ログイン
言語:

WEKO3

  • トップ
  • コミュニティ
  • ランキング
AND
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "ac47be23-20e1-4075-af5d-592e72e76bcf"}, "_deposit": {"id": "1898", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "1898"}, "status": "published"}, "_oai": {"id": "oai:repository.dl.itc.u-tokyo.ac.jp:00001898"}, "item_7_alternative_title_1": {"attribute_name": "\u305d\u306e\u4ed6\u306e\u30bf\u30a4\u30c8\u30eb", "attribute_value_mlt": [{"subitem_alternative_title": "Fingerprinting Attacks on the Tor Anonymity System and Defense Mechanisms"}]}, "item_7_biblio_info_7": {"attribute_name": "\u66f8\u8a8c\u60c5\u5831", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2010-09-27", "bibliographicIssueDateType": "Issued"}, "bibliographic_titles": [{}]}]}, "item_7_date_granted_25": {"attribute_name": "\u5b66\u4f4d\u6388\u4e0e\u5e74\u6708\u65e5", "attribute_value_mlt": [{"subitem_dategranted": "2010-09-27"}]}, "item_7_degree_name_20": {"attribute_name": "\u5b66\u4f4d\u540d", "attribute_value_mlt": [{"subitem_degreename": "\u4fee\u58eb(\u60c5\u5831\u7406\u5de5\u5b66)"}]}, "item_7_full_name_3": {"attribute_name": "\u8457\u8005\u5225\u540d", "attribute_value_mlt": [{"nameIdentifiers": [{"nameIdentifier": "5743", "nameIdentifierScheme": "WEKO"}], "names": [{"name": "Shi, Yi"}]}]}, "item_7_select_21": {"attribute_name": "\u5b66\u4f4d", "attribute_value_mlt": [{"subitem_select_item": "master"}]}, "item_7_subject_13": {"attribute_name": "\u65e5\u672c\u5341\u9032\u5206\u985e\u6cd5", "attribute_value_mlt": [{"subitem_subject": "007", "subitem_subject_scheme": "NDC"}]}, "item_7_text_24": {"attribute_name": "\u7814\u7a76\u79d1\u30fb\u5c02\u653b", "attribute_value_mlt": [{"subitem_text_value": "\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"}]}, "item_7_text_36": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"subitem_text_value": "Thesis"}]}, "item_7_text_4": {"attribute_name": "\u8457\u8005\u6240\u5c5e", "attribute_value_mlt": [{"subitem_text_value": "\u6771\u4eac\u5927\u5b66\u5927\u5b66\u9662\u60c5\u5831\u7406\u5de5\u5b66\u7cfb\u7814\u7a76\u79d1\u3000\u96fb\u5b50\u60c5\u5831\u5b66\u5c02\u653b"}]}, "item_creator": {"attribute_name": "\u8457\u8005", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "\u65bd, \u5c79"}], "nameIdentifiers": [{"nameIdentifier": "5742", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "\u30d5\u30a1\u30a4\u30eb\u60c5\u5831", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2017-05-31"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "48086445.pdf", "filesize": [{"value": "1.4 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 1400000.0, "url": {"label": "48086445.pdf", "url": "https://repository.dl.itc.u-tokyo.ac.jp/record/1898/files/48086445.pdf"}, "version_id": "e3ec608e-1ca2-4246-8793-3ce48b1886be"}]}, "item_language": {"attribute_name": "\u8a00\u8a9e", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "\u8cc7\u6e90\u30bf\u30a4\u30d7", "attribute_value_mlt": [{"resourcetype": "thesis", "resourceuri": "http://purl.org/coar/resource_type/c_46ec"}]}, "item_title": "Tor\u533f\u540d\u30b7\u30b9\u30c6\u30e0\u306b\u5bfe\u3059\u308b\u6307\u7d0b\u653b\u6483\u3068\u9632\u5fa1\u624b\u6cd5", "item_titles": {"attribute_name": "\u30bf\u30a4\u30c8\u30eb", "attribute_value_mlt": [{"subitem_title": "Tor\u533f\u540d\u30b7\u30b9\u30c6\u30e0\u306b\u5bfe\u3059\u308b\u6307\u7d0b\u653b\u6483\u3068\u9632\u5fa1\u624b\u6cd5"}]}, "item_type_id": "7", "owner": "1", "path": ["9/233/234", "34/105/262"], "permalink_uri": "http://hdl.handle.net/2261/37659", "pubdate": {"attribute_name": "\u516c\u958b\u65e5", "attribute_value": "2011-08-08"}, "publish_date": "2011-08-08", "publish_status": "0", "recid": "1898", "relation": {}, "relation_version_is_last": true, "title": ["Tor\u533f\u540d\u30b7\u30b9\u30c6\u30e0\u306b\u5bfe\u3059\u308b\u6307\u7d0b\u653b\u6483\u3068\u9632\u5fa1\u624b\u6cd5"], "weko_shared_id": null}
  1. 124 情報理工学系研究科
  2. 40 電子情報学専攻
  3. 1244025 修士論文(電子情報学専攻)
  1. 0 資料タイプ別
  2. 20 学位論文
  3. 025 修士論文

Tor匿名システムに対する指紋攻撃と防御手法

http://hdl.handle.net/2261/37659
abacf1a1-e991-47f7-bc2c-50cc1fe35ae6
名前 / ファイル ライセンス アクション
48086445.pdf 48086445.pdf (1.4 MB)
Item type 学位論文 / Thesis or Dissertation(1)
公開日 2011-08-08
タイトル
タイトル Tor匿名システムに対する指紋攻撃と防御手法
言語
言語 eng
資源タイプ
資源 http://purl.org/coar/resource_type/c_46ec
タイプ thesis
その他のタイトル
その他のタイトル Fingerprinting Attacks on the Tor Anonymity System and Defense Mechanisms
著者 施, 屹

× 施, 屹

WEKO 5742

施, 屹

Search repository
著者別名
識別子
識別子 5743
識別子Scheme WEKO
姓名
姓名 Shi, Yi
著者所属
著者所属 東京大学大学院情報理工学系研究科 電子情報学専攻
書誌情報 発行日 2010-09-27
日本十進分類法
主題 007
主題Scheme NDC
学位名
学位名 修士(情報理工学)
学位
値 master
研究科・専攻
情報理工学系研究科電子情報学専攻
学位授与年月日
学位授与年月日 2010-09-27
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-02 08:12:14.799891
Show All versions

Share

Mendeley CiteULike Twitter Facebook Print Addthis

Cite as

Export

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by CERN Data Centre & Invenio


Powered by CERN Data Centre & Invenio