{"created":"2023-06-20T12:57:07.592930+00:00","id":1163,"links":{},"metadata":{"_buckets":{"deposit":"9ecca174-4afd-43dd-ade4-1c81cffcce15"},"_deposit":{"created_by":2,"id":"1163","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"1163"},"status":"published"},"_oai":{"id":"oai:fun.repo.nii.ac.jp:00001163","sets":["22:28","25:26:51"]},"author_link":["96","2055","2052","2054","2053"],"item_5_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2005","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3823","bibliographicPageEnd":"873","bibliographicPageStart":"864","bibliographic_titles":[{"bibliographic_title":"LNCS"}]}]},"item_5_description_4":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"The First International Workshop on Security in Ubiquitous Computing Systems SecUbiq-05 ","subitem_description_type":"Other"}]},"item_5_publisher_17":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Springer-Verlag"}]},"item_5_select_10":{"attribute_name":"単著共著","attribute_value_mlt":[{"subitem_select_item":"共著/joint"}]},"item_5_select_9":{"attribute_name":"研究業績種別","attribute_value_mlt":[{"subitem_select_item":"原著論文/Original Paper"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Han, Dong-Guk"}],"nameIdentifiers":[{"nameIdentifier":"2052","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"高木, 剛","creatorNameLang":"ja"}],"familyNames":[{"familyName":"高木","familyNameLang":"ja"}],"givenNames":[{"givenName":"剛","givenNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"96","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60404802","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60404802"}]},{"creatorNames":[{"creatorName":"Kim, Tae Hyun"}],"nameIdentifiers":[{"nameIdentifier":"2053","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Kim, Howon"}],"nameIdentifiers":[{"nameIdentifier":"2054","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Chung, Kyo Il"}],"nameIdentifiers":[{"nameIdentifier":"2055","nameIdentifierScheme":"WEKO"}]}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Collision Attack on XTR and a Countermeasure with Fixed Pattern","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Collision Attack on XTR and a Countermeasure with Fixed Pattern"}]},"item_type_id":"5","owner":"2","path":["28","51"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-02-19"},"publish_date":"2010-02-19","publish_status":"0","recid":"1163","relation_version_is_last":true,"title":["Collision Attack on XTR and a Countermeasure with Fixed Pattern"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2025-02-07T05:11:41.802786+00:00"}