{"created":"2023-07-25T10:38:47.321352+00:00","id":11179,"links":{},"metadata":{"_buckets":{"deposit":"bbfa17d6-a383-42f3-8e50-ea33d383f066"},"_deposit":{"created_by":12,"id":"11179","owners":[12],"pid":{"revision_id":0,"type":"depid","value":"11179"},"status":"published"},"_oai":{"id":"oai:shizuoka.repo.nii.ac.jp:00011179","sets":["80:956"]},"author_link":["7847","9269","4721","9270","941","4686"],"item_36_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018-12-06","bibliographicIssueDateType":"Issued"},"bibliographic_titles":[{},{"bibliographic_title":"2017 International Conference on Computational Science and Computational Intelligence (CSCI)","bibliographic_titleLang":"en"}]}]},"item_36_description_10":{"attribute_name":"注記","attribute_value_mlt":[{"subitem_description":"2017 International Conference on Computational Science and Computational Intelligence (CSCI)\nDate of Conference: 14-16 December 2017\nConference Location: Las Vegas, NV, USA","subitem_description_type":"Other"}]},"item_36_description_30":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_36_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":" IEEE "}]},"item_36_relation_21":{"attribute_name":"ISBN","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"9781538626528","subitem_relation_type_select":"ISBN"}}]},"item_36_relation_28":{"attribute_name":"出版者DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1109/CSCI.2017.6","subitem_relation_type_select":"DOI"}}]},"item_36_relation_34":{"attribute_name":"出版者版","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://ieeexplore.ieee.org/document/8560717","subitem_relation_type_select":"URI"}}]},"item_36_rights_7":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2017, IEEE"},{"subitem_rights":"Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works."}]},"item_36_subject_8":{"attribute_name":"NDC","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_36_version_type_32":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Jinno, Yasuyoshi"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tsuchiya, Takashi"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ohki, Tetsushi"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"Takahashi, Kenta"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ogata, Wakaha"}],"nameIdentifiers":[{},{}]},{"creatorNames":[{"creatorName":"Nishigaki, Masakatsu"}],"nameIdentifiers":[{},{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2018-12-12"}],"displaytype":"detail","filename":"181212001.pdf","filesize":[{"value":"925.2 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"181212001","url":"https://shizuoka.repo.nii.ac.jp/record/11179/files/181212001.pdf"},"version_id":"6b670bcb-e886-4a62-9f9c-16eee2c6ac15"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"cryptography","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"computer-aided security","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"symmetric key encryption","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"A Study on Construction and Security of Computer-Aided Security Schemes","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A Study on Construction and Security of Computer-Aided Security Schemes","subitem_title_language":"en"}]},"item_type_id":"36","owner":"12","path":["956"],"pubdate":{"attribute_name":"公開日","attribute_value":"2018-12-12"},"publish_date":"2018-12-12","publish_status":"0","recid":"11179","relation_version_is_last":true,"title":["A Study on Construction and Security of Computer-Aided Security Schemes"],"weko_creator_id":"12","weko_shared_id":-1},"updated":"2024-02-14T02:54:38.266941+00:00"}