Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Noriaki KamiyamaFukuoka UniversityVerified email at fukuoka-u.ac.jp
Mitsuaki AkiyamaNTTVerified email at ieee.org
Shigeki GotoWaseda UniversityVerified email at goto.info.waseda.ac.jp
Keisuke IshibashiInternational Christian UniversityVerified email at icu.ac.jp
Takuya WatanabeNTTVerified email at nsl.cs.waseda.ac.jp
Daiki ChibaNTT Security (Japan) KKVerified email at ieee.org
Eitaro ShiojiNTTVerified email at lab.ntt.co.jp
Mitsuhiro HatadaWaseda University and NTT CommunicationsVerified email at nsl.cs.waseda.ac.jp
Masato UchidaWaseda UniversityVerified email at waseda.jp
Ryo IijimaWaseda University, National Institute of Information and Communications TechnologyVerified email at nsl.cs.waseda.ac.jp
Toshiki ShibaharaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Yuta TAKATASecurity ResearcherVerified email at goto.info.waseda.ac.jp
Takeru InoueNTT Network Innovation Labs.Verified email at ieee.org
Tetsuya SakaiWaseda UniversityVerified email at waseda.jp
Aditya AkellaProfessor, Computer Science, UT AustinVerified email at cs.utexas.edu
Ayako A. HasegawaNICTVerified email at nict.go.jp
Jianping PanUniversity of VictoriaVerified email at uvic.ca
Kohei ShiomotoTokyo City UniversityVerified email at tcu.ac.jp
Takeshi TakahashiNational Institute of Information and Communications TechnologyVerified email at nict.go.jp
Tatsuya TAKEHISAEngineer / Researcher, Nissin incVerified email at nissin-inc.co.jp