Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ken-ichi KawarabayashiNational Institute of Informatics, The University of TokyoVerified email at nii.ac.jp
- Yusuke KOBAYASHIKyoto UniversityVerified email at kurims.kyoto-u.ac.jp
- Takuro FukunagaChuo UniversityVerified email at g.chuo-u.ac.jp
- Yoshio OkamotoUniversity of Electro-CommunicationsVerified email at uec.ac.jp
- Shinji ItoThe University of TokyoVerified email at mist.i.u-tokyo.ac.jp
- Yuni IwamasaKyoto UniversityVerified email at i.kyoto-u.ac.jp
- Yuichi YoshidaNational Institute of InformaticsVerified email at nii.ac.jp
- Satoru IwataUniversity of TokyoVerified email at mist.i.u-tokyo.ac.jp
- Tasuku SomaThe Institute of Statistical MathematicsVerified email at ism.ac.jp
- Kazuhiro InabaGoogleVerified email at google.com
- Vorapong SuppakitpaisarnThe University of TokyoVerified email at is.s.u-tokyo.ac.jp
- Atsushi MiyauchiCENTAI InstituteVerified email at centai.eu
- Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Charalampos E. TsourakakisBoston UniversityVerified email at bu.edu
- Kei KimuraKyushu UniversityVerified email at inf.kyushu-u.ac.jp
- Yutaro YamaguchiOsaka UniversityVerified email at ist.osaka-u.ac.jp
- Tianyi ChenPhD, Boston UniversityVerified email at bu.edu
- Simon MaurasINRIAVerified email at inria.fr
- Laura SanitàAssociate Professor, Bocconi University of MilanVerified email at unibocconi.it
- Friedrich EisenbrandEPFLVerified email at epfl.ch