WEKO3
アイテム
{"_buckets": {"deposit": "01db7c4a-a829-4025-b62d-229d6ea7abc8"}, "_deposit": {"id": "13262", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "13262"}, "status": "published"}, "_oai": {"id": "oai:soar-ir.repo.nii.ac.jp:00013262", "sets": ["1307"]}, "author_link": ["40177", "40178"], "item_13_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2006-04", "bibliographicIssueDateType": "Issued"}, "bibliographicPageStart": "200", "bibliographic_titles": [{"bibliographic_title": "Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06)"}]}]}, "item_13_description_20": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Institutions of higher education that give the credits by distance learning using WBT have increased recently. In these situations, the authentication model by (ID, password) pair is general. However, this authentication model cannot prevent “Identity theft” effectively. In this paper, we propose a new authentication model to solve this problem by using cellular phones.", "subitem_description_type": "Abstract"}]}, "item_13_description_30": {"attribute_name": "資源タイプ(コンテンツの種類)", "attribute_value_mlt": [{"subitem_description": "Article", "subitem_description_type": "Other"}]}, "item_13_description_31": {"attribute_name": "フォーマット:mimeタイプ", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_13_description_5": {"attribute_name": "引用", "attribute_value_mlt": [{"subitem_description": "Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06)", "subitem_description_type": "Other"}]}, "item_13_link_3": {"attribute_name": "信州大学研究者総覧へのリンク", "attribute_value_mlt": [{"subitem_link_text": "Kaijiri, K", "subitem_link_url": "http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]}, "item_13_publisher_4": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE Computer Society"}]}, "item_13_relation_48": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "10.1109/ICNICONSMCL.2006.184"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "https://doi.org/10.1109/ICNICONSMCL.2006.184", "subitem_relation_type_select": "DOI"}}]}, "item_13_rights_62": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE."}]}, "item_13_select_64": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_select_item": "publisher"}]}, "item_1627890897769": {"attribute_name": "出版タイプ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Takamizawa, H"}], "nameIdentifiers": [{"nameIdentifier": "40177", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Kaijiri, K"}], "nameIdentifiers": [{"nameIdentifier": "40178", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2015-09-28"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "25520200.pdf", "filesize": [{"value": "192.0 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 192000.0, "url": {"label": "25520200.pdf", "url": "https://soar-ir.repo.nii.ac.jp/record/13262/files/25520200.pdf"}, "version_id": "4b1357ef-b2b0-41f7-befb-903c85f9a48b"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "conference paper", "resourceuri": "http://purl.org/coar/resource_type/c_5794"}]}, "item_title": "Reliable Authentication Method by Using Cellular Phones in WBT", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Reliable Authentication Method by Using Cellular Phones in WBT", "subitem_title_language": "en"}]}, "item_type_id": "13", "owner": "1", "path": ["1307"], "permalink_uri": "http://hdl.handle.net/10091/3396", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2009-10-30"}, "publish_date": "2009-10-30", "publish_status": "0", "recid": "13262", "relation": {}, "relation_version_is_last": true, "title": ["Reliable Authentication Method by Using Cellular Phones in WBT"], "weko_shared_id": -1}
Reliable Authentication Method by Using Cellular Phones in WBT
http://hdl.handle.net/10091/3396
http://hdl.handle.net/10091/3396fb55fa6a-d06c-4c11-8af0-0fadd0fc0824
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
|
Item type | 会議発表論文 / Conference Paper(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2009-10-30 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | Reliable Authentication Method by Using Cellular Phones in WBT | |||||
言語 | ||||||
言語 | eng | |||||
資源タイプ | ||||||
資源 | http://purl.org/coar/resource_type/c_5794 | |||||
タイプ | conference paper | |||||
著者 |
Takamizawa, H
× Takamizawa, H× Kaijiri, K |
|||||
信州大学研究者総覧へのリンク | ||||||
氏名 | Kaijiri, K | |||||
URL | http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html | |||||
出版者 | ||||||
出版者 | IEEE Computer Society | |||||
引用 | ||||||
内容記述タイプ | Other | |||||
内容記述 | Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06) | |||||
書誌情報 |
Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06) p. 200, 発行日 2006-04 |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Institutions of higher education that give the credits by distance learning using WBT have increased recently. In these situations, the authentication model by (ID, password) pair is general. However, this authentication model cannot prevent “Identity theft” effectively. In this paper, we propose a new authentication model to solve this problem by using cellular phones. | |||||
資源タイプ(コンテンツの種類) | ||||||
内容記述タイプ | Other | |||||
内容記述 | Article | |||||
DOI | ||||||
識別子タイプ | DOI | |||||
関連識別子 | https://doi.org/10.1109/ICNICONSMCL.2006.184 | |||||
関連名称 | 10.1109/ICNICONSMCL.2006.184 | |||||
権利 | ||||||
権利情報 | ©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | |||||
出版タイプ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 |