WEKO3
アイテム
{"_buckets": {"deposit": "9ecca174-4afd-43dd-ade4-1c81cffcce15"}, "_deposit": {"created_by": 2, "id": "1163", "owners": [2], "pid": {"revision_id": 0, "type": "depid", "value": "1163"}, "status": "published"}, "_oai": {"id": "oai:fun.repo.nii.ac.jp:00001163", "sets": ["28", "51"]}, "author_link": ["2055", "2054", "96", "2052", "2053"], "item_5_biblio_info_5": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2005", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "3823", "bibliographicPageEnd": "873", "bibliographicPageStart": "864", "bibliographic_titles": [{"bibliographic_title": "LNCS"}]}]}, "item_5_description_4": {"attribute_name": "内容記述", "attribute_value_mlt": [{"subitem_description": "The First International Workshop on Security in Ubiquitous Computing Systems SecUbiq-05 ", "subitem_description_type": "Other"}]}, "item_5_publisher_17": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "Springer-Verlag"}]}, "item_5_select_10": {"attribute_name": "単著共著", "attribute_value_mlt": [{"subitem_select_item": "共著/joint"}]}, "item_5_select_9": {"attribute_name": "研究業績種別", "attribute_value_mlt": [{"subitem_select_item": "原著論文/Original Paper"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "metadata only access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_14cb"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Han, Dong-Guk"}], "nameIdentifiers": [{"nameIdentifier": "2052", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Takagi, Tsuyoshi"}], "nameIdentifiers": [{"nameIdentifier": "96", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "60404802", "nameIdentifierScheme": "e-Rad", "nameIdentifierURI": "https://kaken.nii.ac.jp/ja/search/?qm=60404802"}]}, {"creatorNames": [{"creatorName": "Kim, Tae Hyun"}], "nameIdentifiers": [{"nameIdentifier": "2053", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Kim, Howon"}], "nameIdentifiers": [{"nameIdentifier": "2054", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Chung, Kyo Il"}], "nameIdentifiers": [{"nameIdentifier": "2055", "nameIdentifierScheme": "WEKO"}]}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Collision Attack on XTR and a Countermeasure with Fixed Pattern", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Collision Attack on XTR and a Countermeasure with Fixed Pattern"}]}, "item_type_id": "5", "owner": "2", "path": ["28", "51"], "permalink_uri": "http://hdl.handle.net/10445/2218", "pubdate": {"attribute_name": "公開日", "attribute_value": "2010-02-19"}, "publish_date": "2010-02-19", "publish_status": "0", "recid": "1163", "relation": {}, "relation_version_is_last": true, "title": ["Collision Attack on XTR and a Countermeasure with Fixed Pattern"], "weko_shared_id": -1}
Collision Attack on XTR and a Countermeasure with Fixed Pattern
http://hdl.handle.net/10445/2218
http://hdl.handle.net/10445/2218d3126b01-d49b-4851-9ab8-f13656878432
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2010-02-19 | |||||
タイトル | ||||||
タイトル | Collision Attack on XTR and a Countermeasure with Fixed Pattern | |||||
言語 | ||||||
言語 | eng | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | journal article | |||||
アクセス権 | ||||||
アクセス権 | metadata only access | |||||
アクセス権URI | http://purl.org/coar/access_right/c_14cb | |||||
著者 |
Han, Dong-Guk
× Han, Dong-Guk× Takagi, Tsuyoshi× Kim, Tae Hyun× Kim, Howon× Chung, Kyo Il |
|||||
内容記述 | ||||||
内容記述タイプ | Other | |||||
内容記述 | The First International Workshop on Security in Ubiquitous Computing Systems SecUbiq-05 | |||||
書誌情報 |
LNCS 号 3823, p. 864-873, 発行日 2005 |
|||||
研究業績種別 | ||||||
値 | 原著論文/Original Paper | |||||
単著共著 | ||||||
値 | 共著/joint | |||||
出版者 | ||||||
出版者 | Springer-Verlag |