<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-04-19T07:55:54Z</responseDate>
  <request verb="GetRecord" metadataPrefix="jpcoar_1.0" identifier="oai:ipsj.ixsq.nii.ac.jp:00146951">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00146951</identifier>
        <datestamp>2025-01-20T17:47:34Z</datestamp>
        <setSpec>6164:6165:6462:8443</setSpec>
      </header>
      <metadata>
        <jpcoar:jpcoar xmlns:datacite="https://schema.datacite.org/meta/kernel-4/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:dcndl="http://ndl.go.jp/dcndl/terms/" xmlns:dcterms="http://purl.org/dc/terms/" xmlns:jpcoar="https://github.com/JPCOAR/schema/blob/master/1.0/" xmlns:oaire="http://namespace.openaire.eu/schema/oaire/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:rioxxterms="http://www.rioxx.net/schema/v2.0/rioxxterms/" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns="https://github.com/JPCOAR/schema/blob/master/1.0/" xsi:schemaLocation="https://github.com/JPCOAR/schema/blob/master/1.0/jpcoar_scm.xsd">
          <dc:title>匿名通信システムの攻撃手法に関する調査</dc:title>
          <dc:title xml:lang="en">A Survey about Attack Methods of Anonymous-Communication Systems</dc:title>
          <jpcoar:creator>
            <jpcoar:creatorName>青木, 太一</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>青木, 卓矢</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>佐藤, 直</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>島田, 要</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>山口, 信幸</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName>髙橋, 正樹</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Taichi, Aoki</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Takuya, Aoki</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Naoshi, Sato</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Kaname, Shimada</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Nobuyuki, Yamaguchi</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:creator>
            <jpcoar:creatorName xml:lang="en">Masaki, Takahashi</jpcoar:creatorName>
          </jpcoar:creator>
          <jpcoar:subject subjectScheme="Other">匿名通信，攻撃手法，Tor，de-anonymize</jpcoar:subject>
          <datacite:description descriptionType="Other">Tor に代表される匿名通信システムはプライバシーの保護を実現する有益な技術である．一方で，サイバー犯罪やマルウェア通信などにも悪用され，攻撃者にとって有利な状況も作り出している．Tor の匿名性を解除する de-anonymize 手法は，これまでにも数多くの研究がなされているが，無条件かつ安定的に成功している手法は存在しない．そこで本稿では，Tor を中心に匿名通信システムに対する既存研究をサーベイし，Tor に対する攻撃アプローチとしてまとめた上で，Tor の de-anonymize に対する課題について考察した．</datacite:description>
          <datacite:description descriptionType="Other">An anonymous communications system represented by Tor is the useful technology which achieves private protection. On the other hand, it's profitable for an attacker, when it's abused by a cybercrime and malware communication. De-anonymous technique to Tor exists much. But a method that is unconditional and stable, doesn't exist. So in this paper, we surveyed an existence study of Tor, and, it was put in order as de-anonymous approach to Tor in an anonymous communications system. And, it was considered about problem to de-anonymous approach of Tor.</datacite:description>
          <dc:publisher xml:lang="ja">情報処理学会</dc:publisher>
          <datacite:date dateType="Issued">2015-10-14</datacite:date>
          <dc:language>jpn</dc:language>
          <dc:type rdf:resource="http://purl.org/coar/resource_type/c_5794">conference paper</dc:type>
          <jpcoar:identifier identifierType="URI">https://ipsj.ixsq.nii.ac.jp/records/146951</jpcoar:identifier>
          <jpcoar:sourceTitle>コンピュータセキュリティシンポジウム2015論文集</jpcoar:sourceTitle>
          <jpcoar:volume>2015</jpcoar:volume>
          <jpcoar:issue>3</jpcoar:issue>
          <jpcoar:pageStart>1207</jpcoar:pageStart>
          <jpcoar:pageEnd>1212</jpcoar:pageEnd>
          <jpcoar:file>
            <jpcoar:URI label="IPSJ-CSS2015159.pdf">https://ipsj.ixsq.nii.ac.jp/record/146951/files/IPSJ-CSS2015159.pdf</jpcoar:URI>
            <jpcoar:mimeType>application/pdf</jpcoar:mimeType>
            <jpcoar:extent>598.3 kB</jpcoar:extent>
            <datacite:date dateType="Available">2017-10-14</datacite:date>
          </jpcoar:file>
        </jpcoar:jpcoar>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
