Get my own profile
Public access
View all18 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Kazuo OhtaProfessor, The University of Electro-CommunicationsVerified email at uec.ac.jp
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Yang LINanjing University of Aeronautics and AstronauticsVerified email at uec.ac.jp
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Mitsugu IwamotoThe University of Electro-CommunicationsVerified email at uec.ac.jp
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Takeshi SugawaraThe University of Electro-CommunicationsVerified email at uec.ac.jp
- Noriyuki MiuraOsaka UniversityVerified email at ist.osaka-u.ac.jp
- Yu-ichi HAYASHINara Institute of Science and TechnologyVerified email at is.naist.jp
- Naofumi HommaTohoku UniversityVerified email at riec.tohoku.ac.jp
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
- Junfeng FanOpen Security ResearchVerified email at opsefy.com
- Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
- Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
- Kohei MatsudaKobe UniversityVerified email at cs26.scitec.kobe-u.ac.jp
- Shin'ichiro MatsuoResearch Professor of Computer Science, Georgetown UniversityVerified email at georgetown.edu
- Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
- Yuko HaraInstitute of Science TokyoVerified email at cad.ict.e.titech.ac.jp
- Yong Ki LeeSamsung ElectronicsVerified email at snu.ac.kr
- Yuichi KomanoChiba Institute of TechnologyVerified email at ruri.waseda.jp