{"created":"2023-07-25T10:33:21.835758+00:00","id":4737,"links":{},"metadata":{"_buckets":{"deposit":"3d169569-b544-433a-ae26-0a9241fa3dfd"},"_deposit":{"created_by":3,"id":"4737","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"4737"},"status":"published"},"_oai":{"id":"oai:shizuoka.repo.nii.ac.jp:00004737","sets":["80:222"]},"author_link":["941","1174","1176","4676"],"item_26_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"Secure data communication over hybrid channels"}]},"item_26_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2003-02-27","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"18","bibliographicPageEnd":"40","bibliographicPageStart":"35","bibliographicVolumeNumber":"2003","bibliographic_titles":[{"bibliographic_title":"情報処理学会研究報告. CSEC, [コンピュータセキュリティ]"}]}]},"item_26_description_30":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_26_description_9":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"通信路の安全性を高めるために,通信チャネルの多重化による「ハイブリットチャネル」を用いた通信方式を提案する.本稿では特に,携帯電話と有線のインターネットによる通信路の2重化に焦点を当て,「セキュアだが狭帯域な通信路」と「アンセキュアだが広帯域な通信路」の2本の通信路によるハイブリットチャネル通信に対する考察を行う.本方式により実現されるセキュア通信方式,セキュア通信システムを説明し,通信チャネルを多重化することが,盗聴などの攻撃に対する耐性を向上させるだけでなく,秘密データの効率的・機能的な伝送に対しても効果的であることを示す.","subitem_description_type":"Abstract"}]},"item_26_publisher_6":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_26_relation_22":{"attribute_name":"NII論文ID","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"110004028873","subitem_relation_type_select":"NAID"}}]},"item_26_rights_7":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"本文データは学協会の許諾に基づきCiNiiから複製したものであるここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan."}]},"item_26_source_id_19":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"09196072","subitem_source_identifier_type":"ISSN"}]},"item_26_source_id_23":{"attribute_name":"NII書誌ID","attribute_value_mlt":[{"subitem_source_identifier":"AA11235941","subitem_source_identifier_type":"NCID"}]},"item_26_subject_8":{"attribute_name":"NDC","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_26_version_type_32":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"大杉, 俊典"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"西垣, 正勝"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"曽我, 正和"}],"nameIdentifiers":[{},{},{},{}]},{"creatorNames":[{"creatorName":"中村, 逸一"}],"nameIdentifiers":[{},{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-12-14"}],"displaytype":"detail","filename":"101028008.pdf","filesize":[{"value":"424.7 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"101028008.pdf","url":"https://shizuoka.repo.nii.ac.jp/record/4737/files/101028008.pdf"},"version_id":"c74be115-e92a-4f4a-837f-e1955aedb2bb"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"ハイブリッドチャネルによるセキュア通信方式<ネットワークセキュリティ>","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ハイブリッドチャネルによるセキュア通信方式<ネットワークセキュリティ>"}]},"item_type_id":"26","owner":"3","path":["222"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-10-28"},"publish_date":"2010-10-28","publish_status":"0","recid":"4737","relation_version_is_last":true,"title":["ハイブリッドチャネルによるセキュア通信方式<ネットワークセキュリティ>"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2024-02-14T02:49:39.282556+00:00"}