{"created":"2021-03-01T06:16:11.197084+00:00","id":13262,"links":{},"metadata":{"_buckets":{"deposit":"01db7c4a-a829-4025-b62d-229d6ea7abc8"},"_deposit":{"id":"13262","owners":[],"pid":{"revision_id":0,"type":"depid","value":"13262"},"status":"published"},"_oai":{"id":"oai:soar-ir.repo.nii.ac.jp:00013262","sets":["1221:1307"]},"author_link":["40177","40178"],"item_13_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2006-04","bibliographicIssueDateType":"Issued"},"bibliographicPageStart":"200","bibliographic_titles":[{"bibliographic_title":"Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06)"}]}]},"item_13_description_20":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Institutions of higher education that give the credits by distance learning using WBT have increased recently. In these situations, the authentication model by (ID, password) pair is general. However, this authentication model cannot prevent “Identity theft” effectively. In this paper, we propose a new authentication model to solve this problem by using cellular phones.","subitem_description_type":"Abstract"}]},"item_13_description_30":{"attribute_name":"資源タイプ(コンテンツの種類)","attribute_value_mlt":[{"subitem_description":"Article","subitem_description_type":"Other"}]},"item_13_description_5":{"attribute_name":"引用","attribute_value_mlt":[{"subitem_description":"Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06)","subitem_description_type":"Other"}]},"item_13_link_3":{"attribute_name":"信州大学研究者総覧へのリンク","attribute_value_mlt":[{"subitem_link_text":"Kaijiri, K","subitem_link_url":"http://soar-rd.shinshu-u.ac.jp/profile/ja.gFypZVkh.html"}]},"item_13_publisher_4":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE Computer Society"}]},"item_13_relation_48":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"10.1109/ICNICONSMCL.2006.184"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1109/ICNICONSMCL.2006.184","subitem_relation_type_select":"DOI"}}]},"item_13_rights_62":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"©2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE."}]},"item_1627890897769":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Takamizawa, H"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kaijiri, K"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2015-09-28"}],"displaytype":"detail","filename":"25520200.pdf","filesize":[{"value":"192.0 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"25520200.pdf","url":"https://soar-ir.repo.nii.ac.jp/record/13262/files/25520200.pdf"},"version_id":"4b1357ef-b2b0-41f7-befb-903c85f9a48b"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Reliable Authentication Method by Using Cellular Phones in WBT","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Reliable Authentication Method by Using Cellular Phones in WBT","subitem_title_language":"en"}]},"item_type_id":"13","owner":"1","path":["1307"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2009-10-30"},"publish_date":"2009-10-30","publish_status":"0","recid":"13262","relation_version_is_last":true,"title":["Reliable Authentication Method by Using Cellular Phones in WBT"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-12-14T04:02:22.298749+00:00"}