Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Mitsuaki AkiyamaNTTVerified email at ieee.org
- Shigeki GotoWaseda UniversityVerified email at goto.info.waseda.ac.jp
- Toshiki ShibaharaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
- Tatsuya MoriProfessor, Waseda UniversityVerified email at nsl.cs.waseda.ac.jp
- Takashi KoideNTTVerified email at hco.ntt.co.jp
- Naoki FukushiNTTVerified email at hco.ntt.co.jp
- Masayuki MurataProfessor, Graduate School of Information Science and Technology, Osaka UniversityVerified email at ist.osaka-u.ac.jp
- Yuichi OhsitaCybermedia Center, Osaka UniversityVerified email at osaka-u.ac.jp
- Masato UchidaWaseda UniversityVerified email at waseda.jp
- Katsunari YoshiokaYokohama National UniversityVerified email at ynu.ac.jp
- Tobias FiebigMax-Planck-Institut für Informatik, FG INETVerified email at fiebig.nl
- Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl