{"created":"2023-05-15T10:27:03.425803+00:00","id":22354,"links":{},"metadata":{"_buckets":{"deposit":"a4306a53-9a8f-49a3-9798-3df5ad0a3465"},"_deposit":{"created_by":1,"id":"22354","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"22354"},"status":"published"},"_oai":{"id":"oai:u-fukui.repo.nii.ac.jp:00022354","sets":["2403:2404"]},"author_link":["64517","64518","64516","64519"],"item_10001_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2010","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"911","bibliographicPageStart":"906","bibliographic_titles":[{"bibliographic_title":"Systems Man and Cybernetics (SMC),2010 IEEE International Conference on"}]}]},"item_10001_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"This paper discusses mechanisms to identify dishonest users of services provided by a server in environments where identities of honest users must be kept as their secrets. An anonymous token based mechanism enables the server to identify dishonest users when dishonest events are detected while the users are receiving services, and a homomorhic anonymous token based one enables that even dishonest events can be detected only after the server completed their services and the users had left from the server. A linear equation based encryption algorithm that is used for implementing the above methods is also enhanced.","subitem_description_type":"Abstract"}]},"item_10001_relation_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"TD00006801","subitem_relation_type_select":"NCID"}}]},"item_10001_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1062922X","subitem_source_identifier_type":"ISSN"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"TAMURA, Shinsuke"}],"nameIdentifiers":[{"nameIdentifier":"64516","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"OHASHI, Yusuke"}],"nameIdentifiers":[{"nameIdentifier":"64517","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"TANIGUCHI, Shuji"}],"nameIdentifiers":[{"nameIdentifier":"64518","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"YANASE, Tatsuro"}],"nameIdentifiers":[{"nameIdentifier":"64519","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2020-08-04"}],"displaytype":"detail","filename":"SMC2010-906-911.pdf","filesize":[{"value":"135.5 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"SMC2010-906-911.pdf","url":"https://u-fukui.repo.nii.ac.jp/record/22354/files/SMC2010-906-911.pdf"},"version_id":"a58d1a1d-b36c-4998-9d91-1bdf347c3b58"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"anonymous tokens","subitem_subject_scheme":"Other"},{"subitem_subject":"homomorphic anonymous tokens","subitem_subject_scheme":"Other"},{"subitem_subject":"dishonest event","subitem_subject_scheme":"Other"},{"subitem_subject":"dishonest entities","subitem_subject_scheme":"Other"},{"subitem_subject":"linear equation based encryption algorithm","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"other","resourceuri":"http://purl.org/coar/resource_type/c_1843"}]},"item_title":"Detection of Dishonest Entities","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Detection of Dishonest Entities"}]},"item_type_id":"10001","owner":"1","path":["2404"],"pubdate":{"attribute_name":"公開日","attribute_value":"2011-02-22"},"publish_date":"2011-02-22","publish_status":"0","recid":"22354","relation_version_is_last":true,"title":["Detection of Dishonest Entities"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2023-05-15T13:02:36.203653+00:00"}