{"created":"2023-05-15T12:35:07.765055+00:00","id":55,"links":{},"metadata":{"_buckets":{"deposit":"2fa085f4-2666-4acc-a338-aa5c4db68c01"},"_deposit":{"created_by":2,"id":"55","owners":[2],"pid":{"revision_id":0,"type":"depid","value":"55"},"status":"published"},"_oai":{"id":"oai:kutarr.kochi-tech.ac.jp:00000055","sets":["5"]},"author_link":["203","204","202","201"],"item_2_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2008-01-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicPageEnd":"374","bibliographicPageStart":"362","bibliographicVolumeNumber":"49","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌 = Transactions of Information Processing Society of Japan"}]}]},"item_2_description_4":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"In an ad hoc network, we cannot assume a trusted certificate authority and a centralized repository that are used in ordinary Public-Key Infrastructure (PKI). Hence a PKI system of the web-of-trust type in which each node can issue certificates to others in a self-organizing manner has been studied. Although this system is useful for ad hoc networks, it has the problem that for authentication a node needs to find a certificate-chain to the destination node.\nIn this paper, we formally model a web-of-trust-type PKI system, define the certificate-chain discovery problem, and propose a new distributed algorithm and its modification that solve the problem. Furthermore, we propose a measure of communication cost, and according to the measure, we compare our algorithm with an existing method by numerical computation for large-size networks and by simulation on randomly generated unit disk graphs for moderate-size networks. The simulation results show that the communication cost of the proposed method is less than 10% of the existing method.","subitem_description_type":"Abstract"}]},"item_2_publisher_35":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会"}]},"item_2_rights_14":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"ここに掲載した著作物の利用に関する注意 本著作物の著作権は(社)情報処理学会に帰属します。本著作物は著作権者である情報処理学会の許可のもとに掲載するものです。ご利用に当たっては「著作権法」ならびに「情報処理学会倫理綱領」に従うことをお願いいたします。 Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan. Mail to address editjipsj.or.jp, please."}]},"item_2_source_id_11":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647@@@AA1150948X","subitem_source_identifier_type":"NCID"}]},"item_2_source_id_9":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0387-5806","subitem_source_identifier_type":"ISSN"}]},"item_2_version_type_18":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"MOHRI, HISASHI"}],"nameIdentifiers":[{"nameIdentifier":"201","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"YASUDA, IKUYA"}],"nameIdentifiers":[{"nameIdentifier":"202","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"TAKATA, YOSHIAKI"}],"nameIdentifiers":[{"nameIdentifier":"203","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"SEKI, HIROYUKI"}],"nameIdentifiers":[{"nameIdentifier":"204","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-02-13"}],"displaytype":"detail","filename":"ipsj_49_1_362.pdf","filesize":[{"value":"212.6 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"ipsj_49_1_362.pdf","url":"https://kutarr.kochi-tech.ac.jp/record/55/files/ipsj_49_1_362.pdf"},"version_id":"b881b3f6-8ed4-4240-84b1-f05eec0b67b6"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"New Certificate Chain Discovery Methods for Trust Establishment in Ad Hoc Networks and Their Evaluation","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"New Certificate Chain Discovery Methods for Trust Establishment in Ad Hoc Networks and Their Evaluation"}]},"item_type_id":"2","owner":"2","path":["5"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-07-30"},"publish_date":"2010-07-30","publish_status":"0","recid":"55","relation_version_is_last":true,"title":["New Certificate Chain Discovery Methods for Trust Establishment in Ad Hoc Networks and Their Evaluation"],"weko_creator_id":"2","weko_shared_id":-1},"updated":"2023-05-15T13:46:05.073774+00:00"}