{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:27:54Z","timestamp":1729657674934,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/eee.2005.35","type":"proceedings-article","created":{"date-parts":[[2005,4,12]],"date-time":"2005-04-12T10:25:58Z","timestamp":1113301558000},"page":"282-285","source":"Crossref","is-referenced-by-count":3,"title":["Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties"],"prefix":"10.1109","author":[{"given":"A.","family":"Saxena","sequence":"first","affiliation":[]},{"given":"B.","family":"Soh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539792230010"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/BF00195207"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1137\/0220068"},{"key":"15","first-page":"368","article-title":"Robust object watermarking: Application to code","author":"stern","year":"1999","journal-title":"Information Hiding"},{"key":"16","article-title":"On the (im)possibility of obfuscating programs","volume":"2001","author":"barak","year":"2001","journal-title":"Cryptology ePrint Archive Report"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"14","article-title":"Software tamper resistance: Obstructing static analysis of programs","author":"wang","year":"2000","journal-title":"University of Virginia Technical Report"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/4236.612220"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"3","first-page":"591","article-title":"Security for mobile agents: Issues and requirements","author":"farmer","year":"1996","journal-title":"Proceedings of the 19th National Information Systems Security Conference"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2005.1452050"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/295685.298136"},{"key":"1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/311124.311130","article-title":"Mobile agents and the future of the internet","volume":"33","author":"kotz","year":"1999","journal-title":"SICOPS Oper Syst Rev"},{"key":"10","first-page":"471","article-title":"Introducing trusted third parties to the mobile agent paradigm","volume":"1603","author":"wilhelm","year":"1999","journal-title":"Secure Internet Programming Security Issues for Mobile and Distributed Objects"},{"key":"7","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/10718964_24","article-title":"Secure transactions with mobile agents in hostile environments","author":"kotzanikolaou","year":"2000","journal-title":"Australasian Conference on Information Security and Privacy"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924283"},{"key":"5","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","article-title":"Protecting mobile agents against malicious hosts","volume":"1419","author":"sander","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"4","article-title":"On the problem of trust in mobile agent systems","author":"wilhelm","year":"1998","journal-title":"Symposium on Network and Distributed System Security"},{"key":"9","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/3-540-48749-2_12","article-title":"A sanctuary for mobile agents","author":"yee","year":"1999","journal-title":"Secure internet Programming"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/643477.643479"}],"event":{"name":"2005 IEEE International Conference on e-Technology, e-Commerce and e-Service","location":"Hong Kong, China"},"container-title":["2005 IEEE International Conference on e-Technology, e-Commerce and e-Service"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9634\/30444\/01402309.pdf?arnumber=1402309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T14:13:22Z","timestamp":1497622402000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1402309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/eee.2005.35","relation":{},"subject":[]}}