• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2011 Fiscal Year Annual Research Report

センサネットワークの安全・安心を保証する情報セキュリティ技術の研究

Research Project

Project/Area Number 21240001
Research InstitutionJapan Advanced Institute of Science and Technology

Principal Investigator

宮地 充子  北陸先端科学技術大学院大学, 情報科学研究科, 教授 (10313701)

Co-Investigator(Kenkyū-buntansha) 廣瀬 勝一  福井大学, 工学(系)研究科(研究院), 教授 (20228836)
双紙 正和  広島市立大学, 情報科学研究科, 准教授 (00293142)
岡崎 裕之  信州大学, 理工学研究科, 助教 (50432167)
Keywords暗号・認証等 / センサネットワーク
Research Abstract

1.非均質型端末間のグループ鍵共有プロトコル:端末の能力に応じた任意の(n1, n2)型ネットワーク(低能力端末数n1, 高能力端末数n2)のグループ鍵共有を行うペアリングベースの方式を構築し,受動攻撃モデルで安全性を証明.次に任意のT(<n)端末が故障した際にO(Logn+T) の性能で鍵共有が可能なT耐故障-鍵共有方式を提案し,受動攻撃モデルで安全性を証明.耐故障数Tに対しシステマティックに端末配置を行う方法も構築.両方式はKY変換により,能動攻撃に安全な方式に変換することが可能である.
2.鍵共有におけるハッシュ関数の応用:前年度に開発した軽量ハッシュ関数を改良し,一層効率の良い鍵導出関数,擬似乱数生成器等が構成可能なハッシュ関数を開発.その衝突計算困難性,原像計算困難性,鍵付モードの擬似ランダム性を証明可能安全性の観点から明らかにした.省ハードウェア資源に有効なブロック暗号PRESENTを利用したハッシュ関数の衝突計算困難性を攻撃の観点から検討した.
3.グループ鍵共有方式におけるシミュレーション:センサネットワークのグループ鍵共有・鍵配送の提案方式を安全性や効率の観点から,シミュレーションによる評価を実施.特に今年度は,EschenaurとGligorのプロトコルに基づいた鍵配送多項式を利用するグループ鍵配送方式の次数を下げることで,通信効率の良い方式を提案し,シミュレーション評価を行った.安全性の評価では,グループ外ノードへの鍵漏洩確率の減少を達成した.
4.形式言語による安全性証明:本研究課題で提案する鍵共有プロトコルの形式検証に利用可能な楕円曲線に関する諸定理,有限離散標本空間上の条件付き確率,Z-加群,共通鍵暗号AES暗号の形式記述,数論アルゴリズムに関するMizarライブラリを作成した.

Current Status of Research Progress
Current Status of Research Progress

2: Research has progressed on the whole more than it was originally planned.

Reason

センサネットワークのセキュリティ強化の観点で,公開鍵暗号を用いる方式,用いない方式それぞれにおいて,既存方式の問題点を解決する方式を提案している.また,鍵共有に利用する基本関数であるハッシュ関数に関して注目し,軽量なハッシュ関数及び擬似乱数生成関数を新規に構築した.また,これらの安全性を形式的に行うライブラリの作成も行った.

Strategy for Future Research Activity

H23年度までに構築した,公開鍵暗号を用いる鍵共有方式,用いない鍵共有方式に,H23年度までに構築した基本関数である軽量なハッシュ関数及び擬似乱数生成関数を実際に導入し,それら統合性能のシミュレーションを行う.また,統合方式のこれらの安全性を形式言語で安全性を行うために必要なライブラリの作成を完成し,実際に安全性証明を行う.

  • Research Products

    (65 results)

All 2013 2012 2011 Other

All Journal Article (41 results) (of which Peer Reviewed: 33 results) Presentation (23 results) (of which Invited: 4 results) Book (1 results)

  • [Journal Article] Formalization of Definitions and Theorems Related to an Elliptic Curve Over a Finite Prime Field by Using Mizar2013

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama
    • Journal Title

      Journal of Automated Reasoning

      Volume: 50(2) Pages: 161-172

    • Peer Reviewed
  • [Journal Article] Free Z-module2013

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 20(4) Pages: 275-280

    • Peer Reviewed
  • [Journal Article] Posterior Probability on Finite Set2013

    • Author(s)
      Hiroyuki Okazaki
    • Journal Title

      Formalized Mathematics

      Volume: 20(4) Pages: 257-263

    • Peer Reviewed
  • [Journal Article] Extended Euclidean Algorithm and CRT Algorithm2013

