{"created":"2021-03-01T06:18:29.460675+00:00","id":1898,"links":{},"metadata":{"_buckets":{"deposit":"ac47be23-20e1-4075-af5d-592e72e76bcf"},"_deposit":{"id":"1898","owners":[],"pid":{"revision_id":0,"type":"depid","value":"1898"},"status":"published"},"_oai":{"id":"oai:repository.dl.itc.u-tokyo.ac.jp:00001898","sets":["34:105:262","9:233:234"]},"item_7_alternative_title_1":{"attribute_name":"その他のタイトル","attribute_value_mlt":[{"subitem_alternative_title":"Fingerprinting Attacks on the Tor Anonymity System and Defense Mechanisms"}]},"item_7_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2010-09-27","bibliographicIssueDateType":"Issued"},"bibliographic_titles":[{}]}]},"item_7_date_granted_25":{"attribute_name":"学位授与年月日","attribute_value_mlt":[{"subitem_dategranted":"2010-09-27"}]},"item_7_degree_name_20":{"attribute_name":"学位名","attribute_value_mlt":[{"subitem_degreename":"修士(情報理工学)"}]},"item_7_full_name_3":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"5743","nameIdentifierScheme":"WEKO"}],"names":[{"name":"Shi, Yi"}]}]},"item_7_select_21":{"attribute_name":"学位","attribute_value_mlt":[{"subitem_select_item":"master"}]},"item_7_subject_13":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_7_text_24":{"attribute_name":"研究科・専攻","attribute_value_mlt":[{"subitem_text_value":"情報理工学系研究科電子情報学専攻"}]},"item_7_text_4":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京大学大学院情報理工学系研究科 電子情報学専攻"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"施, 屹"}],"nameIdentifiers":[{"nameIdentifier":"5742","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-05-31"}],"displaytype":"detail","filename":"48086445.pdf","filesize":[{"value":"1.4 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"48086445.pdf","url":"https://repository.dl.itc.u-tokyo.ac.jp/record/1898/files/48086445.pdf"},"version_id":"e3ec608e-1ca2-4246-8793-3ce48b1886be"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"thesis","resourceuri":"http://purl.org/coar/resource_type/c_46ec"}]},"item_title":"Tor匿名システムに対する指紋攻撃と防御手法","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Tor匿名システムに対する指紋攻撃と防御手法"}]},"item_type_id":"7","owner":"1","path":["234","262"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-08-08"},"publish_date":"2011-08-08","publish_status":"0","recid":"1898","relation_version_is_last":true,"title":["Tor匿名システムに対する指紋攻撃と防御手法"],"weko_creator_id":"1","weko_shared_id":null},"updated":"2022-12-19T03:43:24.535142+00:00"}