Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteEmail verificata su ieee.org
- Dhiman SahaIndian Institute of Technology BhilaiEmail verificata su iitbhilai.ac.in
- Amit JanaSRF, Indian Statistical Institute, KolkataEmail verificata su isical.ac.in
- Takanori IsobeUniversity of HyogoEmail verificata su ai.u-hyogo.ac.jp
- Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandEmail verificata su epfl.ch
- Eik ListChair of Media Security, Bauhaus-Universität WeimarEmail verificata su uni-weimar.de
- Willi MeierFHNWEmail verificata su fhnw.ch
- Fukang LiuTokyo Institute of TechnologyEmail verificata su m.titech.ac.jp
- Kosei SakamotoMitsubishi Electric CorporationEmail verificata su dc.MitsubishiElectric.co.jp
- Dr Avishek AdhikariProfessor, Department of Mathematics, Presidency UniversityEmail verificata su presiuniv.ac.in
- Ling SongJinan University, Guangzhou, ChinaEmail verificata su jnu.edu.cn
- Libo WangUniversity of Hyogo, JapanEmail verificata su mails.ucas.edu.cn
- Shibam GhoshUniversity Of HaifaEmail verificata su campus.haifa.ac.il
- Rentaro ShibaMitsubishi Electric Corporation / Nagoya UniversityEmail verificata su dc.mitsubishielectric.co.jp
- Santanu SarkarProfessor, IIT MadrasEmail verificata su iitm.ac.in
- Patrick DerbezUniversity of RennesEmail verificata su irisa.fr
- Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceEmail verificata su ens.fr