{"created":"2021-03-01T06:17:33.520662+00:00","id":1004,"links":{},"metadata":{"_buckets":{"deposit":"e4d06e83-68b7-44c1-8306-214f8454cabb"},"_deposit":{"id":"1004","owners":[],"pid":{"revision_id":0,"type":"depid","value":"1004"},"status":"published"},"_oai":{"id":"oai:repository.dl.itc.u-tokyo.ac.jp:00001004","sets":["110:111:243","9:233:234"]},"item_7_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"An Authorization Method with(k,n) Threshold Scheme in Mobile Ad Hoc Networks"}]},"item_7_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2005-03","bibliographicIssueDateType":"Issued"},"bibliographic_titles":[{}]}]},"item_7_date_granted_25":{"attribute_name":"学位授与年月日","attribute_value_mlt":[{"subitem_dategranted":"2005-03"}]},"item_7_description_11":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_7_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"4054","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Yamaguchi, Kensuke"}]}]},"item_7_select_21":{"attribute_name":"学位","attribute_value_mlt":[{"subitem_select_item":"master"}]},"item_7_subject_13":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"547.48","subitem_subject_scheme":"NDC"}]},"item_7_text_24":{"attribute_name":"研究科・専攻","attribute_value_mlt":[{"subitem_text_value":"新領域創成科学研究科基盤情報学専攻"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"山口, 健輔"}],"nameIdentifiers":[{"nameIdentifier":"4053","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-05-31"}],"displaytype":"detail","filename":"K-00180.pdf","filesize":[{"value":"521.1 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文(fulltext)","url":"https://repository.dl.itc.u-tokyo.ac.jp/record/1004/files/K-00180.pdf"},"version_id":"77dc68ad-99c0-4c17-af13-fc2dd80c5dc1"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"アドホックネットワーク","subitem_subject_scheme":"Other"},{"subitem_subject":"(k,n)閾値法","subitem_subject_scheme":"Other"},{"subitem_subject":"認証方式","subitem_subject_scheme":"Other"},{"subitem_subject":"authorization method","subitem_subject_scheme":"Other"},{"subitem_subject":"(k,n) threshold scheme","subitem_subject_scheme":"Other"},{"subitem_subject":"Ad Hoc Networks","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"thesis","resourceuri":"http://purl.org/coar/resource_type/c_46ec"}]},"item_title":"アドホックネットワークにおける(k,n) 閾値法を用いた認証方式に関する研究","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"アドホックネットワークにおける(k,n) 閾値法を用いた認証方式に関する研究"}]},"item_type_id":"7","owner":"1","path":["234","243"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-08-08"},"publish_date":"2011-08-08","publish_status":"0","recid":"1004","relation_version_is_last":true,"title":["アドホックネットワークにおける(k,n) 閾値法を用いた認証方式に関する研究"],"weko_creator_id":"1","weko_shared_id":null},"updated":"2022-12-19T03:42:18.332550+00:00"}