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 20(2) Pages: 175-179

    • Peer Reviewed
  • [Journal Article] Dynamic Attribute-based Signcryption without RandomOracles2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: 2(3) Pages: 199-211

    • Peer Reviewed
  • [Journal Article] Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack2012

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E95-A(12) Pages: 2148-2159

    • Peer Reviewed
  • [Journal Article] A Novel Hybrid IP Traceback Scheme with Packet Counters2012

    • Author(s)
      Tomoyuki Karasawa, Masakazu Soshi and Atsuko Miyaji
    • Journal Title

      The 5th International Conference on Internet and Dsitributed Computing Systems, IDCS 2012,Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7646 Pages: 71-84

    • Peer Reviewed
  • [Journal Article] How to Enhance the Security on the Least Significant Bit2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      The 4th International Symposium on Cyberspace Safety and Security , CANS 2012, Springer-Verlag

      Volume: 7712 Pages: 263-279

    • Peer Reviewed
  • [Journal Article] Constant-Ciphertext-Size Dual Policy Attribute Based Encryption2012

    • Author(s)
      Atsuko Miyaji and Phuong V.X. TRAN
    • Journal Title

      The 11th International Conference on Cryptology and Network Security, CSS 2012, Springer-Verlag

      Volume: 7672 Pages: 400-413

    • Peer Reviewed
  • [Journal Article] An Optimized Signature Verification System for Vehicle Ad hoc NETwork2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 8th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM2012, IEEE

      Volume: - Pages: 1-8

    • Peer Reviewed
  • [Journal Article] A Secure and private RFID authentication protocol under SLPN problem2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 6th International Conference on Network and System Security , NSS 2012, Springer-Verlag

      Volume: 7645 Pages: 476-489

    • Peer Reviewed
  • [Journal Article] Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks2012

    • Author(s)
      Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 8th International Conference on Information Security Practice and Experience, ISPEC 2012, Lecture Notes in Computer Science

      Volume: 7232 Pages: 245-258

    • Peer Reviewed
  • [Journal Article] Consideration for multi-threshold multi-secret sharing schemes2012

    • Author(s)
      Atsushi Waseda and Masakazu Soshi
    • Journal Title

      International Symposium on Information Theory and Applications (ISITA 2012)

      Volume: 96-A Pages: 265-269

    • Peer Reviewed
  • [Journal Article] Dynamic Attribute-based Signcryption without Random Oracles2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: Vol. 2 Pages: 199-211

    • Peer Reviewed
  • [Journal Article] A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 14th International Conference on Information Security and Cryptology, ICISC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7259 Pages: 186-203

    • Peer Reviewed
  • [Journal Article] An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs2012

    • Author(s)
      Tatsuro Iida, Keita Emura, Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      The 8th International Workshop on Heterogeneous Wireless Networks (AINA 2012 Workshops), HWISE 2012, IEEE

      Volume: - Pages: 552-557

  • [Journal Article] Privacy-preserving Set Operations in the Presence of Rational Parties2012

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 5th International Symposium on Mining and Web (AINA 2012 Workshops), MAW 2012, IEEE

      Volume: - Pages: 869-874

  • [Journal Article] Jacobian 座標系族の加法公式の改良2012

    • Author(s)
      Ratemo Alice Harriet Mwango, Yang Cuinan, Atsuko Miyaji
    • Journal Title

      The 2012 Symposium on Cryptography and Information Security

      Volume: SCIS2012- 1B2-2E Pages: CD-R

  • [Journal Article] 初期差分を用いたRC4 PRGAの解析2012

    • Author(s)
      市丸 祐, 宮地 充子
    • Journal Title

      The 2012 Symposium on Cryptography and Information Security

      Volume: SCIS2012- 2C1-3 Pages: CD-R

  • [Journal Article] Improved Left-to-Right Scalar Multiplication Algorithms2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2012 (2012-3) Pages: 141-148

  • [Journal Article] Operations of Points on Elliptic Curve in Projective Coordinates2012

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Daichi Mizushima, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 20(1) Pages: 87-95

    • Peer Reviewed
  • [Journal Article] Formalization of the Data Encryption Standard2012

    • Author(s)
      Hiroyuki Okazaki, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 20(2) Pages: 125-146

    • Peer Reviewed
  • [Journal Article] Scalar Multiplication on Weierstrass Elliptic Curves from Co-Z Arithmetic2011

    • Author(s)
      Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, andAlexandre Venelli
    • Journal Title

      Journal of Cryptographic Engineering (2011),Springer-Verlag

      Volume: Vol. 1 Pages: 161-176

    • Peer Reviewed
  • [Journal Article] New Concrete Relation between Trace, Definition Field, and Embedding Degree2011

    • Author(s)
      Shoujirou Hirasawa and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals.

