Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Ken-ichi KawarabayashiNational Institute of Informatics, The University of TokyoEmail verificata su nii.ac.jp
Yusuke KOBAYASHIKyoto UniversityEmail verificata su kurims.kyoto-u.ac.jp
Yoshio OkamotoUniversity of Electro-CommunicationsEmail verificata su uec.ac.jp
Takuro FukunagaChuo UniversityEmail verificata su g.chuo-u.ac.jp
Shinji ItoThe University of TokyoEmail verificata su mist.i.u-tokyo.ac.jp
Yuni IwamasaKyoto UniversityEmail verificata su i.kyoto-u.ac.jp
Yuichi YoshidaNational Institute of InformaticsEmail verificata su nii.ac.jp
Satoru IwataUniversity of TokyoEmail verificata su mist.i.u-tokyo.ac.jp
Tasuku SomaThe Institute of Statistical MathematicsEmail verificata su ism.ac.jp
Kazuhiro InabaGoogleEmail verificata su google.com
Vorapong SuppakitpaisarnThe University of TokyoEmail verificata su is.s.u-tokyo.ac.jp
Atsushi MiyauchiCENTAI InstituteEmail verificata su centai.eu
Charalampos E. TsourakakisBoston UniversityEmail verificata su bu.edu
Dániel MarxCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
Kei KimuraKyushu UniversityEmail verificata su inf.kyushu-u.ac.jp
Yutaro YamaguchiOsaka UniversityEmail verificata su ist.osaka-u.ac.jp
Tianyi ChenPhD, Boston UniversityEmail verificata su bu.edu
Simon MaurasINRIAEmail verificata su inria.fr
Laura SanitàAssociate Professor, Bocconi University of MilanEmail verificata su unibocconi.it
Friedrich EisenbrandEPFLEmail verificata su epfl.ch