Changes
On August 4, 2023 at 8:46:54 AM UTC, admin:
-
Set author of wahc20 to Michael Brenner (previously Michael Brenner, Tancrède Lepoint (Eds.))
f | 1 | { | f | 1 | { |
n | 2 | "author": "Michael Brenner, Tancr\u00e8de Lepoint (Eds.)", | n | 2 | "author": "Michael Brenner", |
3 | "author_email": "brenner@luis.uni-hannover.de", | 3 | "author_email": "brenner@luis.uni-hannover.de", | ||
4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
5 | "doi": "10.25835/0072999", | 5 | "doi": "10.25835/0072999", | ||
6 | "doi_date_published": "2020-12-18", | 6 | "doi_date_published": "2020-12-18", | ||
7 | "doi_publisher": "LUIS", | 7 | "doi_publisher": "LUIS", | ||
8 | "doi_status": "true", | 8 | "doi_status": "true", | ||
9 | "domain": "https://data.uni-hannover.de", | 9 | "domain": "https://data.uni-hannover.de", | ||
n | n | 10 | "extra_authors": [ | ||
11 | { | ||||
12 | "extra_author": " Tancr\u00e8de Lepoint (Eds.)" | ||||
13 | } | ||||
14 | ], | ||||
10 | "groups": [], | 15 | "groups": [], | ||
11 | "have_copyright": "Yes", | 16 | "have_copyright": "Yes", | ||
12 | "id": "56595104-4b4c-4478-8244-166fe7cbeb5f", | 17 | "id": "56595104-4b4c-4478-8244-166fe7cbeb5f", | ||
13 | "isopen": false, | 18 | "isopen": false, | ||
14 | "license_id": "CC-BY-3.0", | 19 | "license_id": "CC-BY-3.0", | ||
15 | "license_title": "CC-BY-3.0", | 20 | "license_title": "CC-BY-3.0", | ||
16 | "maintainer": "Michael Brenner", | 21 | "maintainer": "Michael Brenner", | ||
17 | "maintainer_email": "brenner@luis.uni-hannover.de", | 22 | "maintainer_email": "brenner@luis.uni-hannover.de", | ||
18 | "metadata_created": "2021-10-14T10:16:10.076969", | 23 | "metadata_created": "2021-10-14T10:16:10.076969", | ||
n | 19 | "metadata_modified": "2023-01-12T13:14:30.360444", | n | 24 | "metadata_modified": "2023-08-04T08:46:54.394843", |
20 | "name": "luh-wahc20", | 25 | "name": "luh-wahc20", | ||
21 | "notes": "Proceedings of the 8th Workshop on Encrypted Computing and | 26 | "notes": "Proceedings of the 8th Workshop on Encrypted Computing and | ||
22 | Applied Homomorphic Cryptography", | 27 | Applied Homomorphic Cryptography", | ||
23 | "num_resources": 1, | 28 | "num_resources": 1, | ||
24 | "num_tags": 3, | 29 | "num_tags": 3, | ||
25 | "organization": { | 30 | "organization": { | ||
26 | "approval_status": "approved", | 31 | "approval_status": "approved", | ||
27 | "created": "2021-07-23T10:11:22.945699", | 32 | "created": "2021-07-23T10:11:22.945699", | ||
28 | "description": "Leibniz Universit\u00e4t IT Services | 33 | "description": "Leibniz Universit\u00e4t IT Services | ||
29 | \r\nhttps://www.luis.uni-hannover.de/", | 34 | \r\nhttps://www.luis.uni-hannover.de/", | ||
30 | "id": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | 35 | "id": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | ||
31 | "image_url": | 36 | "image_url": | ||
32 | a.uni-hannover.de/uploads/group/2017-12-21-155434.425289LogoLUIS.png", | 37 | a.uni-hannover.de/uploads/group/2017-12-21-155434.425289LogoLUIS.png", | ||
33 | "is_organization": true, | 38 | "is_organization": true, | ||
34 | "name": "luis", | 39 | "name": "luis", | ||
35 | "state": "active", | 40 | "state": "active", | ||
36 | "title": "LUIS", | 41 | "title": "LUIS", | ||
37 | "type": "organization" | 42 | "type": "organization" | ||
38 | }, | 43 | }, | ||
39 | "owner_org": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | 44 | "owner_org": "d94a6c04-bd2e-41c2-a217-ea43b0aba5cd", | ||
40 | "private": false, | 45 | "private": false, | ||
41 | "relationships_as_object": [], | 46 | "relationships_as_object": [], | ||
42 | "relationships_as_subject": [], | 47 | "relationships_as_subject": [], | ||
43 | "repository_name": "Leibniz University Hannover", | 48 | "repository_name": "Leibniz University Hannover", | ||
44 | "resources": [ | 49 | "resources": [ | ||
45 | { | 50 | { | ||
46 | "cache_last_updated": null, | 51 | "cache_last_updated": null, | ||
