{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB01497641.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB01497641#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB01497641.json"},"dc:title":[{"@value":"Information theoretic security"}],"dc:creator":"Yingbin Liang, H. Vincent Poor, Shlomo Shamai (Shitz)","dc:publisher":[{"@value":"now Publishers"}],"dcterms:extent":"ix, 233 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2009","cinii:ncid":"BB01497641","cinii:ownerCount":"7","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Liang, Yingbin"}]},{"@type":"foaf:Person","foaf:name":[{"@value":"Poor, H. Vincent"}]},{"@id":"https://ci.nii.ac.jp/author/DA15588915#entity","@type":"foaf:Person","foaf:name":[{"@value":"Shamai, Shlomo"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA001415","@type":"foaf:Organization","foaf:name":"東北大学 附属図書館 工学分館","rdfs:seeAlso":{"@id":"https://opac.library.tohoku.ac.jp/opac/opac_openurl/?ncid=BB01497641"}},{"@id":"https://ci.nii.ac.jp/library/FA022153","@type":"foaf:Organization","foaf:name":"東京大学 柏図書館","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BB01497641"}},{"@id":"https://ci.nii.ac.jp/library/FA002316","@type":"foaf:Organization","foaf:name":"信州大学 附属図書館 工学部図書館","rdfs:seeAlso":{"@id":"https://www-lib.shinshu-u.ac.jp/opc/recordID/catalog.bib/BB01497641"}},{"@id":"https://ci.nii.ac.jp/library/FA002553","@type":"foaf:Organization","foaf:name":"豊橋技術科学大学 附属図書館","rdfs:seeAlso":{"@id":"https://opac.lib.tut.ac.jp/mylimedio/search/search.do?target=local&mode=comp&category-mgz=1&category-book=1&annex=all&ncid=BB01497641"}},{"@id":"https://ci.nii.ac.jp/library/FA007670","@type":"foaf:Organization","foaf:name":"同志社大学 図書館","rdfs:seeAlso":{"@id":"https://doors.doshisha.ac.jp/opac/opac_openurl/?ncid=BB01497641"}},{"@id":"https://ci.nii.ac.jp/library/FA014009","@type":"foaf:Organization","foaf:name":"北陸先端科学技術大学院大学 附属図書館"},{"@id":"https://ci.nii.ac.jp/library/FA014927","@type":"foaf:Organization","foaf:name":"広島市立大学 附属図書館","rdfs:seeAlso":{"@id":"https://opac.lib.hiroshima-cu.ac.jp/opac/search?target=local&searchmode=complex&autoDetail=true&s_ncid=BB01497641"}}],"prism:publicationDate":["c2009"],"cinii:note":["Includes bibliographical references (p. 221-233)"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+networks+--+Security+measures","dc:title":"Computer networks -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Wireless+communication+systems+--+Security+measures","dc:title":"Wireless communication systems -- Security measures"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security","dc:title":"Computer security"},{"@id":"https://ci.nii.ac.jp/books/search?q=Data+protection","dc:title":"Data protection"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BA69979283#entity","dc:title":"Foundations and trends [TM] in communications and information theory, 5:4-5","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9781601982407"}]}]}