{"created":"2023-08-02T03:57:53.862778+00:00","id":7019,"links":{},"metadata":{"_buckets":{"deposit":"093b9521-5e88-4860-9a3e-7c34c22ad55a"},"_deposit":{"created_by":10,"id":"7019","owners":[10],"pid":{"revision_id":0,"type":"depid","value":"7019"},"status":"published"},"_oai":{"id":"oai:repository.lib.tottori-u.ac.jp:00007019","sets":["1:10","2:15"]},"author_link":["2512"],"item_10003_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2016","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"25","bibliographicPageStart":"20","bibliographic_titles":[{"bibliographic_title":"Proceedings of the 8th International Conference on Signal Processing Systems (ICSPS2016)"},{"bibliographic_title":"Proceedings of the 8th International Conference on Signal Processing Systems (ICSPS2016)","bibliographic_titleLang":"en"}]}]},"item_10003_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"In user management system, continuous or successive (ondemand) authentication is required to prevent identity theft. In particular, biometrics of which data are unconsciously presented to authentication systems is necessary. In this paper, brain waves and intra-palm propagation signals are introduced as biometrics and their verification performances using actually measured data are presented.","subitem_description_type":"Other"}]},"item_10003_publisher_8":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Association for Computing Machinery (ACM)"}]},"item_10003_relation_10":{"attribute_name":"ISBN","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"9781450347907","subitem_relation_type_select":"ISBN"}}]},"item_10003_relation_14":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1145/3015166.3015180","subitem_relation_type_select":"DOI"}}]},"item_10003_relation_16":{"attribute_name":"情報源","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"Proceedings of the 8th International Conference on Signal Processing Systems (ICSPS2016). 2016, 20-25"}]}]},"item_10003_relation_17":{"attribute_name":"関連サイト","attribute_value_mlt":[{"subitem_relation_name":[{"subitem_relation_name_text":"https://dl.acm.org/citation.cfm?id=3015180"}],"subitem_relation_type_id":{"subitem_relation_type_id_text":"https://dl.acm.org/citation.cfm?id=3015180","subitem_relation_type_select":"URI"}}]},"item_10003_rights_15":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© ACM 2016. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in https://dl.acm.org/citation.cfm?id=3015180, http://dx.doi.org/10.1145/3015166.3015180"}]},"item_10003_text_32":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Graduate School of Engineering, Tottori University "}]},"item_10003_version_type_20":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Nakanishi, Isao"},{"creatorName":"Nakanishi, Isao","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"2512","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"80243377","nameIdentifierScheme":"e-Rad","nameIdentifierURI":"https://kaken.nii.ac.jp/ja/search/?qm=80243377"},{"nameIdentifier":"100000543","nameIdentifierScheme":"研究者総覧鳥取大学","nameIdentifierURI":"http://researchers.adm.tottori-u.ac.jp/html/100000543_ja.html"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2018-05-11"}],"displaytype":"detail","filename":"ICSPS2016_20.pdf","filesize":[{"value":"438.5 kB"}],"format":"application/pdf","licensefree":"© ACM 2016. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in https://dl.acm.org/citation.cfm?id=3015180, http://dx.doi.org/10.1145/3015166.3015180","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"ICSPS2016_20.pdf","url":"https://repository.lib.tottori-u.ac.jp/record/7019/files/ICSPS2016_20.pdf"},"version_id":"08457513-120c-4cb4-99e0-00492186cdda"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Unconscious Biometrics","subitem_subject_scheme":"Other"},{"subitem_subject":"Continuous Authentication","subitem_subject_scheme":"Other"},{"subitem_subject":"Successive Authentication","subitem_subject_scheme":"Other"},{"subitem_subject":"Brain Wave","subitem_subject_scheme":"Other"},{"subitem_subject":"Intra-palm Propagation Signal","subitem_subject_scheme":"Other"},{"subitem_subject":"Unconscious Biometrics","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Continuous Authentication","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Successive Authentication","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Brain Wave","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Intra-palm Propagation Signal","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"conference paper","resourceuri":"http://purl.org/coar/resource_type/c_5794"}]},"item_title":"Unconscious Biometrics for Continuous User Verification","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Unconscious Biometrics for Continuous User Verification","subitem_title_language":"en"}]},"item_type_id":"10003","owner":"10","path":["10","15"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2018-06-22"},"publish_date":"2018-06-22","publish_status":"0","recid":"7019","relation_version_is_last":true,"title":["Unconscious Biometrics for Continuous User Verification"],"weko_creator_id":"10","weko_shared_id":-1},"updated":"2023-09-28T07:58:49.701103+00:00"}