{"created":"2023-07-25T10:41:20.228016+00:00","id":14290,"links":{},"metadata":{"_buckets":{"deposit":"a7b75dc2-5056-455b-8a8c-72e5e78dd149"},"_deposit":{"created_by":12,"id":"14290","owners":[12],"pid":{"revision_id":0,"type":"depid","value":"14290"},"status":"published"},"_oai":{"id":"oai:shizuoka.repo.nii.ac.jp:00014290","sets":["80:956"]},"author_link":["7847","11027","941","11466","7843","11514","11026"],"item_36_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2022-10-24","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"682","bibliographicPageStart":"675","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2022論文集"},{"bibliographic_title":"Computer Security Symposium 2022","bibliographic_titleLang":"en"}]}]},"item_36_description_10":{"attribute_name":"注記","attribute_value_mlt":[{"subitem_description":"コンピュータセキュリティシンポジウム2022\n開催期間 : 2022年10月24日(月)~ 2022年10月27日(木)\n会場 : 熊本城ホールとオンライン(ZOOM)のハイブリッド開催\nセッション番号 : 2C-III-3","subitem_description_type":"Other"}]},"item_36_description_30":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_36_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_36_relation_29":{"attribute_name":"関連サイト","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://www.iwsec.org/css/2022/program.html","subitem_relation_type_select":"URI"}}]},"item_36_rights_7":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"ここに掲載した著作物の利用に関する注意 本著作物の著作権は情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。"},{"subitem_rights":"Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan. Comments are welcome. Mail to address editj@ipsj.or.jp, please."}]},"item_36_version_type_32":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"野崎, 真之介"}],"nameIdentifiers":[{"nameIdentifier":"11466","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"芹澤, 歩弥"}],"nameIdentifiers":[{"nameIdentifier":"11027","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"吉平, 瑞穂"}],"nameIdentifiers":[{"nameIdentifier":"11026","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"藤田, 真浩"}],"nameIdentifiers":[{"nameIdentifier":"7843","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"7843","nameIdentifierScheme":"wekoID","nameIdentifierURI":"https://shizuoka.repo.nii.ac.jp/?action=pages_view_main&active_action=repository_view_main_item_snippet&meta=&wekoAuthorId=7843&count=20&order=16&pn=1&page_id=13&block_id=21"},{"nameIdentifier":"6d4b7457-af59-4fe4-ac5f-73033f168cfa","nameIdentifierScheme":"著者リンク","nameIdentifierURI":"http://uni.lib.shizuoka.ac.jp/Record/6d4b7457-af59-4fe4-ac5f-73033f168cfa"}]},{"creatorNames":[{"creatorName":"吉村, 礼子"}],"nameIdentifiers":[{"nameIdentifier":"11514","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"大木, 哲史"}],"nameIdentifiers":[{"nameIdentifier":"7847","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"80537407","nameIdentifierScheme":"KAKEN - 研究者検索","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000080537407/"},{"nameIdentifier":"7847","nameIdentifierScheme":"wekoID","nameIdentifierURI":"https://shizuoka.repo.nii.ac.jp/?action=pages_view_main&active_action=repository_view_main_item_snippet&meta=&wekoAuthorId=7847&count=20&order=16&pn=1&page_id=13&block_id=21"},{"nameIdentifier":"4a9d842a-3412-434d-b7b9-9414d3fc0c03","nameIdentifierScheme":"著者リンク","nameIdentifierURI":"http://uni.lib.shizuoka.ac.jp/Record/4a9d842a-3412-434d-b7b9-9414d3fc0c03"}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{"nameIdentifier":"941","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"20283335","nameIdentifierScheme":"KAKEN - 研究者検索","nameIdentifierURI":"https://nrid.nii.ac.jp/ja/nrid/1000020283335/"},{"nameIdentifier":"941","nameIdentifierScheme":"wekoID","nameIdentifierURI":"https://shizuoka.repo.nii.ac.jp/?action=pages_view_main&active_action=repository_view_main_item_snippet&meta=&wekoAuthorId=941&count=20&order=16&pn=1&page_id=13&block_id=21"},{"nameIdentifier":"a93f6127-1400-4fe6-8dfb-eb562b5f93a0","nameIdentifierScheme":"著者リンク","nameIdentifierURI":"http://uni.lib.shizuoka.ac.jp/Record/a93f6127-1400-4fe6-8dfb-eb562b5f93a0"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2022-11-16"}],"displaytype":"detail","filename":"221116001.pdf","filesize":[{"value":"1.8 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"221116001","url":"https://shizuoka.repo.nii.ac.jp/record/14290/files/221116001.pdf"},"version_id":"a03a0930-c006-4c56-a84c-02494d2955d5"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ユーザ認証","subitem_subject_scheme":"Other"},{"subitem_subject":"多要素認証","subitem_subject_scheme":"Other"},{"subitem_subject":"ユーザブルセキュリティ","subitem_subject_scheme":"Other"},{"subitem_subject":"User Authentication","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Multi-Factor Authentication","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Usable Security","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"多点観測型多要素認証 : 単一クレデンシャルによる多要素認証の達成(その2)","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"多点観測型多要素認証 : 単一クレデンシャルによる多要素認証の達成(その2)"},{"subitem_title":"Multi-Observed Multi-Factor Authentication : A Multi-Factor Authentication Using Single Credential (part 2)","subitem_title_language":"en"}]},"item_type_id":"36","owner":"12","path":["956"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-11-16"},"publish_date":"2022-11-16","publish_status":"0","recid":"14290","relation_version_is_last":true,"title":["多点観測型多要素認証 : 単一クレデンシャルによる多要素認証の達成(その2)"],"weko_creator_id":"12","weko_shared_id":-1},"updated":"2024-02-14T02:54:42.947658+00:00"}