{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T16:10:18Z","timestamp":1736525418941,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540380917"},{"type":"electronic","value":"9783540380924"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11833529_99","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T15:33:11Z","timestamp":1156519991000},"page":"977-987","source":"Crossref","is-referenced-by-count":7,"title":["A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios"],"prefix":"10.1007","author":[{"given":"Javier","family":"L\u00f3pez","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Ma\u00f1a","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Mu\u00f1oz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"99_CR1","unstructured":"Trusted Computing Group: TCG Specifications (2005), available online at https:\/\/www.trustedcomputinggroup.org\/specs\/"},{"key":"99_CR2","doi-asserted-by":"crossref","unstructured":"Resnick, P., Varian, H. (eds.): Communications of the ACM: Special Issue on Recommender Systems 46 (1997)","DOI":"10.1145\/245108.245121"},{"key":"99_CR3","doi-asserted-by":"crossref","unstructured":"Riecken, D. (ed.): Commun. ACM: Special Issue on Personalization 43 (2000)","DOI":"10.1145\/345124.372535"},{"key":"99_CR4","doi-asserted-by":"crossref","unstructured":"Maybury, M. (ed.): Commun. ACM: Special Issue on News on Demand 43 (2000)","DOI":"10.1145\/328236.328142"},{"key":"99_CR5","doi-asserted-by":"crossref","unstructured":"Maybury, M., Brusilovsky, P. (eds.): Commun. ACM: The Adaptive Web 45 (2002)","DOI":"10.1145\/506218.506239"},{"issue":"3","key":"99_CR6","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1093\/ijlit\/9.3.275","volume":"9","author":"L. Bygrave","year":"2001","unstructured":"Bygrave, L.: Electronic Agents and Privacy: A Cyberspace Odyssey 2001. Intl. Journal of Law and Information Technology\u00a09(3), 280 (2001)","journal-title":"Intl. Journal of Law and Information Technology"},{"key":"99_CR7","unstructured":"Pearson, S.: Trusted Agents that Enhance User Privacy by Self-Profiling. In: Proceedings of the AAMAS Workshop (Special track on privacy) (2002)"},{"key":"99_CR8","unstructured":"W3C: Resource Description Framework (RDF): Concepts and Abstract Syntax (2004)"},{"key":"99_CR9","unstructured":"W3C: CC\/PP: Structure and Vocabularies 1.0 (January 2004), available online at http:\/\/www.ubiq.com\/hypertext\/weiser\/SciAmDraft3.html"},{"key":"99_CR10","unstructured":"Wireless Application Protocol Forum: Wireless Application Group User Agent Profile Specification (November 1999)"},{"key":"99_CR11","unstructured":"Foundation for Intelligent Physical Agents: FIPA Device Ontology Specification (December 2002), available online http:\/\/www.fipa.org"},{"key":"99_CR12","unstructured":"Chi, E.H.: Transient User Profiling. In: Proceedings of the workshop on User Profiling (2004)"},{"key":"99_CR13","doi-asserted-by":"crossref","unstructured":"Sparacino, F.: Sto(ry)chastics: a Bayesian Network Architecture for User Modelling and Computational Storytelling for Interactive Spaces. In: Proceedings of the Fifth International Conference on Ubiquitous Computing (2003)","DOI":"10.1007\/978-3-540-39653-6_5"},{"key":"99_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/3-540-68671-1_7","volume-title":"Mobile Agents and Security","author":"S. Berkovits","year":"1998","unstructured":"Berkovits, S., Guttman, J., Swarup, V.: Authentication for Mobile Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 114\u2013136. Springer, Heidelberg (1998)"},{"key":"99_CR15","unstructured":"Ma\u00f1a, A.: Protecci\u00f3n de Software Basada en Tarjetas Inteligentes. PhD Thesis. University of M\u00e1laga (2003)"},{"key":"99_CR16","unstructured":"Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. PhD Thesis. Universite Catholique de Louvain (2003)"},{"key":"99_CR17","doi-asserted-by":"crossref","unstructured":"Necula, G.: Proof-Carrying Code. In: Proceedings of 24th Annual Symposium on Principles of Programming Languages (1997)","DOI":"10.1145\/263699.263712"},{"key":"99_CR18","unstructured":"Carl, A.G., Peter, H., Scott, N.: Infrastructure for Proof-Referencing Code. In: Proceedings of the Workshop on Foundations of Secure Mobile Code (March 1997)"},{"key":"99_CR19","doi-asserted-by":"crossref","unstructured":"Yee, B.S.: A Sanctuary for Mobile Agents. Secure Internet Programming (1999)","DOI":"10.1007\/3-540-48749-2_12"},{"key":"99_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/3-540-39757-4_32","volume-title":"Advances in Cryptology","author":"E. Piller","year":"1985","unstructured":"Piller, E., Schaum\u00fcller-Bichl, I.: A Method of Protection Based on the Use of Smart Cards and Cryptographic Techniques. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol.\u00a0209, pp. 446\u2013454. Springer, Heidelberg (1985)"},{"key":"99_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/10719724_25","volume-title":"Information Hiding","author":"J.P. Stern","year":"2000","unstructured":"Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 368\u2013378. Springer, Heidelberg (2000)"},{"key":"99_CR22","unstructured":"Collberg, C., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. University of Auckland Technical Report #170 (2000)"},{"key":"99_CR23","volume-title":"Information Hiding, Stenography and Watermarking","author":"P. Wayner","year":"2002","unstructured":"Wayner, P.: Dissapearing Cryptography. In: Information Hiding, Stenography and Watermarking, Morgan Kauffman, San Francisco (2002)"},{"key":"99_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"key":"99_CR25","doi-asserted-by":"crossref","unstructured":"Goldreich, O.: Towards a theory of software protection. In: Proceedings of the 19th Ann. ACM Symposium on Theory of Computing, pp. 182\u2013194 (1987)","DOI":"10.1145\/28395.28416"},{"key":"99_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/3-540-49380-8_9","volume-title":"Information Hiding","author":"T. Sander","year":"1998","unstructured":"Sander, T., Tschudin, C.F.: On Software Protection via Function Hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 111\u2013123. Springer, Heidelberg (1998)"},{"key":"99_CR27","volume-title":"Trusted Computer Platforms","author":"S. Pearson","year":"2003","unstructured":"Pearson, S., Balacheff, B., Chen, L., Plaquin, D., Proudler, G.: Trusted Computer Platforms. Prentice-Hall, Englewood Cliffs (2003)"},{"key":"99_CR28","doi-asserted-by":"crossref","unstructured":"Arbaugh, W., Farber, D., Smith, J.: A Secure and Reliable Bootstrap Architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 65\u201371 (1997)","DOI":"10.1109\/SECPRI.1997.601317"},{"key":"99_CR29","unstructured":"Ghosh, A., Schwartbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Usenix (1999)"},{"key":"99_CR30","unstructured":"Ma\u00f1a, A., Mu\u00f1oz, A.: Mutual Protection for Multiagent Systems. In: Proceedings of the Third International Workshop on Safety and Security in Multiagent Systems (SASEMAS 2006) (2006)"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11833529_99.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T15:50:41Z","timestamp":1736524241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11833529_99"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540380917","9783540380924"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11833529_99","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}