{"created":"2021-03-01T07:18:45.900635+00:00","id":39473,"links":{},"metadata":{"_buckets":{"deposit":"1e4265aa-7339-4409-9ad9-3f1a3fda7912"},"_deposit":{"id":"39473","owners":[],"pid":{"revision_id":0,"type":"depid","value":"39473"},"status":"published"},"_oai":{"id":"oai:tsukuba.repo.nii.ac.jp:00039473","sets":["152:2863","3:62:5591:1060"]},"author_link":["145722","145723","145724","145725","145726","204632","145728","145729"],"item_1644910766877":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_5_biblio_info_6":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2016-06","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicPageEnd":"1131","bibliographicPageStart":"1122","bibliographicVolumeNumber":"E99.A","bibliographic_titles":[{"bibliographic_title":"IEICE Transactions on Information and Systems","bibliographic_titleLang":"en"}]}]},"item_5_publisher_27":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"電子情報通信学会","subitem_publisher_language":"ja"}]},"item_5_relation_11":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isIdenticalTo","subitem_relation_type_id":{"subitem_relation_type_id_text":"https://doi.org/10.1587/transfun.E99.A.1122","subitem_relation_type_select":"DOI"}}]},"item_5_rights_12":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"(c) 2016 The Institute of Electronics, Information and Communication Engineers ","subitem_rights_language":"en"}]},"item_5_source_id_7":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0916-8508","subitem_source_identifier_type":"PISSN"}]},"item_5_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA10826239","subitem_source_identifier_type":"NCID"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"SHINAGAWA, Kazumasa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"MIZUKI, Takaaki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"SCHULDT, Jacob C. N.","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"NUIDA, Koji","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"KANAYAMA, Naoki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"西出, 隆志","creatorNameLang":"ja"},{"creatorName":"ニシデ, タカシ","creatorNameLang":"ja-Kana"},{"creatorName":"NISHIDE, Takashi","creatorNameLang":"en"}],"nameIdentifiers":[{},{},{}]},{"creatorNames":[{"creatorName":"HANAOKA, Goichiro","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"OKAMOTO, Eiji","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2016-10-20"}],"displaytype":"detail","filename":"IEICETC_E99A-6-1122.pdf","filesize":[{"value":"1.8 MB"}],"format":"application/pdf","mimetype":"application/pdf","url":{"objectType":"fulltext","url":"https://tsukuba.repo.nii.ac.jp/record/39473/files/IEICETC_E99A-6-1122.pdf"},"version_id":"4d035351-0bcb-407a-bb9c-c17330998dd1"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Secure Computation Protocols Using Polarizing Cards","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Secure Computation Protocols Using Polarizing Cards","subitem_title_language":"en"}]},"item_type_id":"5","owner":"1","path":["1060","2863"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2016-10-20"},"publish_date":"2016-10-20","publish_status":"0","recid":"39473","relation_version_is_last":true,"title":["Secure Computation Protocols Using Polarizing Cards"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2023-05-11T06:40:08.217526+00:00"}