Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ken-ichi KawarabayashiVerified email at nii.ac.jp
Yusuke KOBAYASHIKyoto UniversityVerified email at kurims.kyoto-u.ac.jp
Takuro FukunagaChuo UniversityVerified email at g.chuo-u.ac.jp
Yoshio OkamotoUniversity of Electro-CommunicationsVerified email at uec.ac.jp
Shinji ItoNEC CorporationVerified email at nec.com
Yuichi YoshidaNational Institute of InformaticsVerified email at nii.ac.jp
Tasuku SomaMassachusetts Institute of TechnologyVerified email at mit.edu
Kazuhiro InabaGoogleVerified email at google.com
Satoru IwataUniversity of TokyoVerified email at mist.i.u-tokyo.ac.jp
Yuni IwamasaKyoto UniversityVerified email at i.kyoto-u.ac.jp
Atsushi MiyauchiUniversity of TokyoVerified email at mist.i.u-tokyo.ac.jp
Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Vorapong SuppakitpaisarnThe University of TokyoVerified email at is.s.u-tokyo.ac.jp
Kei KimuraKyushu UniversityVerified email at inf.kyushu-u.ac.jp
Charalampos E. TsourakakisBoston UniversityVerified email at bu.edu
Tianyi ChenPhD, Boston UniversityVerified email at bu.edu
Yutaro YamaguchiOsaka UniversityVerified email at ist.osaka-u.ac.jp
Laura SanitàAssociate Professor, TU EindhovenVerified email at tue.nl
Friedrich EisenbrandEPFLVerified email at epfl.ch
Thomas RothvossUniversity of WashingtonVerified email at math.mit.edu