47 | "cache_url": null, | 52 | "cache_url": null, | ||
48 | "created": "2020-12-18T22:20:30.850997", | 53 | "created": "2020-12-18T22:20:30.850997", | ||
49 | "description": "Proceedings of the 8th Workshop on Encrypted | 54 | "description": "Proceedings of the 8th Workshop on Encrypted | ||
50 | Computing and Applied Homomorphic Cryptography", | 55 | Computing and Applied Homomorphic Cryptography", | ||
51 | "format": "PDF", | 56 | "format": "PDF", | ||
52 | "hash": "", | 57 | "hash": "", | ||
53 | "id": "1984c6d3-0b30-485f-bc2e-7f0cbbf3cdee", | 58 | "id": "1984c6d3-0b30-485f-bc2e-7f0cbbf3cdee", | ||
54 | "last_modified": "2021-01-02T23:40:33.360811", | 59 | "last_modified": "2021-01-02T23:40:33.360811", | ||
n | 55 | "metadata_modified": "2023-01-12T13:14:30.364114", | n | 60 | "metadata_modified": "2023-08-04T08:46:54.397917", |
56 | "mimetype": "application/pdf", | 61 | "mimetype": "application/pdf", | ||
57 | "mimetype_inner": null, | 62 | "mimetype_inner": null, | ||
58 | "name": "Proceedings of the 8th Workshop on Encrypted Computing | 63 | "name": "Proceedings of the 8th Workshop on Encrypted Computing | ||
59 | and Applied Homomorphic Cryptography", | 64 | and Applied Homomorphic Cryptography", | ||
60 | "package_id": "56595104-4b4c-4478-8244-166fe7cbeb5f", | 65 | "package_id": "56595104-4b4c-4478-8244-166fe7cbeb5f", | ||
61 | "position": 0, | 66 | "position": 0, | ||
62 | "resource_type": null, | 67 | "resource_type": null, | ||
63 | "size": 8741494, | 68 | "size": 8741494, | ||
64 | "state": "active", | 69 | "state": "active", | ||
65 | "url": | 70 | "url": | ||
66 | 6d3-0b30-485f-bc2e-7f0cbbf3cdee/download/wahc20_proceedings-rev1.pdf", | 71 | 6d3-0b30-485f-bc2e-7f0cbbf3cdee/download/wahc20_proceedings-rev1.pdf", | ||
67 | "url_type": "" | 72 | "url_type": "" | ||
68 | } | 73 | } | ||
69 | ], | 74 | ], | ||
t | t | 75 | "services_used_list": "", | ||
70 | "source_metadata_created": "2020-12-18T13:39:43.808809", | 76 | "source_metadata_created": "2020-12-18T13:39:43.808809", | ||
71 | "source_metadata_modified": "2022-01-20T11:00:37.019006", | 77 | "source_metadata_modified": "2022-01-20T11:00:37.019006", | ||
72 | "state": "active", | 78 | "state": "active", | ||
73 | "tags": [ | 79 | "tags": [ | ||
74 | { | 80 | { | ||
75 | "display_name": "computer security", | 81 | "display_name": "computer security", | ||
76 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | 82 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | ||
77 | "name": "computer security", | 83 | "name": "computer security", | ||
78 | "state": "active", | 84 | "state": "active", | ||
79 | "vocabulary_id": null | 85 | "vocabulary_id": null | ||
80 | }, | 86 | }, | ||
81 | { | 87 | { | ||
82 | "display_name": "cryptography", | 88 | "display_name": "cryptography", | ||
83 | "id": "08064d23-ed49-4a33-bf16-8e7dee8aaaef", | 89 | "id": "08064d23-ed49-4a33-bf16-8e7dee8aaaef", | ||
84 | "name": "cryptography", | 90 | "name": "cryptography", | ||
85 | "state": "active", | 91 | "state": "active", | ||
86 | "vocabulary_id": null | 92 | "vocabulary_id": null | ||
87 | }, | 93 | }, | ||
88 | { | 94 | { | ||
89 | "display_name": "homomorphic encryption", | 95 | "display_name": "homomorphic encryption", | ||
90 | "id": "c090152a-88cf-4bff-8d61-46ffa3ffc3cd", | 96 | "id": "c090152a-88cf-4bff-8d61-46ffa3ffc3cd", | ||
91 | "name": "homomorphic encryption", | 97 | "name": "homomorphic encryption", | ||
92 | "state": "active", | 98 | "state": "active", | ||
93 | "vocabulary_id": null | 99 | "vocabulary_id": null | ||
94 | } | 100 | } | ||
95 | ], | 101 | ], | ||
96 | "terms_of_usage": "Yes", | 102 | "terms_of_usage": "Yes", | ||
97 | "title": "wahc20", | 103 | "title": "wahc20", | ||
98 | "type": "vdataset", | 104 | "type": "vdataset", | ||
99 | "url": "https://data.uni-hannover.de/dataset/wahc20", | 105 | "url": "https://data.uni-hannover.de/dataset/wahc20", | ||
100 | "version": "1.0" | 106 | "version": "1.0" | ||
101 | } | 107 | } |