Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Keita EmuraKanazawa UniversityEmail verificata su se.kanazawa-u.ac.jp
- Hyung Tae LeeChung-Ang UniversityEmail verificata su cau.ac.kr
- Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityEmail verificata su snu.ac.kr
- S LingEmail verificata su ntu.edu.sg
- Huaxiong WangNanyang Technological University, SingaporeEmail verificata su ntu.edu.sg
- Sungwook KimDepartment of Information Security, Seoul Women's UniversityEmail verificata su swu.ac.kr
- Koutarou Suzuki (鈴木幸太郎)Toyohashi University of Technology (豊橋技術科学大学)Email verificata su suzuki.email.ne.jp
- Taek-Young YounDankook UniversityEmail verificata su dankook.ac.kr
- Jinsu KimSecurity 2Lab, Software Center, Samsung ElectronicsEmail verificata su snu.ac.kr
- Yohei WatanabeThe University of Electro-CommunicationsEmail verificata su uec.ac.jp
- Sunpill KimPh.D. Candidate at Hanyang University, KoreaEmail verificata su hanyang.ac.kr
- Stanislaw JareckiUniversity of California Irvine (UCI)Email verificata su uci.edu
- Tibor JagerUniversity of WuppertalEmail verificata su uni-wuppertal.de
- Dennis HofheinzDepartment of Computer Science, ETH ZürichEmail verificata su inf.ethz.ch
- Christoph StriecksAIT Austrian Institute of TechnologyEmail verificata su ait.ac.at
- Jonathan KatzProfessor of Computer Science, University of MarylandEmail verificata su cs.umd.edu
- Myungsun KimThe University of SuwonEmail verificata su suwon.ac.kr
- Kyoohyung HanSamsung SDSEmail verificata su samsung.com
- Kazuki YoneyamaIbaraki UniversityEmail verificata su vc.ibaraki.ac.jp
- Keita XagawaTechnology Innovation Institute (TII)Email verificata su tii.ae
Segui