{"created":"2023-06-20T12:57:16.295258+00:00","id":1307,"links":{},"metadata":{"_buckets":{"deposit":"06238c24-c478-4923-a252-428533ee85ea"},"_deposit":{"created_by":2,"id":"1307","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"1307"},"status":"published"},"_oai":{"id":"oai:fun.repo.nii.ac.jp:00001307","sets":["22:33","25:26:52"]},"author_link":["2415","96","33","2414"],"item_9_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2007","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"787","bibliographicPageStart":"778","bibliographicVolumeNumber":"LNAI 4456","bibliographic_titles":[{}]}]},"item_9_description_3":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Generally, RFID systems consist of RFID tag, RFID reader, and back-end database. We are facing privacy and security problems and challenges in the RFID system. The privacy and security problems arise from RFID tag limitation such as small memory and low computing power. Due to such the limitation, data transmission between RFID tags and RFID readers are unencrypted, in addition RFID tags provide no tamper resistance. That is, RFID tags and RFID readers communicate with each other in insecure wireless\nchannel.","subitem_description_type":"Abstract"}]},"item_9_description_4":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"IEEE International Conference on Cybernetics and Intelligent Systems (CIS 2007)","subitem_description_type":"Other"}]},"item_9_publisher_17":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Springer-Verlag"}]},"item_9_select_10":{"attribute_name":"単著共著","attribute_value_mlt":[{"subitem_select_item":"共著/joint"}]},"item_9_select_8":{"attribute_name":"査読有無","attribute_value_mlt":[{"subitem_select_item":"あり/yes"}]},"item_9_select_9":{"attribute_name":"研究業績種別","attribute_value_mlt":[{"subitem_select_item":"国際会議/International Conference"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Osaka, Kyosuke"}],"nameIdentifiers":[{"nameIdentifier":"2414","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"高木, 剛","creatorNameLang":"ja"}],"familyNames":[{"familyName":"高木","familyNameLang":"ja"}],"givenNames":[{"givenName":"剛","givenNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"96","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60404802","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60404802"}]},{"creatorNames":[{"creatorName":"Yamazaki, Kenichi"}],"nameIdentifiers":[{"nameIdentifier":"2415","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"高橋, 修","creatorNameLang":"ja"}],"familyNames":[{"familyName":"高橋","familyNameLang":"ja"}],"givenNames":[{"givenName":"修","givenNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"33","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60381282","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60381282"}]}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"An Efficient and Secure RFID Security Method with Ownership Transfer","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"An Efficient and Secure RFID Security Method with Ownership Transfer"}]},"item_type_id":"9","owner":"2","path":["33","52"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-04-18"},"publish_date":"2011-04-18","publish_status":"0","recid":"1307","relation_version_is_last":true,"title":["An Efficient and Secure RFID Security Method with Ownership Transfer"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2025-02-07T05:11:47.577153+00:00"}