Crea il mio profilo
Coautori
- Yuji SekiyaThe University of TokyoEmail verificata su nc.u-tokyo.ac.jp
- Takeshi TakahashiNational Institute of Information and Communications TechnologyEmail verificata su nict.go.jp
- Gregory BlancTélécom SudParis, Institut Mines-Télécom, Institut Polytechnique de ParisEmail verificata su telecom-sudparis.eu
- Doudou FALLAssociate Professor of Computer Science, Ecole Superieure Polytechnique, University Cheikh Anta DiopEmail verificata su esp.sn
- Keiichi SHIMASoftBank Corp.Email verificata su wide.ad.jp
- Jema David NdibwileAssistant Professor of Cybersecurity - Carnegie Mellon UniversityEmail verificata su cmu.edu
- Hajime TazakiSenior Researcher, IIJ Research LaboratoryEmail verificata su sfc.wide.ad.jp
- Masayuki JimichiKwansei Gakuin UniversityEmail verificata su kwansei.ac.jp
- John McAlaneyBournemouth UniversityEmail verificata su bournemouth.ac.uk
- Andrew M'mangaBournemouth UniversityEmail verificata su bournemouth.ac.uk
- Shamal FailyDefence Science and Technology LaboratoryEmail verificata su dstl.gov.uk
- Mio SUZUKITechnical Expert, National Institute of Information and Communications TechnologyEmail verificata su nict.go.jp
- Hiroshi AbeToyotaEmail verificata su mail.toyota.co.jp
- Hirochika AsaiPreferred Networks, Inc. / WIDE ProjectEmail verificata su wide.ad.jp
- Mitsuaki AkiyamaNTTEmail verificata su ieee.org
- Toshiyuki MiyachiNational Institute of Information and Communications TechnologyEmail verificata su myamya.org
- Kazuya OkadaAssistant Professor, The University of TokyoEmail verificata su g.ecc.u-tokyo.ac.jp
- Ady Wahyudi PaunduUniversitas HasanuddinEmail verificata su paundu.net