentication in SDN;2022 International Conference on Communication, Computing and Internet of Things (IC3IoT);2022-03-10