ログイン
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

{"_buckets": {"deposit": "17441a4b-063a-4024-9a6f-a0136f3ad6c3"}, "_deposit": {"created_by": 10, "id": "7064", "owners": [10], "pid": {"revision_id": 0, "type": "depid", "value": "7064"}, "status": "published"}, "_oai": {"id": "oai:repository.lib.tottori-u.ac.jp:00007064", "sets": ["10", "17"]}, "author_link": ["2512"], "item_10008_checkbox_24": {"attribute_name": "部局名", "attribute_value_mlt": [{"subitem_checkbox_item": ["kou-gakubu"]}]}, "item_10008_date_8": {"attribute_name": "出版年月日", "attribute_value_mlt": [{"subitem_date_issued_datetime": "2022", "subitem_date_issued_type": "Issued"}]}, "item_10008_description_5": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "To realize a secure system-user management, continuous authentication must be implemented in the system. In addition, only limited biometrics that can be measured passively are applicable for continuous authentication. However, continuous authentication is a heavy processing load for the system. In this study, possible methods for conducting a continuous authentication are examined from the viewpoint of reducing the processing load, and two types of on-demand authentication approaches are confirmed to be effective.", "subitem_description_type": "Other"}]}, "item_10008_publisher_7": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "Springer"}]}, "item_10008_relation_10": {"attribute_name": "ISBN", "attribute_value_mlt": [{"subitem_relation_type": "isIdenticalTo", "subitem_relation_type_id": {"subitem_relation_type_id_text": "9783642142918", "subitem_relation_type_select": "ISBN"}}]}, "item_10008_relation_13": {"attribute_name": "情報源", "attribute_value_mlt": [{"subitem_relation_name": [{"subitem_relation_name_text": "Nakanishi, I. (2022). On-Demand Biometric Authentication for System-User Management. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2022. Lecture Notes in Computer Science, vol 13333. Springer, Cham. https://doi.org/10.1007/978-3-031"}]}]}, "item_10008_relation_9": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_relation_type": "isPartOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "18650929", "subitem_relation_type_select": "ISSN"}}]}, "item_10008_rights_12": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG"}]}, "item_10008_text_22": {"attribute_name": "EARMAS ID", "attribute_value_mlt": [{"subitem_text_value": "14546"}]}, "item_10008_text_23": {"attribute_name": "EISSN", "attribute_value_mlt": [{"subitem_text_value": "18650937"}]}, "item_10008_text_30": {"attribute_name": "著者所属(英)", "attribute_value_mlt": [{"subitem_text_language": "en", "subitem_text_value": "Tottori University"}]}, "item_10008_version_type_17": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "中西, 功"}, {"creatorName": "ナカニシ, イサオ", "creatorNameLang": "ja-Kana"}, {"creatorName": "Nakanishi, Isao", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "2512", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "80243377", "nameIdentifierScheme": "e-Rad", "nameIdentifierURI": "https://kaken.nii.ac.jp/ja/search/?qm=80243377"}, {"nameIdentifier": "100000543", "nameIdentifierScheme": "研究者総覧鳥取大学", "nameIdentifierURI": "http://researchers.adm.tottori-u.ac.jp/html/100000543_ja.html"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2023-06-30"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "HCII2022_241.pdf", "filesize": [{"value": "1.6 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensefree": "© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG", "licensetype": "license_note", "mimetype": "application/pdf", "size": 1600000.0, "url": {"label": "HCII2022_241.pdf", "url": "https://repository.lib.tottori-u.ac.jp/record/7064/files/HCII2022_241.pdf"}, "version_id": "8e70db7c-d319-442c-b716-69f923c4d63f"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "System-user management", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Continuous authentication", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Biometrics", "subitem_subject_scheme": "Other"}, {"subitem_subject": "On-demand authentication", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Processing load", "subitem_subject_scheme": "Other"}, {"subitem_subject": "System-user management", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Continuous authentication", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Biometrics", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "On-demand authentication", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Processing load", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "book", "resourceuri": "http://purl.org/coar/resource_type/c_2f33"}]}, "item_title": "On-Demand Biometric Authentication for?System-User Management", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "On-Demand Biometric Authentication for?System-User Management", "subitem_title_language": "en"}]}, "item_type_id": "10008", "owner": "10", "path": ["10", "17"], "permalink_uri": "https://repository.lib.tottori-u.ac.jp/records/7064", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2022-12-07"}, "publish_date": "2022-12-07", "publish_status": "0", "recid": "7064", "relation": {}, "relation_version_is_last": true, "title": ["On-Demand Biometric Authentication for?System-User Management"], "weko_shared_id": -1}
  1. 学部学科区分一覧
  2. 工学部・工学研究科
  1. 資料タイプ一覧
  2. 図書

On-Demand Biometric Authentication for?System-User Management

https://repository.lib.tottori-u.ac.jp/records/7064
https://repository.lib.tottori-u.ac.jp/records/7064
f79277c3-94e7-4b60-8b48-29d768e8c7ff
名前 / ファイル ライセンス アクション
HCII2022_241.pdf HCII2022_241.pdf (1.6 MB)
Item type 図書 / Book(1)
公開日 2022-12-07
タイトル
言語 en
タイトル On-Demand Biometric Authentication for?System-User Management
言語
言語 eng
キーワード
主題 System-user management
キーワード
主題 Continuous authentication
キーワード
主題 Biometrics
キーワード
主題 On-demand authentication
キーワード
主題 Processing load
キーワード
言語 en
主題 System-user management
キーワード
言語 en
主題 Continuous authentication
キーワード
言語 en
主題 Biometrics
キーワード
言語 en
主題 On-demand authentication
キーワード
言語 en
主題 Processing load
資源タイプ
資源タイプ book
著者 中西, 功

× 中西, 功

WEKO 2512
e-Rad 80243377
研究者総覧鳥取大学 100000543

中西, 功

ja-Kana ナカニシ, イサオ

en Nakanishi, Isao

Search repository
著者所属(英)
en
Tottori University
抄録
内容記述タイプ Other
内容記述 To realize a secure system-user management, continuous authentication must be implemented in the system. In addition, only limited biometrics that can be measured passively are applicable for continuous authentication. However, continuous authentication is a heavy processing load for the system. In this study, possible methods for conducting a continuous authentication are examined from the viewpoint of reducing the processing load, and two types of on-demand authentication approaches are confirmed to be effective.
出版者
出版者 Springer
出版年月日
日付 2022
日付タイプ Issued
ISSN
関連タイプ isPartOf
識別子タイプ ISSN
関連識別子 18650929
ISBN
関連タイプ isIdenticalTo
識別子タイプ ISBN
関連識別子 9783642142918
権利
権利情報 © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
情報源
関連名称 Nakanishi, I. (2022). On-Demand Biometric Authentication for System-User Management. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2022. Lecture Notes in Computer Science, vol 13333. Springer, Cham. https://doi.org/10.1007/978-3-031
著者版フラグ
出版タイプ AM
EISSN
18650937
戻る
0
views
See details
Views

Versions

Ver.1 2023-08-02 06:27:38.459578
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3