{"links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00227634","sets":["1164:2735:11166:11323"]},"path":["11323"],"owner":"44499","recid":"227634","title":["Application of linking number theory to authentication technology"],"pubdate":{"attribute_name":"公開日","attribute_value":"2023-08-31"},"_buckets":{"deposit":"d8f44aba-628d-406d-9294-d61b3b328d5a"},"_deposit":{"id":"227634","pid":{"type":"depid","value":"227634","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"Application of linking number theory to authentication technology","author_link":["606593","606592"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Application of linking number theory to authentication technology"},{"subitem_title":"Application of linking number theory to authentication technology","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2023-08-31","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"National Institute of Technology, Ibaraki College"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"National Institute of Technology, Ibaraki College","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/227634/files/IPSJ-MPS23145005.pdf","label":"IPSJ-MPS23145005.pdf"},"date":[{"dateType":"Available","dateValue":"2025-08-31"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-MPS23145005.pdf","filesize":[{"value":"1.6 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"17"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"9b03b78f-446a-46b2-805d-15b7ad168e03","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2023 by the Information Processing Society of Japan"}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kamolphat, Intawong"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kamolphat, Intawong","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10505667","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8833","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"In the information society, it is essential to continue developing information security technology. Recently, various approaches, such as puzzles, have been taken. In the past years, we have been studying the linking number theory of topology and introducing new functions implying invariants to distinguish some knots and links. One of the functions we created has the ability to accomplish the purpose with surprisingly less calculation time. The purpose of this study is to apply this function-the multiple linking number T to create a quiz for authentication. In this paper, we introduce three types of authentication methods.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In the information society, it is essential to continue developing information security technology. Recently, various approaches, such as puzzles, have been taken. In the past years, we have been studying the linking number theory of topology and introducing new functions implying invariants to distinguish some knots and links. One of the functions we created has the ability to accomplish the purpose with surprisingly less calculation time. The purpose of this study is to apply this function-the multiple linking number T to create a quiz for authentication. In this paper, we introduce three types of authentication methods.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"4","bibliographic_titles":[{"bibliographic_title":"研究報告数理モデル化と問題解決(MPS)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2023-08-31","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"5","bibliographicVolumeNumber":"2023-MPS-145"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"created":"2025-01-19T01:26:53.446131+00:00","updated":"2025-06-30T02:30:07.507968+00:00","id":227634}