{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BA40274479.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BA40274479#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BA40274479.json"},"dc:title":[{"@value":"The limits of trust : cryptography, governments, and electronic commerce"}],"dc:creator":"by Stewart A. Baker and Paul R. Hurst","dc:publisher":[{"@value":"Kluwer Law International"}],"dcterms:extent":"xviii, 621 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"1998","cinii:ncid":"BA40274479","cinii:ownerCount":"11","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA07203888#entity","@type":"foaf:Person","foaf:name":[{"@value":"Baker, Stewart Abercrombie"}]},{"@id":"https://ci.nii.ac.jp/author/DA11915452#entity","@type":"foaf:Person","foaf:name":[{"@value":"Hurst, Paul R."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001379","@type":"foaf:Organization","foaf:name":"東北大学 附属図書館","rdfs:seeAlso":{"@id":"http://opac.library.tohoku.ac.jp/opac/opac_openurl/?ncid=BA40274479"}},{"@id":"https://ci.nii.ac.jp/library/FA011747","@type":"foaf:Organization","foaf:name":"東京大学 法学部","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BA40274479"}},{"@id":"https://ci.nii.ac.jp/library/FA001798","@type":"foaf:Organization","foaf:name":"東京大学 駒場図書館","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BA40274479"}},{"@id":"https://ci.nii.ac.jp/library/FA002848","@type":"foaf:Organization","foaf:name":"大阪大学 附属図書館 総合図書館","rdfs:seeAlso":{"@id":"https://opac.library.osaka-u.ac.jp/opac/opac_openurl/?ncid=BA40274479"}},{"@id":"https://ci.nii.ac.jp/library/FA002994","@type":"foaf:Organization","foaf:name":"神戸大学 附属図書館 社会科学系図書館","rdfs:seeAlso":{"@id":"https://op.lib.kobe-u.ac.jp/opac/opac_openurl/?rfe_dat=ncid/BA40274479"}},{"@id":"https://ci.nii.ac.jp/library/FA004231","@type":"foaf:Organization","foaf:name":"札幌大学 図書館","rdfs:seeAlso":{"@id":"http://lsvopac.sapporo-u.ac.jp/mylimedio/search/search.do?target=local&mode=comp&ncid=BA40274479"}},{"@id":"https://ci.nii.ac.jp/library/FA016263","@type":"foaf:Organization","foaf:name":"淑徳大学 みずほ台図書館","rdfs:seeAlso":{"@id":"https://m-libopac.shukutoku.ac.jp/webopac/ctlsrh.do?tab_num=0&ncid=BA40274479"}},{"@id":"https://ci.nii.ac.jp/library/FA005019","@type":"foaf:Organization","foaf:name":"学習院大学 図書館","rdfs:seeAlso":{"@id":"https://glim-op.glim.gakushuin.ac.jp/webopac/cattab.do?sp_srh_flg=true&ncid=BA40274479"}},{"@id":"https://ci.nii.ac.jp/library/FA006714","@type":"foaf:Organization","foaf:name":"明治学院大学 図書館","rdfs:seeAlso":{"@id":"https://mgopac.meijigakuin.ac.jp/opac/opac_openurl/?ncid=BA40274479"}},{"@id":"https://ci.nii.ac.jp/library/FA007466","@type":"foaf:Organization","foaf:name":"名城大学 附属図書館","rdfs:seeAlso":{"@id":"https://mylib.meijo-u.ac.jp/iwjs0028opc/ufirdi.do?ufi_target=ctlsrh&ncid=BA40274479"}},{"@id":"https://ci.nii.ac.jp/library/FA007965","@type":"foaf:Organization","foaf:name":"関西大学 図書館","rdfs:seeAlso":{"@id":"https://www.lib.kansai-u.ac.jp/webopac/ufirdi.do?ufi_target=ctlsrh&ncid=BA40274479"}}],"bibo:lccn":["98026470"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/98026470"}],"prism:publicationDate":["1998"],"cinii:note":["Includes bibliographical references"],"dc:subject":["LCC:K564.C6","DC21:005.8/2"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Data+encryption+%28Computer+science%29+--+Law+and+legislation","dc:title":"Data encryption (Computer science) -- Law and legislation"}],"dcterms:hasPart":[{"@id":"urn:isbn:9041106359"}]}]}