{"created":"2023-06-20T12:57:07.937987+00:00","id":1170,"links":{},"metadata":{"_buckets":{"deposit":"801070e7-e0df-407b-8c2e-0883cce16ccd"},"_deposit":{"created_by":2,"id":"1170","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"1170"},"status":"published"},"_oai":{"id":"oai:fun.repo.nii.ac.jp:00001170","sets":["22:33","25:26:51"]},"author_link":["96","2073","2072"],"item_9_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2006","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3903","bibliographicPageEnd":"44","bibliographicPageStart":"33","bibliographic_titles":[{"bibliographic_title":"The 2nd Information Security Practice and Experience Conference ISPEC2006"}]}]},"item_9_description_4":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"LNCS","subitem_description_type":"Other"}]},"item_9_publisher_17":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Springer-Verlag "}]},"item_9_select_10":{"attribute_name":"単著共著","attribute_value_mlt":[{"subitem_select_item":"共著/joint"}]},"item_9_select_9":{"attribute_name":"研究業績種別","attribute_value_mlt":[{"subitem_select_item":"国際会議/International Conference"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Han, Dong-Guk"}],"nameIdentifiers":[{"nameIdentifier":"2072","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"高木, 剛","creatorNameLang":"ja"}],"familyNames":[{"familyName":"高木","familyNameLang":"ja"}],"givenNames":[{"givenName":"剛","givenNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"96","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60404802","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60404802"}]},{"creatorNames":[{"creatorName":"Lim, C."}],"nameIdentifiers":[{"nameIdentifier":"2073","nameIdentifierScheme":"WEKO"}]}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Further Security Analysis of XTR","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Further Security Analysis of XTR"}]},"item_type_id":"9","owner":"2","path":["33","51"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-02-19"},"publish_date":"2010-02-19","publish_status":"0","recid":"1170","relation_version_is_last":true,"title":["Further Security Analysis of XTR"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2025-02-07T05:11:43.269173+00:00"}