WEKO3
インデックスリンク
アイテム
{"_buckets": {"deposit": "24165f6c-877e-478c-907c-d2ac3408e6f1"}, "_deposit": {"created_by": 3, "id": "8304", "owners": [3], "pid": {"revision_id": 0, "type": "depid", "value": "8304"}, "status": "published"}, "_oai": {"id": "oai:kanazawa-u.repo.nii.ac.jp:00008304", "sets": ["936"]}, "author_link": ["11577", "11576", "402"], "item_4_biblio_info_8": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2009-01-01", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "1", "bibliographicPageEnd": "83", "bibliographicPageStart": "71", "bibliographicVolumeNumber": "26", "bibliographic_titles": [{"bibliographic_title": "Computer Software"}]}]}, "item_4_description_21": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "An example of verification of authentication protocols with CafeOBJ algebraic specification language is shown. The NSLPK authentication protocol is based on the public-key cryptosystem. Two principals can use the protocol to achieve the mutual authentication between them. The successful completion of the message exchanges specified by the protocol lets two principals share some information. The secrecy property is as follows: even when there exist malicious principals, the information is never leaked to any third parties. Described is the verification with proof score that the protocol satisfies the (nonce) secrecy property.", "subitem_description_type": "Abstract"}]}, "item_4_description_5": {"attribute_name": "提供者所属", "attribute_value_mlt": [{"subitem_description": "金沢大学理工研究域電子情報学系", "subitem_description_type": "Other"}]}, "item_4_publisher_17": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "Japan Society for Software Science and Technology = 日本ソフトウェア科学会"}]}, "item_4_relation_28": {"attribute_name": "関連URI", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "http://www.jssst.or.jp/", "subitem_relation_type_select": "URI"}}]}, "item_4_rights_23": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "(c) Japan Society for Software Science and Technology 2009"}]}, "item_4_source_id_11": {"attribute_name": "NCID", "attribute_value_mlt": [{"subitem_source_identifier": "AN10075819", "subitem_source_identifier_type": "NCID"}]}, "item_4_source_id_9": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "0289-6540", "subitem_source_identifier_type": "ISSN"}]}, "item_4_version_type_25": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "緒方, 和博"}], "nameIdentifiers": [{"nameIdentifier": "11576", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "二木, 厚吉"}], "nameIdentifiers": [{"nameIdentifier": "11577", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "中村, 正樹"}], "nameIdentifiers": [{"nameIdentifier": "402", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "40345658", "nameIdentifierScheme": "研究者番号", "nameIdentifierURI": "https://nrid.nii.ac.jp/nrid/1000040345658"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2017-10-03"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "TE-PR-NAKAMURA-M-71.pdf", "filesize": [{"value": "126.2 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 126200.0, "url": {"label": "TE-PR-NAKAMURA-M-71.pdf", "url": "https://kanazawa-u.repo.nii.ac.jp/record/8304/files/TE-PR-NAKAMURA-M-71.pdf"}, "version_id": "d6c0e705-567f-46f2-955c-31c4b79a2951"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "jpn"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "CafeOBJ 入門 (5) : 認証プロトコルの検証", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "CafeOBJ 入門 (5) : 認証プロトコルの検証"}, {"subitem_title": "Introducing CafeOBJ (5) : Verification of an authentication protocol", "subitem_title_language": "en"}]}, "item_type_id": "4", "owner": "3", "path": ["936"], "permalink_uri": "http://hdl.handle.net/2297/27300", "pubdate": {"attribute_name": "公開日", "attribute_value": "2017-10-03"}, "publish_date": "2017-10-03", "publish_status": "0", "recid": "8304", "relation": {}, "relation_version_is_last": true, "title": ["CafeOBJ 入門 (5) : 認証プロトコルの検証"], "weko_shared_id": -1}
CafeOBJ 入門 (5) : 認証プロトコルの検証
http://hdl.handle.net/2297/27300
http://hdl.handle.net/2297/273001c5ccbe9-62f6-451d-8d82-6be2c07d8315
名前 / ファイル | ライセンス | アクション |
---|---|---|
TE-PR-NAKAMURA-M-71.pdf (126.2 kB)
|
|
Item type | 学術雑誌論文 / Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2017-10-03 | |||||
タイトル | ||||||
タイトル | CafeOBJ 入門 (5) : 認証プロトコルの検証 | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | Introducing CafeOBJ (5) : Verification of an authentication protocol | |||||
言語 | ||||||
言語 | jpn | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||
資源タイプ | journal article | |||||
著者 |
緒方, 和博
× 緒方, 和博× 二木, 厚吉× 中村, 正樹 |
|||||
提供者所属 | ||||||
内容記述タイプ | Other | |||||
内容記述 | 金沢大学理工研究域電子情報学系 | |||||
書誌情報 |
Computer Software 巻 26, 号 1, p. 71-83, 発行日 2009-01-01 |
|||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 0289-6540 | |||||
NCID | ||||||
収録物識別子タイプ | NCID | |||||
収録物識別子 | AN10075819 | |||||
出版者 | ||||||
出版者 | Japan Society for Software Science and Technology = 日本ソフトウェア科学会 | |||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | An example of verification of authentication protocols with CafeOBJ algebraic specification language is shown. The NSLPK authentication protocol is based on the public-key cryptosystem. Two principals can use the protocol to achieve the mutual authentication between them. The successful completion of the message exchanges specified by the protocol lets two principals share some information. The secrecy property is as follows: even when there exist malicious principals, the information is never leaked to any third parties. Described is the verification with proof score that the protocol satisfies the (nonce) secrecy property. | |||||
権利 | ||||||
権利情報 | (c) Japan Society for Software Science and Technology 2009 | |||||
著者版フラグ | ||||||
出版タイプ | VoR | |||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |||||
関連URI | ||||||
識別子タイプ | URI | |||||
関連識別子 | http://www.jssst.or.jp/ |