Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Takahiro ShinagawaAssociate Professor, Information Technology Center, The University of TokyoVerified email at ecc.u-tokyo.ac.jp
- Hirotake AbeUniversity of TsukubaVerified email at cs.tsukuba.ac.jp
- Mizuki OkaAssociate Professor of Computer Science, Tsukuba UniversityVerified email at cs.tsukuba.ac.jp
- Yoshihiro OyamaAssociate Professor, University of TsukubaVerified email at cc.tsukuba.ac.jp
- Koji HasebeUniversity of TsukubaVerified email at cs.tsukuba.ac.jp
- Yasushi ShinjoUniversity of TsukubaVerified email at cs.tsukuba.ac.jp
- Kenji KonoKeio UniversityVerified email at ics.keio.ac.jp
- Kazumasa OmoteUniversity of TsukubaVerified email at risk.tsukuba.ac.jp
- Shigeru ChibaThe University of TokyoVerified email at acm.org
- Manabu Hirano (平野 学)Professor, National Institute of Technology, Toyota CollegeVerified email at toyota-ct.ac.jp
- Atsushi OhoriTohoku UniversityVerified email at riec.tohoku.ac.jp
- Takaaki FukaiVerified email at riken.jp
- Kunihiko ToumuraHitachi, Ltd.Verified email at hitachi.com
- Yosuke CHUBACHIInstitute of Information Security, Active Defense Institute, Ltd.Verified email at iisec.ac.jp
- takashi ikegamiThe graduate school of Arts and Sciences, University of TokyoVerified email at sacral.c.u-tokyo.ac.jp
Follow
Kazuhiko Kato
Professor, Departmen of Computer Science, University of Tsukuba
Verified email at cs.tsukuba.ac.jp - Homepage