Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Keita EmuraKanazawa UniversityVerified email at se.kanazawa-u.ac.jp
- Hyung Tae LeeChung-Ang UniversityVerified email at cau.ac.kr
- Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
- S LingVerified email at ntu.edu.sg
- Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
- Sungwook KimDepartment of Information Security, Seoul Women's UniversityVerified email at swu.ac.kr
- Koutarou Suzuki (鈴木幸太郎)Toyohashi University of Technology (豊橋技術科学大学)Verified email at suzuki.email.ne.jp
- Taek-Young YounDankook UniversityVerified email at dankook.ac.kr
- Jinsu KimSecurity 2Lab, Software Center, Samsung ElectronicsVerified email at snu.ac.kr
- Yohei WatanabeThe University of Electro-CommunicationsVerified email at uec.ac.jp
- Sunpill KimPh.D. Candidate at Hanyang University, KoreaVerified email at hanyang.ac.kr
- Stanislaw JareckiUniversity of California Irvine (UCI)Verified email at uci.edu
- Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
- Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
- Christoph StriecksAIT Austrian Institute of TechnologyVerified email at ait.ac.at
- Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
- Myungsun KimThe University of SuwonVerified email at suwon.ac.kr
- Kyoohyung HanSamsung SDSVerified email at samsung.com
- Kazuki YoneyamaIbaraki UniversityVerified email at vc.ibaraki.ac.jp
- Keita XagawaTechnology Innovation Institute (TII)Verified email at tii.ae