Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Keita EmuraKanazawa UniversityVerified email at se.kanazawa-u.ac.jp
Hyung Tae LeeChung-Ang UniversityVerified email at cau.ac.kr
Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
S LingNanyang Technological UniversityVerified email at ntu.edu.sg
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Sungwook KimDepartment of Information Security, Seoul Women's UniversityVerified email at swu.ac.kr
Sunpill KimPh.D. Candidate at Hanyang University, KoreaVerified email at hanyang.ac.kr
Koutarou Suzuki (鈴木幸太郎)Toyohashi University of Technology (豊橋技術科学大学)Verified email at suzuki.email.ne.jp
Taek-Young YounDankook UniversityVerified email at dankook.ac.kr
Jinsu KimSecurity 2Lab, Software Center, Samsung ElectronicsVerified email at snu.ac.kr
Yohei WatanabeThe University of Electro-CommunicationsVerified email at uec.ac.jp
Stanislaw JareckiUniversity of California Irvine (UCI)Verified email at uci.edu
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
Christoph StriecksSenior Scientist at AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Seunghun PaikMS & PhD Integrated Student at Hanyang UniversityVerified email at hanyang.ac.kr
Myungsun KimThe University of SuwonVerified email at suwon.ac.kr
Kyoohyung HanSamsung SDSVerified email at samsung.com
Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Wenyi TangGraduate student, University of Notre DameVerified email at nd.edu