WEKO3
AND
アイテム
{"_buckets": {"deposit": "ac47be23-20e1-4075-af5d-592e72e76bcf"}, "_deposit": {"id": "1898", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "1898"}, "status": "published"}, "_oai": {"id": "oai:repository.dl.itc.u-tokyo.ac.jp:00001898"}, "item_7_alternative_title_1": {"attribute_name": "\u305d\u306e\u4ed6\u306e\u30bf\u30a4\u30c8\u30eb", "attribute_value_mlt": [{"subitem_alternative_title": "Fingerprinting Attacks on the Tor Anonymity System and Defense Mechanisms"}]}, "item_7_biblio_info_7": {"attribute_name": "\u66f8\u8a8c\u60c5\u5831", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2010-09-27", "bibliographicIssueDateType": "Issued"}, "bibliographic_titles": [{}]}]}, "item_7_date_granted_25": {"attribute_name": "\u5b66\u4f4d\u6388\u4e0e\u5e74\u6708\u65e5", "attribute_value_mlt": [{"subitem_dategranted": "2010-09-27"}]}, "item_7_degree_name_20": {"attribute_name": "\u5b66\u4f4d\u540d", "attribute_value_mlt": [{"subitem_degreename": "\u4fee\u58eb(\u60c5\u5831\u7406\u5de5\u5b66)"}]}, "item_7_full_name_3": {"attribute_name": "\u8457\u8005\u5225\u540d", "attribute_value_mlt": [{"nameIdentifiers": [{"nameIdentifier": "5743", "nameIdentifierScheme": "WEKO"}], "names": [{"name": "Shi, Yi"}]}]}, "item_7_select_21": {"attribute_name": "\u5b66\u4f4d", "attribute_value_mlt": [{"subitem_select_item": "master"}]}, "item_7_subject_13": {"attribute_name": "\u65e5\u672c\u5341\u9032\u5206\u985e\u6cd5", "attribute_value_mlt": [{"subitem_subject": "007", "subitem_subject_scheme": "NDC"}]}, "item_7_text_24": {"attribute_name": "\u7814\u7a76\u79d1\u30fb\u5c02\u653b", "attribute_value_mlt": [{"subitem_text_value": "\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"}]}, "item_7_text_36": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"subitem_text_value": "Thesis"}]}, "item_7_text_4": {"attribute_name": "\u8457\u8005\u6240\u5c5e", "attribute_value_mlt": [{"subitem_text_value": "\u6771\u4eac\u5927\u5b66\u5927\u5b66\u9662\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u3000\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"}]}, "item_creator": {"attribute_name": "\u8457\u8005", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "\u65bd, \u5c79"}], "nameIdentifiers": [{"nameIdentifier": "5742", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "\u30d5\u30a1\u30a4\u30eb\u60c5\u5831", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2017-05-31"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "48086445.pdf", "filesize": [{"value": "1.4 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 1400000.0, "url": {"label": "48086445.pdf", "url": "https://repository.dl.itc.u-tokyo.ac.jp/record/1898/files/48086445.pdf"}, "version_id": "e3ec608e-1ca2-4246-8793-3ce48b1886be"}]}, "item_language": {"attribute_name": "\u8a00\u8a9e", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"resourcetype": "thesis", "resourceuri": "http://purl.org/coar/resource_type/c_46ec"}]}, "item_title": "Tor\u533f\u540d\u30b7\u30b9\u30c6\u30e0\u306b\u5bfe\u3059\u308b\u6307\u7d0b\u653b\u6483\u3068\u9632\u5fa1\u624b\u6cd5", "item_titles": {"attribute_name": "\u30bf\u30a4\u30c8\u30eb", "attribute_value_mlt": [{"subitem_title": "Tor\u533f\u540d\u30b7\u30b9\u30c6\u30e0\u306b\u5bfe\u3059\u308b\u6307\u7d0b\u653b\u6483\u3068\u9632\u5fa1\u624b\u6cd5"}]}, "item_type_id": "7", "owner": "1", "path": ["9/233/234", "34/105/262"], "permalink_uri": "http://hdl.handle.net/2261/37659", "pubdate": {"attribute_name": "\u516c\u958b\u65e5", "attribute_value": "2011-08-08"}, "publish_date": "2011-08-08", "publish_status": "0", "recid": "1898", "relation": {}, "relation_version_is_last": true, "title": ["Tor\u533f\u540d\u30b7\u30b9\u30c6\u30e0\u306b\u5bfe\u3059\u308b\u6307\u7d0b\u653b\u6483\u3068\u9632\u5fa1\u624b\u6cd5"], "weko_shared_id": null}
Tor匿名システムに対する指紋攻撃と防御手法
http://hdl.handle.net/2261/37659
abacf1a1-e991-47f7-bc2c-50cc1fe35ae6
名前 / ファイル | ライセンス | アクション | |
---|---|---|---|
![]() |
|
Item type | 学位論文 / Thesis or Dissertation(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2011-08-08 | |||||
タイトル | ||||||
タイトル | Tor匿名システムに対する指紋攻撃と防御手法 | |||||
言語 | ||||||
言語 | eng | |||||
資源タイプ | ||||||
資源 | http://purl.org/coar/resource_type/c_46ec | |||||
タイプ | thesis | |||||
その他のタイトル | ||||||
その他のタイトル | Fingerprinting Attacks on the Tor Anonymity System and Defense Mechanisms | |||||
著者 |
施, 屹
× 施, 屹 |
|||||
著者別名 | ||||||
識別子 | ||||||
識別子 | 5743 | |||||
識別子Scheme | WEKO | |||||
姓名 | ||||||
姓名 | Shi, Yi | |||||
著者所属 | ||||||
著者所属 | 東京大学大学院情報理工学系研究科 電子情報学専攻 | |||||
書誌情報 | 発行日 2010-09-27 | |||||
日本十進分類法 | ||||||
主題 | 007 | |||||
主題Scheme | NDC | |||||
学位名 | ||||||
学位名 | 修士(情報理工学) | |||||
学位 | ||||||
値 | master | |||||
研究科・専攻 | ||||||
情報理工学系研究科電子情報学専攻 | ||||||
学位授与年月日 | ||||||
学位授与年月日 | 2010-09-27 |