{"created":"2023-06-20T12:57:16.394326+00:00","id":1309,"links":{},"metadata":{"_buckets":{"deposit":"83f994bd-263b-4b00-8441-5172e9fe3b79"},"_deposit":{"created_by":2,"id":"1309","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"1309"},"status":"published"},"_oai":{"id":"oai:fun.repo.nii.ac.jp:00001309","sets":["22:33","25:26:52"]},"author_link":["2422","2423","96","2421","33"],"item_9_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2008-01","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"8","bibliographicPageStart":"1","bibliographicVolumeNumber":"2B13","bibliographic_titles":[{}]}]},"item_9_description_3":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Radio Frequency Identification (RFID) has been widely deployed for manufacturing, supply chain management, etc. Unfortunately, RFID may cause privacy and security problems.\nTo solve these problems, researchers have studied extensively on RFID security systems. Ateniese et al. proposed an RFID protocol using insubvertible encryption based on the universal re-encryption. Although this protocol achieves the integrity of ciphertexts randomized by authorized users, it still leaves security problems. In this paper, we propose a secure RFID protocol based on insubvertible encryption involving guardian proxy.","subitem_description_type":"Abstract"}]},"item_9_description_4":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"2008年暗号と情報セキュリティシンポジウム, SCIS 2008, 2B1-3","subitem_description_type":"Other"}]},"item_9_publisher_17":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_9_select_10":{"attribute_name":"単著共著","attribute_value_mlt":[{"subitem_select_item":"共著/joint"}]},"item_9_select_8":{"attribute_name":"査読有無","attribute_value_mlt":[{"subitem_select_item":"なし/no"}]},"item_9_select_9":{"attribute_name":"研究業績種別","attribute_value_mlt":[{"subitem_select_item":"国内学会/Domestic Conference"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Osaka, Kyosuke"}],"nameIdentifiers":[{"nameIdentifier":"2421","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Shuang, Chang"}],"nameIdentifiers":[{"nameIdentifier":"2422","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"高木, 剛","creatorNameLang":"ja"}],"familyNames":[{"familyName":"高木","familyNameLang":"ja"}],"givenNames":[{"givenName":"剛","givenNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"96","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60404802","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60404802"}]},{"creatorNames":[{"creatorName":"Yamazaki, Kenichi"}],"nameIdentifiers":[{"nameIdentifier":"2423","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"高橋, 修","creatorNameLang":"ja"}],"familyNames":[{"familyName":"高橋","familyNameLang":"ja"}],"givenNames":[{"givenName":"修","givenNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"33","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"60381282","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=60381282"}]}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"A Secure RFID Protocol based on Insubvertible Encryption using Guardian Proxy","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"A Secure RFID Protocol based on Insubvertible Encryption using Guardian Proxy"}]},"item_type_id":"9","owner":"2","path":["33","52"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-04-18"},"publish_date":"2011-04-18","publish_status":"0","recid":"1309","relation_version_is_last":true,"title":["A Secure RFID Protocol based on Insubvertible Encryption using Guardian Proxy"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2025-02-07T05:11:47.788405+00:00"}