{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:57:26Z","timestamp":1725868646827},"publisher-location":"Cham","reference-count":5,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319484280"},{"type":"electronic","value":"9783319484297"}],"license":[{"start":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T00:00:00Z","timestamp":1476921600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-48429-7_11","type":"book-chapter","created":{"date-parts":[[2016,10,19]],"date-time":"2016-10-19T05:32:59Z","timestamp":1476855179000},"page":"112-122","source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of Influence Exerted by a Malicious Group\u2019s Various Aims in the External Grid"],"prefix":"10.1007","author":[{"given":"Kosuke","family":"Yamaguchi","sequence":"first","affiliation":[]},{"given":"Tsutomu","family":"Inamoto","sequence":"additional","affiliation":[]},{"given":"Keiichi","family":"Endo","sequence":"additional","affiliation":[]},{"given":"Yoshinobu","family":"Higami","sequence":"additional","affiliation":[]},{"given":"Shinya","family":"Kobayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,20]]},"reference":[{"key":"11_CR1","unstructured":"Nakaya, T., Inamoto, T., Higami, Y., Kobayashi, S.: Study on concealmentability of secure processing based on continuity of program flagments (in Japanese). In: Proceedings of DICOMO (Multimedia, Distributed, Cooperative, and Mobile System) 2015, pp. 287\u2013294 (2015)"},{"key":"11_CR2","unstructured":"Yamaguchi, K., Inamoto, T., Higami, Y., Kobayashi, S.: A method to reduce the risk of malicious analysis with dependence relations in external grid computing (in Japanese). In: Proceedings of the 78th National Convention of IPSJ, 5R\u201307 (2016)"},{"key":"11_CR3","unstructured":"Hirose, Y., Inamoto, T., Higami, Y., Kobayashi, S.: Evaluation of advance processing in terms of processing time on secure processing (in Japanese). In: Proceedings of 14th Forum on Information Technology, vol. 4, pp. 241\u2013242 (2015)"},{"issue":"12","key":"11_CR4","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1145\/7902.7904","volume":"29","author":"DA Padua","year":"1986","unstructured":"Padua, D.A., Wolfe, M.J.: Advanced computer optimizations for supercomputers. Commun. ACM 29(12), 1184\u20131201 (1986)","journal-title":"Commun. ACM"},{"key":"11_CR5","unstructured":"University of California: SETI@Home. http:\/\/setiathome.ssl.berkeley.edu\/"}],"container-title":["Advances in Intelligent Systems and Computing","Hard and Soft Computing for Artificial Intelligence, Multimedia and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48429-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T21:31:57Z","timestamp":1498339917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48429-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,20]]},"ISBN":["9783319484280","9783319484297"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48429-7_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2016,10,20]]}}}