{"created":"2023-05-15T14:42:34.604406+00:00","id":1285,"links":{},"metadata":{"_buckets":{"deposit":"3531fed8-21fd-44dc-b092-4d122e93dfa4"},"_deposit":{"created_by":3,"id":"1285","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"1285"},"status":"published"},"_oai":{"id":"oai:konan-u.repo.nii.ac.jp:00001285","sets":["10:180:184:185"]},"author_link":["2245","2246","2247"],"item_2_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2009-07-20","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicPageEnd":"60","bibliographicPageStart":"47","bibliographicVolumeNumber":"2","bibliographic_titles":[{"bibliographic_title":"甲南大学紀要.知能情報学編"},{"bibliographic_title":"Memoirs of Konan University. Intelligence & Informatics Series","bibliographic_titleLang":"en"}]}]},"item_2_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"甲南大学"}]},"item_2_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12335282","subitem_source_identifier_type":"NCID"}]},"item_2_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"18830161","subitem_source_identifier_type":"ISSN"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"metadata only access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_14cb"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"和田, 昌浩"}],"nameIdentifiers":[{"nameIdentifier":"2245","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"砂川, 嵩行"}],"nameIdentifiers":[{"nameIdentifier":"2246","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"中野, 義隆"}],"nameIdentifiers":[{"nameIdentifier":"2247","nameIdentifierScheme":"WEKO"}]}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"カオス写像を利用したセキュリティ技術 : 電子透かしとログイン認証への応用","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"カオス写像を利用したセキュリティ技術 : 電子透かしとログイン認証への応用"}]},"item_type_id":"2","owner":"3","path":["185"],"pubdate":{"attribute_name":"公開日","attribute_value":"2015-05-01"},"publish_date":"2015-05-01","publish_status":"0","recid":"1285","relation_version_is_last":true,"title":["カオス写像を利用したセキュリティ技術 : 電子透かしとログイン認証への応用"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2023-05-16T06:42:52.182629+00:00"}