{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T05:25:21Z","timestamp":1736918721931,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540370154"},{"type":"electronic","value":"9783540370178"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-37017-8_14","type":"book-chapter","created":{"date-parts":[[2007,3,7]],"date-time":"2007-03-07T21:11:25Z","timestamp":1173301885000},"page":"307-326","source":"Crossref","is-referenced-by-count":1,"title":["Secure E-Transactions Protocol using Intelligent Mobile Agents with Fair Privacy"],"prefix":"10.1007","author":[{"given":"Song","family":"Han","sequence":"first","affiliation":[]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Tharam","family":"Dillon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1_14","doi-asserted-by":"crossref","unstructured":"Bryce C, Vitek J (1999) The JavaSeal mobile agent kernel, ASA\/MA, 103-117.","DOI":"10.1109\/ASAMA.1999.805397"},{"issue":"1","key":"14_CR2_14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/643477.643479","volume":"3","author":"J Claessens","year":"2003","unstructured":"Claessens J, Preneel B, Vandewalle J (2003) (How) can mobile agents do secure electronic transactions on untrusted hosts? ACM Trans, Internet Techn; 3 (1): 28-48.","journal-title":"ACM Trans, Internet Techn"},{"key":"14_CR3_14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-68671-1_1","volume-title":"Mobile Agents and Security","author":"DM Chess","year":"1998","unstructured":"Chess DM (1998) Security issues in mobile code systems, In Mobile Agents and Security, G. Vigna, Ed., Lecture Notes in Computer Science, vol. 1419, Springer-Verlag, New York, 1-14."},{"key":"14_CR4_14","unstructured":"Eklund E (2006) Controlling and securing personal privacy and anonymity in the information society, http:\/\/www.niksula.cs.hut.fiek-lund\/Opinnot\/netsec.html.\/"},{"key":"14_CR5_14","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/3-540-45370-9_11","volume-title":"E-Commerce Agents: Marketplace Solu- tions, Security Issues, and Supply and Demand","author":"J Claessens","year":"2001","unstructured":"Claessens J, Preneel B, Vandewalle J (2001) Secure communication for secure agentbased electronic commerce, In E-Commerce Agents: Marketplace Solu- tions, Security Issues, and Supply and Demand, J. Liu and Y. Ye, Eds., Lecture Notes in Computer Science, vol. 2033, Springer-Verlag, New York, 180-190."},{"key":"14_CR6_14","unstructured":"Farmer W, Gutmann J, Swarup V (1996) Security for mobile agents: authenti- cation and state appraisal, Proc. of the European Symposium on Research in Computer Security (ESORICS), LNCS 1146, Springer-Verlag, 118-130."},{"key":"14_CR7_14","doi-asserted-by":"crossref","unstructured":"Edjlali G, Acharya A, Chaudhary V (1998) History-based access control for mobile code, ACM CCCS-98, 413-431.","DOI":"10.1007\/3-540-48749-2_19"},{"key":"14_CR8_14","doi-asserted-by":"crossref","unstructured":"Han S, Chang E, Dillon T (2005) Secure e-transactions using mobile agents with agent broker, in the Proceedings of the Second IEEE ICSSSM, Jun 13-15, 2005, Chongqing, 849-855.","DOI":"10.1109\/ICSSSM.2005.1500113"},{"key":"14_CR9_14","doi-asserted-by":"crossref","unstructured":"Graff JC (2001) Cryptograhpy and e-commerce, A Wiley Tech Brief, Wiley Computer Publishing.","DOI":"10.1016\/S1353-4858(01)00416-0"},{"key":"14_CR10_14","unstructured":"Han S, Chang E (2005) A secure strong proxy signature scheme based on DSS, Technical Report, CBS, Curtin University of Technology."},{"key":"14_CR11_14","doi-asserted-by":"crossref","unstructured":"Han S, Chang E, Dillon T (2005) Secure transactions using mobile agents with TTP, in the Proceedings of the Second IEEE ICSSSM, Jun 13-15, 2005, Chongqing, 856-862.","DOI":"10.1109\/ICSSSM.2005.1500114"},{"key":"14_CR12_14","unstructured":"Hassler V (2000) Mobile agent security, In security fundamentals for E- Commerce, Computer Security Series. Artech House, Chapter 20, 331-351."