{"created":"2023-07-25T10:33:21.600277+00:00","id":4733,"links":{},"metadata":{"_buckets":{"deposit":"b21510e1-9039-4cf2-89ab-6ded9477f654"},"_deposit":{"created_by":3,"id":"4733","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"4733"},"status":"published"},"_oai":{"id":"oai:shizuoka.repo.nii.ac.jp:00004733","sets":["80:222"]},"author_link":["941","4672","1176","1183"],"item_26_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"Copy Protection on A Reconfigurable CPU"}]},"item_26_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2001-02-20","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"15","bibliographicPageEnd":"96","bibliographicPageStart":"91","bibliographicVolumeNumber":"2001","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告. CSEC, [コンピュータセキュリティ]"}]}]},"item_26_description_30":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_26_description_9":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"ディジタルコンテンツの不正コピーを完全に防止するためには, 復号に関連する一連の情報をユーザから隔離しなければならない.この考えに基づき, すでにCMPおよびスクラッチング方式などの不正コピー防止技術が提案されている.しかしこれらの方式においては, CPUにハードウェア的な拡張を施す必要があり, 柔軟性が乏しい.そこで本稿では, CPUの一部をプログラマブルデバイスにより実装することにより, 不正コピー防止のためのハードウェア機構をソフトウェア的に再構成することが可能なCPUを作成することを提案する.本方式により, 各メーカが独自に, コンテンツに応じた最新の不正コピー防止方式を採用することが可能となる.","subitem_description_type":"Abstract"}]},"item_26_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_26_relation_22":{"attribute_name":"NII論文ID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"110004028860","subitem_relation_type_select":"NAID"}}]},"item_26_rights_7":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"本文データは学協会の許諾に基づきCiNiiから複製したものであるここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan."}]},"item_26_source_id_19":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"09196072","subitem_source_identifier_type":"ISSN"}]},"item_26_source_id_23":{"attribute_name":"NII書誌ID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_26_subject_8":{"attribute_name":"NDC","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_26_version_type_32":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"井熊, 徹"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"曽我, 正和"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"田窪, 昭夫"}],"nameIdentifiers":[{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-12-14"}],"displaytype":"detail","filename":"101028004.pdf","filesize":[{"value":"732.4 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"101028004.pdf","url":"https://shizuoka.repo.nii.ac.jp/record/4733/files/101028004.pdf"},"version_id":"7b266b48-a4d7-4508-9020-a7a96be15022"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"再構成可能計算機を用いた不正コピーの防止","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"再構成可能計算機を用いた不正コピーの防止"}]},"item_type_id":"26","owner":"3","path":["222"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-10-28"},"publish_date":"2010-10-28","publish_status":"0","recid":"4733","relation_version_is_last":true,"title":["再構成可能計算機を用いた不正コピーの防止"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-02-14T02:53:15.211465+00:00"}