Author of the publication

Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers.

, , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 290-308. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kakei, Shohei
add a person with the name Kakei, Shohei
 

Other publications of authors with the same name

Design of Enclosing Signing Keys by All Issuers in Distributed Public Key Certificate-Issuing Infrastructure., , , and . IEICE Trans. Inf. Syst., 106 (9): 1495-1498 (September 2023)SSL Client Authentication with TPM., , , and . IEICE Trans. Inf. Syst., 99-D (4): 1052-1061 (2016)Cross-Certification Towards Distributed Authentication Infrastructure: A Case of Hyperledger Fabric., , , , , and . IEEE Access, (2020)FirmPot: A Framework for Intelligent-Interaction Honeypots Using Firmware of IoT Devices., , and . CANDAR (Workshops), page 405-411. IEEE, (2021)Value-utilized taint propagation: toward precise detection of apps' information flows across Android API calls., , , , and . Int. J. Inf. Sec., 21 (5): 1127-1149 (2022)Designing Authentication and Authorization System with Blockchain., , , , , , , and . AsiaJCIS, page 111-118. IEEE, (2019)Execution Recording and Reconstruction for Detecting Information Flows in Android Apps., , and . IEEE Access, (2023)Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers., , and . SecureComm, volume 462 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 290-308. Springer, (2022)Simplifying Dynamic Public Key Certificate Graph for Certification Path Building in Distributed Public Key Infrastructure., , and . ICTC, page 545-550. IEEE, (2021)VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps., , , , and . ARES, page 29:1-29:6. ACM, (2021)