Insights of JSON Web Token

  • Mahindrakar* P
  • et al.
N/ACitations
Citations of this article
32Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In almost every organization where user sensitive data is available, security and privacy of the data plays a vital role. As far as computer science is concerned, it is just a game of saving data in unrecognizable format and accessible to authorized person. User sensitive data mainly includes passwords which are required for the sessions but need to be handled and stored safely.As storage of these information is overhead in database, Tokens are generated which handles sessions and also self contains user details. One of such widely used stateless token is Json Web Token. This paper deals with the introduction, working and algorithms of Json web token. Also pros, cons, hacking possibilities, Proper usage and security measures of JWT are discussed.

Cite

CITATION STYLE

APA

Mahindrakar*, P., & Pujeri, Dr. U. (2020). Insights of JSON Web Token. International Journal of Recent Technology and Engineering (IJRTE), 8(6), 1707–1710. https://doi.org/10.35940/ijrte.f7689.038620

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free