Get my own profile
Public access
View all6 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Makoto YokooKyushu UniversityVerified email at inf.kyushu-u.ac.jp
- Kazuki YoneyamaIbaraki UniversityVerified email at vc.ibaraki.ac.jp
- Eiichiro FujisakiJapan Advanced Institute of Science and TechnologyVerified email at jaist.ac.jp
- Keita XagawaTechnology Innovation Institute (TII)Verified email at tii.ae
- Katsutoshi HirayamaGraduate School of Maritime Sciences, Kobe UniversityVerified email at maritime.kobe-u.ac.jp
- Jae Hong SeoAssociate Professor, Hanyang UniversityVerified email at hanyang.ac.kr
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Susumu KiyoshimaNTT Social Informatics LaboratoriesVerified email at ntt-research.com
- Anderson C. A. NascimentoHead of Security Research - VisaVerified email at visa.com
- Atsushi IwasakiUniversity of Electro-CommunicationsVerified email at is.uec.ac.jp
- Yuko SakuraiNagoya Institute of Technology