      Volume: E94-A Pages: 1368-1374

    • Peer Reviewed
  • [Journal Article] KIMAP: Key-Insulated Mutual Authentication Protocol for RFID2011

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Automated Identification Technology (IJAIT)

      Volume: Vol. 3(2) Pages: 61-74

    • Peer Reviewed
  • [Journal Article] A Timed-Release Proxy Re-Encryption Scheme2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      IEICE Trans., Fundamentals.

      Volume: E94-A Pages: 1682-1695

    • Peer Reviewed
  • [Journal Article] Efficient and Low-Cost RFID Authentication Schemes2011

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman, and Masakazu Soshi
    • Journal Title

      Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)

      Volume: Vol. 2 Pages: 4-25

    • Peer Reviewed
  • [Journal Article] Privacy-Preserving Data Mining: A Game-theoretic Approach2011

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSEC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6818 Pages: 186-200

    • Peer Reviewed
  • [Journal Article] Toward Dynamic Attribute-Based Signcryption (Poster)2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6812 Pages: 439-443

    • Peer Reviewed
  • [Journal Article] T-Robust Group Key Exchange Protocol with O(log n) complexity2011

    • Author(s)
      Tetsuya Hatano, Atsuko Miyaji, and Takashi Sato
    • Journal Title

      The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6812 Pages: 289-207

    • Peer Reviewed
  • [Journal Article] POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks2011

    • Author(s)
      Tatsuro Iida, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6976 Pages: 253-267

    • Peer Reviewed
  • [Journal Article] Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7001 Pages: 102-118

    • Peer Reviewed
  • [Journal Article] How to Find Short RC4 Colliding Key Pairs2011

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7001 Pages: 32-46

    • Peer Reviewed
  • [Journal Article] Non-interactive Opening for Ciphertexts Encrypted by Shared Keys2011

    • Author(s)
      Jiageng Chen, Keita Emura, and Atsuko Miyaji
    • Journal Title

      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7043 Pages: 57-68

    • Peer Reviewed
  • [Journal Article] Ideal Secret Sharing Schemes with Share Selectability2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, and Masakazu Soshi
    • Journal Title

      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7043 Pages: 143-157

    • Peer Reviewed
  • [Journal Article] Unconditionally Secure Oblivious Transfer Based on Channel Delays2011

    • Author(s)
      Kai-Yuen Cheong and Atsuko Miyaji
    • Journal Title

      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7043 Pages: 112-120

    • Peer Reviewed
  • [Journal Article] 汚染攻撃に耐性を持つXORネットワーク符号化の比較・評価2011

    • Author(s)
      伊澤 和也, 宮地 充子, 面 和成
    • Journal Title

      Computer Security Symposium

      Volume: CSS2011-2B4-4 Pages: 498-503

  • [Journal Article] An Optimized Right-to-Left Scalar Mutiplication Algorithm Resistant Against Safe-Error Attack, SPA and DPA2011

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2011 (2011-11) Pages: 109-114

  • [Journal Article] Efficient Privacy Preserving Set Operations2011

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2011 (2011-11) Pages: 115-122

  • [Journal Article] A Note on Practical Key Derivation Functions2011

    • Author(s)
      Shoichi Hirose
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: E94-A Pages: 1764-1767

    • DOI

      10.1587/transfun.E94.A.1764

    • Peer Reviewed
  • [Journal Article] Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing2011

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida
    • Journal Title

      Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7259 Pages: 7259

    • Peer Reviewed
  • [Presentation] Formalization of Gaussian Integers, Gaussian Rational Numbers, and Their Algebraic Structures with Mizar2012

    • Author(s)
      Yuichi Futa, Daichi Mizushima,Hiroyuki Okazaki
    • Organizer
      2012 International Symposium on Information Theory and its Applications (ISITA2012)
    • Place of Presentation
      Honolulu, Hawaii, USA
    • Year and Date
      20121028-20121031
  • [Presentation] Formalization Verification of AES Using the Mizar Proof Checker2012

    • Author(s)
      Hiroyuki Okazaki, Kenichi Arai, Yasunari Shidama
    • Organizer
      2012 International Conference on Foundations of Computer Science (FCS'12)
    • Place of Presentation
      Las Vegas, Nevada, USA
    • Year and Date
      20120616-20120619
  • [Presentation] 複数閾値複数秘密分散に関する一考察2012

    • Author(s)
      早稲田篤志, 双紙正和
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急 (金沢市)
    • Year and Date
      20120130-20120202
  • [Presentation] 形式化数学記述言語 Mizar による楕円曲線の形式化2012

