ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "01db7c4a-a829-4025-b62d-229d6ea7abc8"}, "_deposit": {"id": "13262", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "13262"}, "status": "published"}, "_oai": {"id": "oai:soar-ir.repo.nii.ac.jp:00013262", "sets": ["1307"]}, "author_link": ["40177", "40178"], "item_13_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2006-04", "bibliographicIssueDateType": "Issued"}, "bibliographicPageStart": "200", "bibliographic_titles": [{"bibliographic_title": "Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06)"}]}]}, "item_13_description_20": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Institutions of higher education that give the credits by distance learning using WBT have increased recently. In these situations, the authentication model by (ID, password) pair is general. However, this authentication model cannot prevent “Identity theft” effectively. In this paper, we propose a new authentication model to solve this problem by using cellular phones.", "subitem_description_type": "Abstract"}]}, "item_13_description_30": {"attribute_name": "資源タイプ(コンテンツの種類)", "attribute_value_mlt": [{"subitem_description": "Article", "subitem_description_type": "Other"}]}, "item_13_description_31": {"attribute_name": "フォーマット:mimeタイプ", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_13_description_5": {"attribute_name": "引用", "attribute_value_mlt": [{"subitem_description": "Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06)", "subitem_description_type": "Other"}]}, "item_13_link_3": {"attribute_name": "信州大学研究者総覧へのリンク", "attribute_value_mlt": [{"subitem_link_text": "Kaijiri, K", "subitem_link_url": "http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]}, "item_13_publisher_4": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE Computer Society"}]}, "item_13_relation_48": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "10.1109/ICNICONSMCL.2006.184"}], "subitem_relation_type_id": {"subitem_relation_type_id_text": "https://doi.org/10.1109/ICNICONSMCL.2006.184", "subitem_relation_type_select": "DOI"}}]}, "item_13_rights_62": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE."}]}, "item_13_select_64": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_select_item": "publisher"}]}, "item_1627890897769": {"attribute_name": "出版タイプ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Takamizawa,  H"}], "nameIdentifiers": [{"nameIdentifier": "40177", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Kaijiri,  K"}], "nameIdentifiers": [{"nameIdentifier": "40178", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2015-09-28"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "25520200.pdf", "filesize": [{"value": "192.0 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 192000.0, "url": {"label": "25520200.pdf", "url": "https://soar-ir.repo.nii.ac.jp/record/13262/files/25520200.pdf"}, "version_id": "4b1357ef-b2b0-41f7-befb-903c85f9a48b"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "conference paper", "resourceuri": "http://purl.org/coar/resource_type/c_5794"}]}, "item_title": "Reliable Authentication Method by Using Cellular Phones in WBT", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Reliable Authentication Method by Using Cellular Phones in WBT", "subitem_title_language": "en"}]}, "item_type_id": "13", "owner": "1", "path": ["1307"], "permalink_uri": "http://hdl.handle.net/10091/3396", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2009-10-30"}, "publish_date": "2009-10-30", "publish_status": "0", "recid": "13262", "relation": {}, "relation_version_is_last": true, "title": ["Reliable Authentication Method by Using Cellular Phones in WBT"], "weko_shared_id": -1}
  1. 060 工学部
  2. 0603 会議発表資料

Reliable Authentication Method by Using Cellular Phones in WBT

http://hdl.handle.net/10091/3396
http://hdl.handle.net/10091/3396
fb55fa6a-d06c-4c11-8af0-0fadd0fc0824
名前 / ファイル ライセンス アクション
25520200.pdf 25520200.pdf (192.0 kB)
Item type 会議発表論文 / Conference Paper(1)
公開日 2009-10-30
タイトル
言語 en
タイトル Reliable Authentication Method by Using Cellular Phones in WBT
言語
言語 eng
資源タイプ
資源 http://purl.org/coar/resource_type/c_5794
タイプ conference paper
著者 Takamizawa, H

× Takamizawa, H

WEKO 40177

Takamizawa, H

Search repository
Kaijiri, K

× Kaijiri, K

WEKO 40178

Kaijiri, K

Search repository
信州大学研究者総覧へのリンク
氏名 Kaijiri, K
URL http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html
出版者
出版者 IEEE Computer Society
引用
内容記述タイプ Other
内容記述 Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06)
書誌情報 Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06)

p. 200, 発行日 2006-04
抄録
内容記述タイプ Abstract
内容記述 Institutions of higher education that give the credits by distance learning using WBT have increased recently. In these situations, the authentication model by (ID, password) pair is general. However, this authentication model cannot prevent “Identity theft” effectively. In this paper, we propose a new authentication model to solve this problem by using cellular phones.
資源タイプ(コンテンツの種類)
内容記述タイプ Other
内容記述 Article
DOI
識別子タイプ DOI
関連識別子 https://doi.org/10.1109/ICNICONSMCL.2006.184
関連名称 10.1109/ICNICONSMCL.2006.184
権利
権利情報 ©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
出版タイプ
出版タイプ VoR
出版タイプResource http://purl.org/coar/version/c_970fb48d4fbd8a85
戻る
0
views
See details
Views

Versions

Ver.1 2021-03-01 11:06:50.783432
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3