Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Nuttapong AttrapadungAIST, JapanVerified email at aist.go.jp
- Takashi YamakawaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
- Shuichi KatsumataPQShield Ltd.Verified email at pqshield.com
- Shweta AgrawalIndian Institute of Technology MadrasVerified email at iitm.ac.in
- Noboru KunihiroUniversity of TsukubaVerified email at cs.tsukuba.ac.jp
- Ryo NishimakiNTT Social Informatics LaboratoriesVerified email at ntt.com
- Koji NuidaKyushu UniversityVerified email at imi.kyushu-u.ac.jp
- Monosij MaitraIIT KharagpurVerified email at cse.iitkgp.ac.in
- Alex DavidsonUniversidade NOVA de LisboaVerified email at fct.unl.pt
- Anshu YadavIST AustriaVerified email at ist.ac.at
- Keita EmuraKanazawa UniversityVerified email at se.kanazawa-u.ac.jp
- Kazuto OgawaVerified email at nhk.or.jp
- Damien StehléCryptoLabVerified email at cryptolab.co.kr
- Sanjay BhattacherjeeUniversity of KentVerified email at kent.ac.uk
- Bagus SantosoUniversity of Electro-CommunicationsVerified email at uec.ac.jp
- PRATISH DATTAScientist @ Cryptography and Information Security (CIS) Laboratories, NTT Research, Inc.Verified email at ntt-research.com
- TAPAS PALCo-Leader of KASTEL-C&C (KIT)Verified email at kit.edu
- Hiraku MoritaAarhus University, University of CopenhagenVerified email at cs.au.dk
- Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
- Kazuma OharaNational Institute of Advanced Industrial Science and Technology (AIST), JapanVerified email at aist.go.jp