    • Author(s)
      水島大地, 布田裕一, 岡崎裕之
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      2012年暗号と情報セキュリティシンポジウム 金沢エクセルホテル東急 (金沢市)
    • Year and Date
      20120130-20120202
  • [Presentation] ProVerifによるペアリングの形式化に関する考察2012

    • Author(s)
      荒井研一, 岡崎裕之
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急 (金沢市)
    • Year and Date
      20120130-20120202
  • [Presentation] Formal Verification of DES Using the Mizar Proof Checker2011

    • Author(s)
      Hiroyuki Okazaki, Kenichi Arai, Yasunari Shidama
    • Organizer
      2011 International Conference on Foundations of Computer Science (FCS'11)
    • Place of Presentation
      Monte Carlo Resort hotel (Las Vegas, Nevada, USA)
    • Year and Date
      20110718-20110721
  • [Presentation] Cryptographic Approach to Enhance the Security against Recent Threats

    • Author(s)
      Atsuko Miyaji
    • Organizer
      NSC-JST Workshop on ``Information and Communication Technology"
    • Place of Presentation
      JST Tokyo
    • Invited
  • [Presentation] 情報のグローバル化とプライバシー

    • Author(s)
      宮地 充子
    • Organizer
      情報処理学会 第75回 全国大会
    • Place of Presentation
      東北大学 川内キャンパス
    • Invited
  • [Presentation] 初期差分を用いたRC4 PRGAの内部状態解析

    • Author(s)
      市丸 祐, 宮地 充子
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      ウィスティン都ホテル京都
  • [Presentation] ネットワークコーディングに適したMACの一考察

    • Author(s)
      浅野 貴哉, 宮地 充子,面 和成
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      ウィスティン都ホテル京都
  • [Presentation] Improved Elliptic Curve Scalar Multiplication Using Triple Formula

    • Author(s)
      Atsuko Miyaji and Cuinan Yang
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
  • [Presentation] 効率的な倍ブロック長ハッシュ関数に関する一考察

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
  • [Presentation] Greedy algorithmを改良したDBNS利用による効率的な楕円曲線暗号のスカラー倍算

    • Author(s)
      河面祥男,宮地充子
    • Organizer
      ISEC2012
    • Place of Presentation
      静岡市産学交流センター
  • [Presentation] A new explicit relation between trace, definition field, and embedding degree

    • Author(s)
      Atsuko Miyaji and Xiaonan Shi
    • Organizer
      ISEC2012
    • Place of Presentation
      静岡市産学交流センター
  • [Presentation] An Optimized ID based Group Signature Veri?cation System and its impact in VANET

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
  • [Presentation] (n,n)ブロック暗号を用いた倍ブロック長ハッシュ関数の提案

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
  • [Presentation] VANETにおける経路認証について

    • Author(s)
      双紙正和, 三吉雄大
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
  • [Presentation] P2Pシステムにおけるハッシュ木の効率的な構築法の検討.

    • Author(s)
      樋口太平, 双紙正和, 浅枝智之
    • Organizer
      情報処理学会研究報告
    • Place of Presentation
      東京電機大学
  • [Presentation] ショートホップトレースバック方式の提案.

    • Author(s)
      古川真之, 双紙正和.
    • Organizer
      情報処理学会研究報告
    • Place of Presentation
      東京電機大学
  • [Presentation] Various techniques on Efficient and Secure Elliptic Curve Scalar Multiplication

    • Author(s)
      宮地 充子
    • Organizer
      ICISC
    • Place of Presentation
      KOFST(ソウル,韓国)
    • Invited
  • [Presentation] Recent topics on Elliptic Curve Cryptosystem: Research and International Standardization

    • Author(s)
      宮地 充子
    • Organizer
      ダッカ大学
    • Place of Presentation
      ダッカ大学(ダッカ,バングラデシュ)
    • Invited
  • [Presentation] Efficient and Secure Elliptic Curve Scalar Multiplication

    • Author(s)
      宮地 充子
    • Organizer
      天津大学
    • Place of Presentation
      天津大学(天津市,中国)
  • [Presentation] One time signature の効率的な構成の検討

    • Author(s)
      双紙正和, 早稲田篤志
    • Organizer
      情報処理学会研究報告,2012-CSEC-56, vol. 35
    • Place of Presentation
      横浜市開港記念会館(横浜市)
  • [Book] 代数学から学ぶ暗号理論2012

    • Author(s)
      宮地 充子
    • Total Pages
      288
    • Publisher
      日本評論社

URL: 

Published: 2014-07-24  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi