Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Masashi EtoNational Institute of Information and Communications TechnologyVerified email at nict.go.jp
Tao BANNational Institute of Information and Communications Technology, JapanVerified email at nict.go.jp
Katsunari YoshiokaYokohama National UniversityVerified email at ynu.ac.jp
Takeshi TakahashiNational Institute of Information and Communications TechnologyVerified email at nict.go.jp
Jungsuk SongKorea institute of science and technology informationVerified email at kisti.re.kr
Takahiro KasamaNICTVerified email at nict.go.jp
Abdolhossein SarrafzadehUniversity Distinguished Professor Director, Center of Excellence in Cybersecurity Research, North CVerified email at unitec.ac.nz
Shanqing GuoVerified email at sdu.edu.cn
Mio SUZUKITechnical Expert, National Institute of Information and Communications TechnologyVerified email at nict.go.jp
Yasuo OkabeKyoto UniversityVerified email at i.kyoto-u.ac.jp
Hiroki TakakuraNational Institute of InformaticsVerified email at nii.ac.jp
Shin-Ming ChengProfessor, Dept. of CSIE, National Taiwan University of Science and TechnologyVerified email at mail.ntust.edu.tw
Chansu HanNational Institute of Information and Communications Technology (NICT)Verified email at nict.go.jp
Rui TanabeYokohama National UniversityVerified email at ynu.ac.jp
Muhamad Erza AminantoMonash University IndonesiaVerified email at monash.edu
Christian RossowCISPA – Helmholtz Center for Information SecurityVerified email at cispa.de
Orcun CetinSabancı University, University of KentVerified email at sabanciuniv.edu
Seiichi OzawaKobe UniversityVerified email at kobe-u.ac.jp
Gang ChenVictoria University of WellingtonVerified email at ecs.vuw.ac.nz
S. NdichuNational Institute of Information and Communications Technology (NICT), JapanVerified email at nict.go.jp