Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Junichi YamagishiNational Institute of Informatics, Tokyo, JapanVerified email at nii.ac.jp
Huy H. NguyenNational Institute of Informatics, JapanVerified email at nii.ac.jp
Fuming FangAlibabaVerified email at alibaba-inc.com
Hoang-Quoc Nguyen-SonResearcher, Information Security LaboratoryVerified email at kddi-research.jp
Minoru KuribayashiTohoku UniversityVerified email at tohoku.ac.jp
Thach V. BuiResearch fellow at the National University of SingaporeVerified email at nus.edu.sg
Minh-Triet TranUniversity of Science & John von Neumann Institute, VNU-HCMVerified email at fit.hcmus.edu.vn
Vincent NozickAssociate professor, Université Gustave Eiffel, FranceVerified email at univ-eiffel.fr
Tieu Thi Ngoc DungSOKENDAI (The Graduate University for Advanced Studies)Verified email at nii.ac.jp
Trung-Nghia LeUniversity of Science, VNU-HCMVerified email at fit.hcmus.edu.vn
Edgar WeipplUniversity of Vienna, Head of SQI CD-Laboratory, SBA ResearchVerified email at univie.ac.at
Nobutaka OnoProfessor, Tokyo Metropolitan UniversityVerified email at tmu.ac.jp
Peter KiesebergSt. Pölten University of Applied Sciences, AustriaVerified email at fhstp.ac.at
Sebastian SchrittwieserUniversity of ViennaVerified email at univie.ac.at
Adrian DabrowskiCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Tomoko MatsuiInstitute of Statistical MathematicsVerified email at ism.ac.jp
Mahdi CheraghchiAssociate Professor of Computer Science and Engineering, University of Michigan, Ann ArborVerified email at umich.edu
町田史門, Shimon MachidaSAPVerified email at sap.com
Tomi KinnunenProfessor, University of Eastern FinlandVerified email at uef.fi
Follow
Isao Echizen
National Institute of Informatics / University of Tokyo / SOKENDAI
Verified email at nii.ac.jp - Homepage