WEKO3
アイテム
{"_buckets": {"deposit": "208c6738-962c-487f-9638-beaad64d1371"}, "_deposit": {"id": "39159", "owners": [], "pid": {"revision_id": 0, "type": "depid", "value": "39159"}, "status": "published"}, "_oai": {"id": "oai:tsukuba.repo.nii.ac.jp:00039159", "sets": ["2863", "5409"]}, "item_5_biblio_info_6": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2016-08", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "12", "bibliographicPageEnd": "1725", "bibliographicPageStart": "1717", "bibliographicVolumeNumber": "9", "bibliographic_titles": [{"bibliographic_title": "Security and communication networks"}]}]}, "item_5_creator_3": {"attribute_name": "著者別名", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "西出, 隆志"}], "nameIdentifiers": [{"nameIdentifier": "204632", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "70570985", "nameIdentifierScheme": "e-Rad", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000070570985"}, {"nameIdentifier": "0000003384", "nameIdentifierScheme": "筑波大学研究者総覧", "nameIdentifierURI": "http://trios.tsukuba.ac.jp/researcher/0000003384"}]}]}, "item_5_description_4": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform a wildcard search, partial match search, and so on. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm our scheme can be used in these environments. Availability on portable devices will offer high convenience. Copyright © 2013 John Wiley \u0026 Sons, Ltd.", "subitem_description_type": "Abstract"}]}, "item_5_publisher_27": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "Wiley"}]}, "item_5_relation_11": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1002/sec.876", "subitem_relation_type_select": "DOI"}}]}, "item_5_rights_12": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2013 John Wiley \u0026 Sons, Ltd"}, {"subitem_rights": "This is the peer reviewed version of the following article: Security and communication networks, 9:1717-1725, which has been published in final form at 10.1002/sec.876. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving."}]}, "item_5_select_15": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_select_item": "author"}]}, "item_5_source_id_7": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "1939-0114", "subitem_source_identifier_type": "ISSN"}]}, "item_5_subject_20": {"attribute_name": "NIIサブジェクト", "attribute_value_mlt": [{"subitem_subject": "情報学", "subitem_subject_scheme": "Other"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "Suga, Takanori"}], "nameIdentifiers": [{"nameIdentifier": "141924", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Nishide, Takashi"}], "nameIdentifiers": [{"nameIdentifier": "141925", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "Sakurai, Kouichi"}], "nameIdentifiers": [{"nameIdentifier": "141926", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2017-09-01"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "SCN_9-12.pdf", "filesize": [{"value": "133.0 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 133000.0, "url": {"label": "SCN_9-12", "url": "https://tsukuba.repo.nii.ac.jp/record/39159/files/SCN_9-12.pdf"}, "version_id": "99f4eda6-0626-492a-b93c-e6030b039207"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Character-based symmetric searchable encryption and its implementation and experiment on mobile devices", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Character-based symmetric searchable encryption and its implementation and experiment on mobile devices"}]}, "item_type_id": "5", "owner": "1", "path": ["2863", "5409"], "permalink_uri": "http://hdl.handle.net/2241/00143828", "pubdate": {"attribute_name": "公開日", "attribute_value": "2016-09-08"}, "publish_date": "2016-09-08", "publish_status": "0", "recid": "39159", "relation": {}, "relation_version_is_last": true, "title": ["Character-based symmetric searchable encryption and its implementation and experiment on mobile devices"], "weko_shared_id": 5}
Character-based symmetric searchable encryption and its implementation and experiment on mobile devices
http://hdl.handle.net/2241/00143828
http://hdl.handle.net/2241/0014382872c5e33d-bc42-4353-987d-ba33d61e3090
名前 / ファイル | ライセンス | アクション |
---|---|---|
SCN_9-12 (133.0 kB)
|
|
Item type | Journal Article(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2016-09-08 | |||||
タイトル | ||||||
タイトル | Character-based symmetric searchable encryption and its implementation and experiment on mobile devices | |||||
言語 | ||||||
言語 | eng | |||||
資源タイプ | ||||||
資源 | http://purl.org/coar/resource_type/c_6501 | |||||
タイプ | journal article | |||||
著者 |
Suga, Takanori
× Suga, Takanori× Nishide, Takashi× Sakurai, Kouichi |
|||||
著者別名 |
西出, 隆志
× 西出, 隆志 |
|||||
抄録 | ||||||
内容記述タイプ | Abstract | |||||
内容記述 | Searchable encryption allows us to perform a keyword search over encrypted data. However, we cannot efficiently perform some complex search (e.g., a wildcard search) with traditional searchable encryption schemes because they can deal with only equality matches. Our symmetric searchable encryption can deal with partial matches. This allows us to efficiently perform a wildcard search, partial match search, and so on. We also examine the feasibility of our scheme by experiments on a smartphone and tablet, and confirm our scheme can be used in these environments. Availability on portable devices will offer high convenience. Copyright © 2013 John Wiley & Sons, Ltd. | |||||
書誌情報 |
Security and communication networks 巻 9, 号 12, p. 1717-1725, 発行日 2016-08 |
|||||
ISSN | ||||||
収録物識別子タイプ | ISSN | |||||
収録物識別子 | 1939-0114 | |||||
DOI | ||||||
識別子タイプ | DOI | |||||
関連識別子 | 10.1002/sec.876 | |||||
権利 | ||||||
権利情報 | © 2013 John Wiley & Sons, Ltd | |||||
権利 | ||||||
権利情報 | This is the peer reviewed version of the following article: Security and communication networks, 9:1717-1725, which has been published in final form at 10.1002/sec.876. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving. | |||||
著者版フラグ | ||||||
値 | author | |||||
出版者 | ||||||
出版者 | Wiley |