Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Mitsuaki AkiyamaNTTVerified email at ieee.org
Noriaki KamiyamaFukuoka UniversityVerified email at fukuoka-u.ac.jp
Shigeki GotoWaseda UniversityVerified email at goto.info.waseda.ac.jp
Takuya WatanabeNTTVerified email at nsl.cs.waseda.ac.jp
Keisuke IshibashiInternational Christian UniversityVerified email at icu.ac.jp
Daiki ChibaNTT Security (Japan) KKVerified email at ieee.org
Eitaro ShiojiNTTVerified email at lab.ntt.co.jp
Masato UchidaWaseda UniversityVerified email at waseda.jp
Mitsuhiro HatadaWaseda University and NTT CommunicationsVerified email at nsl.cs.waseda.ac.jp
Tatsuaki KimuraOsaka UniversityVerified email at comm.eng.osaka-u.ac.jp
Ryo IijimaNational Institute of Advanced Industrial Science and Technology, Waseda UniversityVerified email at nsl.cs.waseda.ac.jp
Yuta TAKATASecurity Researcher, Ph.D.Verified email at goto.info.waseda.ac.jp
Toshiki ShibaharaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Tetsuya SakaiWaseda UniversityVerified email at waseda.jp
Jianping PanUniversity of VictoriaVerified email at uvic.ca
Takeru InoueNTT Network Innovation Labs.Verified email at ieee.org
Ayako A. HasegawaNICTVerified email at nict.go.jp
Aditya AkellaProfessor, Computer Science, UT AustinVerified email at cs.utexas.edu
Takeshi TakahashiNational Institute of Information and Communications TechnologyVerified email at nict.go.jp
Kohei ShiomotoTokyo City UniversityVerified email at tcu.ac.jp