Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Takahiro ShinagawaAssociate Professor, Information Technology Center, The University of TokyoVerified email at ecc.u-tokyo.ac.jp
Hirotake AbeUniversity of TsukubaVerified email at cs.tsukuba.ac.jp
Mizuki OkaAssociate Professor of Computer Science, Tsukuba UniversityVerified email at cs.tsukuba.ac.jp
Yoshihiro OyamaAssociate Professor, University of TsukubaVerified email at cc.tsukuba.ac.jp
Koji HasebeUniversity of TsukubaVerified email at cs.tsukuba.ac.jp
Yasushi ShinjoUniversity of TsukubaVerified email at cs.tsukuba.ac.jp
Kenji KonoKeio UniversityVerified email at ics.keio.ac.jp
Kazumasa OmoteUniversity of TsukubaVerified email at risk.tsukuba.ac.jp
Shigeru ChibaThe University of TokyoVerified email at acm.org
Manabu Hirano (平野 学)Professor, National Institute of Technology, Toyota CollegeVerified email at toyota-ct.ac.jp
Atsushi OhoriTohoku UniversityVerified email at riec.tohoku.ac.jp
Takaaki FukaiVerified email at riken.jp
Kunihiko ToumuraHitachi, Ltd.Verified email at hitachi.com
Yosuke CHUBACHIInstitute of Information Security, Active Defense Institute, Ltd.Verified email at iisec.ac.jp
takashi ikegamiThe graduate school of Arts and Sciences, University of TokyoVerified email at sacral.c.u-tokyo.ac.jp
Follow![Kazuhiko Kato](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=P6Weh7AAAAAJ&citpid=3)
Kazuhiko Kato
Professor, Departmen of Computer Science, University of Tsukuba
Verified email at cs.tsukuba.ac.jp - Homepage