{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1410001204377967235.json","@type":"Researcher","personIdentifier":[{"@type":"NRID","@value":"9000017682237"}],"foaf:Person":[{"foaf:name":[{"@value":"Choi, Dooho"}]}],"career":[{"institution":{"notation":[{"@language":"en","@value":"Electronics and Telecommunications Research Institute (ETRI)"}]}}],"product":[{"@id":"https://cir.nii.ac.jp/crid/1390001204377967232","@type":"Article","resourceType":"学術雑誌論文(journal article)","productIdentifier":[{"@type":"DOI","@value":"10.1587/transinf.e92.d.909"},{"@type":"HDL","@value":"http://hdl.handle.net/10445/4850"},{"@type":"URI","@value":"https://fun.repo.nii.ac.jp/records/1113"},{"@type":"URI","@value":"http://www.jstage.jst.go.jp/article/transinf/E92.D/5/E92.D_5_909/_pdf"},{"@type":"NAID","@value":"10026809094"}],"notation":[{"@language":"en","@value":"Efficient Implementation of Pairing-Based Cryptography on a Sensor Node"}],"relation":[{"type":"creator"}]}],"dataSourceIdentifier":[{"@type":"JALC","@value":"oai:japanlinkcenter.org:0033013401_53xnSfZuaRSIrailnhZ4T6aHtPS"},{"@type":"IRDB","@value":"oai:irdb.nii.ac.jp:01406:0005253903_THCkHyRBbx3gGxWDtv2gDTAOZQt"},{"@type":"CIA","@value":"10026809094_53xnSfZuaRSIrailnhZ4T6aHtPS"},{"@type":"CROSSREF","@value":"10.1587/transinf.e92.d.909_UifSjbIYUhuPCFWgJiOpFB9NxEP"},{"@type":"OPENAIRE","@value":"doi_dedup___::b07f8acd96f3b1e88f54162b18904ba7_OE9HnoU07JcK6mBWMBzySsWoVAX"}]}