Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ken-ichi KawarabayashiVerified email at nii.ac.jp
Takuro FukunagaChuo UniversityVerified email at g.chuo-u.ac.jp
Shinji ItoNEC CorporationVerified email at nec.com
Yoshio OkamotoUniversity of Electro-CommunicationsVerified email at uec.ac.jp
Yuichi YoshidaNational Institute of InformaticsVerified email at nii.ac.jp
Tasuku SomaMassachusetts Institute of TechnologyVerified email at mit.edu
Kazuhiro InabaGoogleVerified email at google.com
Satoru IwataUniversity of TokyoVerified email at mist.i.u-tokyo.ac.jp
Vorapong SuppakitpaisarnThe University of TokyoVerified email at is.s.u-tokyo.ac.jp
Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Atsushi MiyauchiUniversity of TokyoVerified email at mist.i.u-tokyo.ac.jp
Yutaro YamaguchiKyushu UniversityVerified email at inf.kyushu-u.ac.jp
Yuni IwamasaKyoto UniversityVerified email at i.kyoto-u.ac.jp
Charalampos E. TsourakakisBoston University, ISI Foundation, Harvard UniversityVerified email at seas.harvard.edu
Tianyi ChenPhD, Boston UniversityVerified email at bu.edu
Laura SanitàAssociate Professor, C&O Department - University of WaterlooVerified email at uwaterloo.ca
Friedrich EisenbrandEPFLVerified email at epfl.ch
Thomas RothvossUniversity of WashingtonVerified email at math.mit.edu
Kenjiro TakazawaHosei UniversityVerified email at hosei.ac.jp
Simon MaurasIRIF, ParisVerified email at irif.fr

Naonori Kakimura
Verified email at math.keio.ac.jp - Homepage