Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
Gregor LeanderRuhr University BochumVerified email at rub.de
Willi MeierFHNWVerified email at fhnw.ch
Takanori IsobeUniversity of HyogoVerified email at ai.u-hyogo.ac.jp
Yonglin HaoState Key Laboratory of CryptologyVerified email at sklc.org
Qingju Wang (王庆菊)Postdoctoral Researcher, University of LuxembourgVerified email at uni.lu
Subhadeep BanikAmbizione Fellow, LASEC, EPFL SwitzerlandVerified email at epfl.ch
Thomas PeyrinAssociate Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Siwei SunChinese Academy of Sciences; Singapore University of Technology and DesignVerified email at ucas.ac.cn
Keita XagawaNTT Social Informatics LaboratoriesVerified email at hco.ntt.co.jp
Toshihiro OhigashiTokai UniversityVerified email at tsc.u-tokai.ac.jp
Yu SasakiNTT Secure Platform Labratories