{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:53:09Z","timestamp":1725565989587},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540229179"},{"type":"electronic","value":"9783540300779"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30077-9_17","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T13:02:07Z","timestamp":1284642127000},"page":"164-173","source":"Crossref","is-referenced-by-count":1,"title":["Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents"],"prefix":"10.1007","author":[{"given":"Ming","family":"Yao","sequence":"first","affiliation":[]},{"given":"Kun","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Matt","family":"Henricksen","sequence":"additional","affiliation":[]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36159-6_1","volume-title":"Information and Communications Security","author":"J.S.L. Cheng","year":"2002","unstructured":"Cheng, J.S.L., Wei, V.K.: Defenses against the Truncation of Computation Results of Free-Roaming Agents. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol.\u00a02513, pp. 1\u201312. Springer, Heidelberg (2002)"},{"key":"17_CR2","unstructured":"Hassler, V.: Security Fundamentals for E-Commerce. Artech House, INC."},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/BFb0057659","volume-title":"Mobile Agents","author":"G. Karjoth","year":"1998","unstructured":"Karjoth, G., Asokan, N., G\u00fclc\u00fc, C.: Protecting the Computation Results of Free-Roaming Agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol.\u00a01477, pp. 195\u2013207. Springer, Heidelberg (1998)"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1023\/A:1011527713457","volume":"1\/2","author":"S. Loureiro","year":"2001","unstructured":"Loureiro, S., Molva, R., Pannetrat, A.: Secure Data Collection with Updates. Electronic Commerce Research Journal\u00a01\/2, 119\u2013130 (2001)","journal-title":"Electronic Commerce Research Journal"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-540-24591-9_21","volume-title":"Information Security Applications","author":"M. Yao","year":"2004","unstructured":"Yao, M., Foo, E., Peng, K., Dawson, E.: An Improved Forward Integrity Protocol for Mobile Agents. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 272\u2013285. Springer, Heidelberg (2004) (to appear)"},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/3-540-48749-2_12","volume-title":"Secure Internet Programming","author":"B.S. Yee","year":"1999","unstructured":"Yee, B.S.: A Sanctuary for Mobile Agents. Secure Internet Programming. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 261\u2013273. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30077-9_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:43:31Z","timestamp":1619999011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30077-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229179","9783540300779"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30077-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}