{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:30:27Z","timestamp":1762032627662},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_24","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"289-297","source":"Crossref","is-referenced-by-count":38,"title":["Secure Transactions with Mobile Agents in Hostile Environments"],"prefix":"10.1007","author":[{"given":"Panayiotis","family":"Kotzanikolaou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mike","family":"Burmester","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vassilios","family":"Chrissikopoulos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"24_CR1","volume-title":"Mobile Object Systems","author":"D. Chess","year":"1996","unstructured":"Chess, D., Harrison, C., Kershenbaum, A.: Mobile Agents: Are They a Good Idea? In: Vitek, J., Tschudin, C. (eds.) Mobile Object Systems. Springer, Heidelberg (1996)"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant Agents for Mobile Computing, Technical Report, RC 20010, IBM T.J. Watson Research Center, NY (1995)","DOI":"10.1109\/98.468361"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-68671-1_1","volume-title":"Mobile Agents and Security","author":"D.M. Chess","year":"1998","unstructured":"Chess, D.M.: Security Issues in Mobile Code Systems. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 1\u201314. Springer, Heidelberg (1998)"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","first-page":"435","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"C. Don","year":"1994","unstructured":"Don, C., Jacques, S., Serge, V.: Attacks on the Birational Permutation Signature Schemes. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 435\u2013443. Springer, Heidelberg (1994)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","first-page":"118","volume-title":"Computer Security - ESORICS 96","author":"F. William","year":"1996","unstructured":"William, F., Joshua, G., Vipin, S.: Security for Mobile Agents: Authentication and State Appraisal. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 118\u2013130. Springer, Heidelberg (1996)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-68671-1_6","volume-title":"Mobile Agents and Security","author":"H. Fritz","year":"1998","unstructured":"Fritz, H.: Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 92\u2013113. Springer, Heidelberg (1998)"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Hohl, F.: A Model of Attacks of Malicious Hosts Against Mobile Agents. In: Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, INRIA, France, pp. 105 - 120 (1998)","DOI":"10.1007\/3-540-49255-0_77"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/BFb0055470","volume-title":"Financial Cryptography","author":"J. Markus","year":"1998","unstructured":"Markus, J., Ari, J.: X-cash: Executable Digital Cash. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol.\u00a01465, pp. 16\u201327. Springer, Heidelberg (1998)"},{"key":"24_CR9","first-page":"363","volume-title":"Recent Advances in Signal Processing and Communications","author":"K. Panayiotis","year":"1999","unstructured":"Panayiotis, K., George, K., Vassilios, C.: Mobile Agents for Secure Electronic Transactions. In: Recent Advances in Signal Processing and Communications, pp. 363\u2013368. World Scientific and Engineering Society Press, Singapore (1999)"},{"key":"24_CR10","unstructured":"Richard, L., Tomas, S.: An Additively Homomorphic Encryption Scheme or How to Introduce a Partial Trapdoor in the Discrete Log ( November 1997) (submitted for Publication)"},{"key":"24_CR11","unstructured":"Sergio, L., Refik, M.: Privacy for Mobile Code. In: proceedings of Distributed Object Security Workshop OOPSLA 1999, Denver (November 1999)"},{"key":"24_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/BFb0028502","volume-title":"Information and Communications Security","author":"J. Merwe","year":"1997","unstructured":"Merwe, J., Solms, S.H.: Electronic Commerce with Secure Intelligent Trade Agents. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 452\u2013462. Springer, Heidelberg (1997)"},{"key":"24_CR13","unstructured":"Palmer, E.: An Introduction to Citadel \u2013 a Secure Crypto Coprocessor for Workstations. In: Proceedings of the IFIP SEC 1994 Conference, Curacao (1994)"},{"issue":"2","key":"24_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Ronald","year":"1978","unstructured":"Ronald, R., Adi, S., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Communications of ACM"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","volume-title":"Mobile Agents and Security","author":"S. Tomas","year":"1998","unstructured":"Tomas, S., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 44\u201360. Springer, Heidelberg (1998)"},{"key":"24_CR16","unstructured":"Adi, S.: Efficient Signature Schemes Based On Birational Premutations. In: Proceedings of the DARPA Workshop on foundations for secure mobile code, Monterey CA, USA (1997)"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-68671-1_8","volume-title":"Mobile Agents and Security","author":"V. Giovanni","year":"1998","unstructured":"Giovanni, V.: Cryptographic Traces for Mobile Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 137\u2013153. Springer, Heidelberg (1998)"},{"key":"24_CR18","unstructured":"Wilhelm, U.G.: Cryptographically Protected Objects. Technical Report, Ecole Polytechnique Federale de Lausanne, Switzerland (1997)"},{"key":"24_CR19","unstructured":"Yee Bennet, S.: A Sanctuary for Mobile Agents. In: Proceedings of the DARPA workshop on foundations for secure mobile code, Monterey CA, USA (1997)"},{"key":"24_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/BFb0053413","volume-title":"Trends in Distributed Systems for Electronic Commerce","author":"Y. Xun","year":"1998","unstructured":"Xun, Y., Feng, W.X., Yan, L.K.: A Secure Intelligent Trade Agent System. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol.\u00a01402, pp. 218\u2013228. Springer, Heidelberg (1998)"},{"key":"24_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/BFb0053412","volume-title":"Trends in Distributed Systems for Electronic Commerce","author":"Z. Michael","year":"1998","unstructured":"Michael, Z., Helge, M., Kurt, G.: Security Requirements for Mobile Agents in Electronic Markets. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol.\u00a01402, pp. 205\u2013217. Springer, Heidelberg (1998)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T11:42:11Z","timestamp":1556019731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/10718964_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}