Get my own profile
Public access
View all16 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Takanori IsobeUniversity of HyogoVerified email at ai.u-hyogo.ac.jp
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Kosei SakamotoMitsubishi Electric CorporationVerified email at dc.MitsubishiElectric.co.jp
Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
Mustafa KhairallahNanyang Technological UniversityVerified email at e.ntu.edu.sg
Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
Fukang LiuInstitute of Science TokyoVerified email at m.titech.ac.jp
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Jian GuoNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Rei UenoKyoto UniversityVerified email at kyoto-u.ac.jp
Chun Guo (郭淳)Shandong UniversityVerified email at sdu.edu.cn
Ryoma ItoNICTVerified email at nict.go.jp
Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
Rentaro ShibaMitsubishi Electric Corporation / Nagoya UniversityVerified email at dc.mitsubishielectric.co.jp
Jooyoung LeeSchool of Computing, KAISTVerified email at kaist.ac.kr
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Ashwin JhaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.com
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de