{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:43Z","timestamp":1725560923759},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_21","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"272-285","source":"Crossref","is-referenced-by-count":9,"title":["An Improved Forward Integrity Protocol for Mobile Agents"],"prefix":"10.1007","author":[{"given":"Ming","family":"Yao","sequence":"first","affiliation":[]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Bellare, M., Yee, B.S.: Forward Integrity for Secure Audit Logs. Technical report. Computer Science and Engineering Department, University of California. San Diego, USA (1995)"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36159-6_1","volume-title":"Information and Communications Security","author":"J.S.L. Cheng","year":"2002","unstructured":"Cheng, J.S.L., Wei, V.K.: Defenses against the Truncation of Computation Results of Free-Roaming Agents. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 1\u201312. Springer, Heidelberg (2002)"},{"issue":"4","key":"21_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory\u00a031(4), 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/BFb0057659","volume-title":"Mobile Agents","author":"G. Karjoth","year":"1998","unstructured":"Karjoth, G., Asokan, N., G\u00fclc\u00fc, C.: Protecting the Computation Results of Free- Roaming Agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol.\u00a01477, pp. 195\u2013207. Springer, Heidelberg (1998)"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1145\/860575.860712","volume-title":"Proceedings of the 2nd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2003)","author":"P. Maggi","year":"2003","unstructured":"Maggi, P., Sisto, R.: A Configurable Mobile Agent Data Protection Protocol. In: Proceedings of the 2nd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2003), Melbourne, Australia, pp. 851\u2013858. ACM Press, New York (2003)"},{"key":"21_CR6","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1996)"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45647-3_1","volume-title":"Mobile Agents","author":"V. Roth","year":"2001","unstructured":"Roth, V.: On the Robustness of some Cryptographic Protocols for Mobile Agent Protection. In: Picco, G.P. (ed.) MA 2001. LNCS, vol.\u00a02240, pp. 1\u201314. Springer, Heidelberg (2001)"},{"key":"21_CR8","series-title":"Electronic Notes in Theoretical Computer Science","volume-title":"Proceedings of 1st International Workshop on Secure Mobile Multi-Agent Systems (SEMAS 2001)","author":"V. Roth","year":"2002","unstructured":"Roth, V.: Programming Satan\u2019s agents. In: Fischer, K., Hutter, D. (eds.) Proceedings of 1st International Workshop on Secure Mobile Multi-Agent Systems (SEMAS 2001). Electronic Notes in Theoretical Computer Science, vol.\u00a063, Elsevier Science Publishers, Amsterdam (2002)"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-36112-X_4","volume-title":"Mobile Agents","author":"V. Roth","year":"2002","unstructured":"Roth, V.: Empowering Mobile Software Agents. In: Suri, N. (ed.) MA 2002. LNCS, vol.\u00a02535, pp. 47\u201363. Springer, Heidelberg (2002)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/3-540-48749-2_12","volume-title":"Secure Internet Programming","author":"B.S. Yee","year":"1999","unstructured":"Yee, B.S.: A Sanctuary for Mobile Agents. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 261\u2013273. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T10:38:31Z","timestamp":1552819111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}