{"created":"2023-06-20T12:57:07.543527+00:00","id":1162,"links":{},"metadata":{"_buckets":{"deposit":"804c17ed-17b2-4f99-958e-55a8fc32ab6f"},"_deposit":{"created_by":2,"id":"1162","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"1162"},"status":"published"},"_oai":{"id":"oai:fun.repo.nii.ac.jp:00001162","sets":["22:28","25:26:51"]},"author_link":["96","2051","2050"],"item_5_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2005","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3813","bibliographicPageEnd":"204","bibliographicPageStart":"189","bibliographic_titles":[{"bibliographic_title":"2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks ESAS2005"}]}]},"item_5_description_4":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"LNCS","subitem_description_type":"Other"}]},"item_5_publisher_17":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Springer-Verlag"}]},"item_5_select_10":{"attribute_name":"単著共著","attribute_value_mlt":[{"subitem_select_item":"共著/joint"}]},"item_5_select_9":{"attribute_name":"研究業績種別","attribute_value_mlt":[{"subitem_select_item":"原著論文/Original Paper"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Dahmen, Erik"}],"nameIdentifiers":[{"nameIdentifier":"2050","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Okeya, Katsuyuki"}],"nameIdentifiers":[{"nameIdentifier":"2051","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"高木, 剛","creatorNameLang":"ja"}],"familyNames":[{"familyName":"高木","familyNameLang":"ja"}],"givenNames":[{"givenName":"剛","givenNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"96","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60404802","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60404802"}]}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices"}]},"item_type_id":"5","owner":"2","path":["28","51"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-02-19"},"publish_date":"2010-02-19","publish_status":"0","recid":"1162","relation_version_is_last":true,"title":["An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2025-02-07T05:11:41.595224+00:00"}