{"created":"2023-06-20T12:57:37.061971+00:00","id":1663,"links":{},"metadata":{"_buckets":{"deposit":"0afda9c2-7a30-4ce1-a574-85e66a1bb067"},"_deposit":{"created_by":2,"id":"1663","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"1663"},"status":"published"},"_oai":{"id":"oai:fun.repo.nii.ac.jp:00001663","sets":["22:33","25:26:60"]},"author_link":["3271","3270","85","3272"],"item_9_biblio_info_5":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2008-01","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"110","bibliographicPageStart":"95","bibliographic_titles":[{"bibliographic_title":"4th Annual IFIP WG 11.9 International Conference on Digital Forensics (ICDF2008)"}]}]},"item_9_description_3":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"In this paper, we propose a technique for certifying encounter information\nwith acquaintances in wireless sensor networks. In our technique, we assume that\neach user holds a small low power sensor with a short range wireless communication\ndevice such as ZigBee, and that multiple sensors called landmarks, which provide\naccurate location and time, are sparsely distributed in the target area. Each user’s\nsensor stores encounter information obtained from other users and landmarks in its\nmemory, and it sends those information to its local server when it meets with landmarks\nwhich are connected to the Internet. At the same time, we assume that each\nuser registers his/her private key and the list (called friend list) of his/her acquaintances\nin the Certification Authority (CA) server. When each user sends his/her encounter\ninformation to CA, CA informs the digital evidence about when and whom\neach user has met. In order to keep privacy of each encountered person, if an encountered\nperson does not register the user’s name in his/her friend list, the user\ncannot know that the user has met with the encountered person. Thus, our technique\nguarantees anonymity and unlinkability of encounter information by using a hash\nfunction and symmetric-key encryption. We have implemented the proposed technique\nusing a hash function SHA-1 on MOTE and confirmed efficiency of the proposed\ntechnique through experiments. In addition, we have theoretically analyzed\nits low energy consumption and practical ability about traceability.","subitem_description_type":"Abstract"}]},"item_9_select_10":{"attribute_name":"単著共著","attribute_value_mlt":[{"subitem_select_item":"共著/joint"}]},"item_9_select_8":{"attribute_name":"査読有無","attribute_value_mlt":[{"subitem_select_item":"あり/yes"}]},"item_9_select_9":{"attribute_name":"研究業績種別","attribute_value_mlt":[{"subitem_select_item":"国際会議/International Conference"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Sakai, Takurou"}],"nameIdentifiers":[{"nameIdentifier":"3270","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Uchiyama, Akira"}],"nameIdentifiers":[{"nameIdentifier":"3271","nameIdentifierScheme":"WEKO"}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{"affiliationNameIdentifier":"","affiliationNameIdentifierScheme":"ISNI","affiliationNameIdentifierURI":"http://www.isni.org/isni/"}],"affiliationNames":[{"affiliationName":"","affiliationNameLang":"ja"}]}],"creatorNames":[{"creatorName":"中村, 嘉隆","creatorNameLang":"ja"}],"familyNames":[{"familyName":"中村","familyNameLang":"ja"}],"givenNames":[{"givenName":"嘉隆","givenNameLang":"ja"}],"nameIdentifiers":[{"nameIdentifier":"85","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"40452528","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=40452528"},{"nameIdentifier":"0000-0001-8248-064X","nameIdentifierScheme":"ORCIDID","nameIdentifierURI":"https://orcid.org/0000-0001-8248-064X"}]},{"creatorNames":[{"creatorName":"Higashino, Teruo"}],"nameIdentifiers":[{"nameIdentifier":"3272","nameIdentifierScheme":"WEKO"}]}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Certification of Secure Encounter History Among Low Power Mobile Sensors","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Certification of Secure Encounter History Among Low Power Mobile Sensors"}]},"item_type_id":"9","owner":"2","path":["33","60"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-09-02"},"publish_date":"2011-09-02","publish_status":"0","recid":"1663","relation_version_is_last":true,"title":["Certification of Secure Encounter History Among Low Power Mobile Sensors"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2025-02-07T05:01:21.524157+00:00"}