Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteVerified email at ieee.org
- Dhiman SahaIndian Institute of Technology BhilaiVerified email at iitbhilai.ac.in
- Amit JanaSRF, Indian Statistical Institute, KolkataVerified email at isical.ac.in
- Takanori IsobeUniversity of HyogoVerified email at ai.u-hyogo.ac.jp
- Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
- Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
- Willi MeierFHNWVerified email at fhnw.ch
- Fukang LiuTokyo Institute of TechnologyVerified email at m.titech.ac.jp
- Kosei SakamotoMitsubishi Electric CorporationVerified email at dc.MitsubishiElectric.co.jp
- Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
- Libo WangUniversity of Hyogo, JapanVerified email at mails.ucas.edu.cn
- Shibam GhoshUniversity Of HaifaVerified email at campus.haifa.ac.il
- Rentaro ShibaMitsubishi Electric Corporation / Nagoya UniversityVerified email at dc.mitsubishielectric.co.jp
- Dr Avishek AdhikariProfessor, Department of Mathematics, Presidency UniversityVerified email at presiuniv.ac.in
- Santanu SarkarProfessor, IIT MadrasVerified email at iitm.ac.in
- Patrick DerbezUniversity of RennesVerified email at irisa.fr
- Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr