Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Kazuo OhtaProfessor, The University of Electro-CommunicationsEmail verificata su uec.ac.jp
- Ingrid VerbauwhedeKU LeuvenEmail verificata su esat.kuleuven.be
- Yang LINanjing University of Aeronautics and AstronauticsEmail verificata su uec.ac.jp
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsEmail verificata su cs.ru.nl
- Bart PreneelProfessor, KU LeuvenEmail verificata su esat.kuleuven.be
- Mitsugu IwamotoThe University of Electro-CommunicationsEmail verificata su uec.ac.jp
- Takeshi SugawaraThe University of Electro-CommunicationsEmail verificata su uec.ac.jp
- Noriyuki MiuraOsaka UniversityEmail verificata su ist.osaka-u.ac.jp
- Yu-ichi HAYASHINara Institute of Science and TechnologyEmail verificata su is.naist.jp
- Naofumi HommaTohoku UniversityEmail verificata su riec.tohoku.ac.jp
- Nele MentensLeiden University and KU LeuvenEmail verificata su esat.kuleuven.be
- Junfeng FanOpen Security ResearchEmail verificata su opsefy.com
- Patrick SchaumontWorcester Polytechnic InstituteEmail verificata su wpi.edu
- Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisEmail verificata su enst.fr
- Kohei MatsudaKobe UniversityEmail verificata su cs26.scitec.kobe-u.ac.jp
- Shin'ichiro MatsuoResearch Professor of Computer Science, Georgetown UniversityEmail verificata su georgetown.edu
- Miroslav KnezevicNXP SemiconductorsEmail verificata su nxp.com
- Yuko HaraInstitute of Science TokyoEmail verificata su cad.ict.e.titech.ac.jp
- Yong Ki LeeSamsung ElectronicsEmail verificata su snu.ac.kr
- Yuichi KomanoChiba Institute of TechnologyEmail verificata su ruri.waseda.jp