{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:08:09Z","timestamp":1772021289690,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540423003","type":"print"},{"value":"9783540477198","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-47719-5_37","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T01:15:16Z","timestamp":1180746916000},"page":"474-486","source":"Crossref","is-referenced-by-count":73,"title":["Secure Mobile Agent Using Strong Non-designated Proxy Signature"],"prefix":"10.1007","author":[{"given":"Byoungcheon","family":"Lee","sequence":"first","affiliation":[]},{"given":"Heesun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Kwangjo","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,4]]},"reference":[{"key":"37_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1007\/3-540-61770-1_31","volume-title":"Proc. of the European Symposium on Research in Computer Security (ESORICS)","author":"W. Farmer","year":"1996","unstructured":"W. Farmer, J. Gutmann and V. Swarup, \u201cSecurity for Mobile Agents: Authentication and State Appraisal\u201d, Proc. of the European Symposium on Research in Computer Security (ESORICS), LNCS 1146, Springer-Verlag, pp. 118\u2013130, 1996."},{"key":"37_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/10718964_24","volume-title":"ACISP 2000","author":"P. Kotzanikolaous","year":"2000","unstructured":"P. Kotzanikolaous, M. Burmester and V. Chrissikopoulos, \u201cSecure Transactions with Mobile Agents in Hostile Environments\u201d, ACISP 2000, LNCS 1841, Springer-Verlag, pp. 289\u2013297, 2000."},{"key":"37_CR3","unstructured":"H. Kim, J. Baek, B. Lee, and K. Kim, \u201cSecret Computation with Secrets for Mobile Agent using One-time Proxy Signature\u201d, Proc. of SCIS2001, pages 845\u2013850, 2001."},{"key":"37_CR4","unstructured":"P. Kotzanikolaous, G. Katsirelos and V. Chrissikopoulos, \u201cMobile Agents for Secure Electronic Transactions\u201d, Recent Advances in Signal Processing and Communications, World Scientific and Engineering Society Press, pp. 363\u2013368, 1999."},{"key":"37_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/BFb0028478","volume-title":"Proc. of ICICS\u201997","author":"S. Kim","year":"1997","unstructured":"S. Kim, S. Park, and D. Won, \u201cProxy Signatures, Revisited\u201d, Proc. of ICICS\u201997, Y. Han et al(Eds.), LNCS 1334, Springer-Verlag, pages 223\u2013232, 1997."},{"key":"37_CR6","unstructured":"B. Lee, H. Kim and K. Kim, \u201cStrong Proxy Signature and its Applications\u201d, Proc. of SCIS2001, pages 603\u2013608, 2001."},{"key":"37_CR7","unstructured":"S. Loureio and R. Molva, \u201cPrivacy for Mobile Code\u201d, Proc. of Distributed Object Security Workshop OOPSLA\u2019 99, 6 pages, 1999."},{"key":"37_CR8","unstructured":"A. Menezes, P. Oorschot, and S. Vanstone, Handbook of Applied Cryptography, pages 617\u2013618, CRC Press, 1997."},{"key":"37_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1007\/BFb0028502","volume-title":"Proc. of ICICS\u201997","author":"J. Merwe","year":"1997","unstructured":"J. Merwe and S.H. Solms, \u201cElectronic Commerce with Secure Intelligent Trade Agents\u201d, Proc. of ICICS\u201997, Y. Han et al(Eds.), LNCS 1334, Springer-Verlag, pp. 452\u2013462, 1997."},{"issue":"9","key":"37_CR10","first-page":"1338","volume":"E79-A","author":"M. Mambo","year":"1996","unstructured":"M. Mambo, K. Usuda, and E. Okamoto, \u201cProxy Signatures: Delegation of the Power to Sign Messages\u201d, IEICE Trans. on Fundamentals, Vol. E79-A, No. 9, Sep., pages 1338\u20131353, 1996.","journal-title":"IEICE Trans. on Fundamentals"},{"key":"37_CR11","unstructured":"R. Otomura, M. Soshi, and A. Miyaji, \u201cOn Digital Signature Schemes for Mobile Agents\u201d, Proc. of SCIS2001, pages 851\u2013855, 2001."},{"key":"37_CR12","doi-asserted-by":"crossref","unstructured":"H. Petersen and P. Horster, \u201cSelf-certified Keys-Concepts and Applications\u201d, Proc. Communications and Multimedia Security\u201997, pages 102\u2013116, Chapman & Hall, 1997.","DOI":"10.1007\/978-0-387-35256-5_8"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"D. Pointcheval and J. Stern, \u201cSecurity Proofs for Signatures\u201d, Advances in Cryptology: Eurocrypt\u201996, pages 387\u2013398, Springer, 1996.","DOI":"10.1007\/3-540-68339-9_33"},{"key":"37_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","volume-title":"Mobile Agent Security","author":"T. Sander","year":"1997","unstructured":"T. Sander and C. F. Tschudin, \u201cProtecting Mobile Agents Against Malicious Hosts\u201d, Mobile Agent Security, LNCS 1419, Springer-Verlag, pp. 44\u201360, 1997."},{"issue":"6","key":"37_CR15","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1049\/el:20000422","volume":"36","author":"L. Yi","year":"2000","unstructured":"L. Yi, G. Bai and G. Xiao, \u201cProxy Multi-signature Scheme: A New Type of Proxy Signature Scheme\u201d, Electronics Letters, Vol. 36, No. 6, pages 527\u2013528, 16th March 2000.","journal-title":"Electronics Letters"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-47719-5_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T12:07:00Z","timestamp":1556453220000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-47719-5_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540423003","9783540477198"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-47719-5_37","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2001]]}}}