},{"key":"14_CR13_14","doi-asserted-by":"crossref","unstructured":"Hohl F (1998) A model of attacks of malicious hosts against mobile agents, In Proceedings of the fourth ECOOP Workshop on Mobile Oject Systems 1998: Secure Internet Mobile Computation.","DOI":"10.1007\/3-540-49255-0_77"},{"key":"14_CR14_14","doi-asserted-by":"crossref","unstructured":"Kotzanikolaous P, Burmester M, Chrissikopoulos V (2000) Secure transactions with mobile agents in hostile environments, ACISP 2000, LNCS 1841, SpringerVerlag, 289-297.","DOI":"10.1007\/10718964_24"},{"key":"14_CR15_14","unstructured":"Kotzanikolaous P, Katsirelos G, Chrissikopoulos V (1999) Mobile agents for secure electronic transactions, Recent Advances in Signal Processing and Com-munications, World Scientific and Engineering Society Press, 363-368."},{"key":"14_CR16_14","doi-asserted-by":"crossref","unstructured":"Kim S, Park S, Won D (1997) Proxy signatures, revisited, Proc. of ICICS\u201997,Y. Han et al(Eds.), LNCS 1334, Springer-Verlag, 223-232.","DOI":"10.1007\/BFb0028478"},{"key":"14_CR17_14","doi-asserted-by":"crossref","unstructured":"Lee B, Kim H, Kim K (2001) Secure mobile agent using strong non-designated proxy signature, ACISP 2001, Springer-verlag, LNCS 2119, 474-486.","DOI":"10.1007\/3-540-47719-5_37"},{"key":"14_CR18_14","unstructured":"Lee B, Kim H, Kim K (2001) Strong proxy signature and its applications, Proc. of SCIS2001, 603-608."},{"key":"14_CR19_14","unstructured":"Loureio S, Molva R (1999) Privacy for mobile code, Proc. of Distributed Object Security Workshop OOPSLA\u201999."},{"key":"14_CR20_14","unstructured":"Merwe J, Solms SH (1997) Electronic commerce with secure intelligent trade agents, Proc. of ICICS\u201997, Y. Han et al(Eds.), LNCS 1334, Springer-Verlag, 452-462."},{"key":"14_CR21_14","unstructured":"Otomura R, Soshi M, Miyaji A (2001) On digital signature schemes for mobile agents, Proc. of SCIS2001, 851-855."},{"key":"14_CR22_14","doi-asserted-by":"crossref","unstructured":"Petersen H, Horster P (1997) Self-certified keys - concepts and applications, Proc. Communications and Multimedia Security\u201997, Chapman & Hall, 102-116.","DOI":"10.1007\/978-0-387-35256-5_8"},{"key":"14_CR23_14","doi-asserted-by":"crossref","unstructured":"Sander T, Tschudin CF (1997) Protecting mobile agents against malicious hosts, Mobile Agent Security, LNCS 1419, Springer-Verlag, 44-60.","DOI":"10.1007\/3-540-68671-1_4"},{"key":"14_CR24_14","unstructured":"Singelee D, Prehneel B (2004) Secure e-commerce using mobile agents on un-trusted hosts, COSIC Internal Report."},{"key":"14_CR25_14","volume-title":"Handbook of applied cryptog-raphy","author":"A Menezes","year":"1997","unstructured":"Menezes A, Oorschot PCV, Vanstone SA (1997) Handbook of applied cryptog-raphy, CRC Press, Boca Raton."},{"issue":"3","key":"14_CR26_14","doi-asserted-by":"crossref","first-page":"249","DOI":"10.3233\/JCS-1997-5306","volume":"5","author":"M Rscheisen","year":"1997","unstructured":"Rscheisen M, Winograd T (1997) A network-centric design for relationship-based security and access control, Journal of Computer Security, 5(3): 249-254.","journal-title":"Journal of Computer Security"},{"key":"14_CR27_14","unstructured":"The digital signature standard, NIST, 1994."},{"key":"14_CR28_14","unstructured":"Whitman ME, Mattord HJ (2005) Principles of inforamtion security, Second Edition, Thomson Course Technology."},{"issue":"4","key":"14_CR29_14","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/S0920-5489(03)00008-4","volume":"25","author":"CL Li","year":"2003","unstructured":"Li CL, Li LY (2003) Integrate software agents and CORBA in computational grid, Computer Standards & Interfaces, 25(4): 357-371.","journal-title":"Computer Standards & Interfaces"},{"issue":"3","key":"14_CR30_14","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/S0920-5489(02)00097-1","volume":"25","author":"P Paderewski-Rodrguez","year":"2003","unstructured":"Paderewski-Rodrguez P, Rodrguez-Fortiz MJ, Parets-Llorca J (2003) An ar-chitecture for dynamic and evolving cooperative software agents, Computer Standards & Interfaces, 25(3): 261-269.","journal-title":"Computer Standards & Interfaces"},{"key":"14_CR31_14","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/978-3-642-60018-0_22","volume-title":"Intelligent Information Agents:Agent-Based Information Discovery and Management on the Internet","author":"CF Tschudin","year":"1999","unstructured":"Tschudin CF (1999) Mobile agent security, In Intelligent Information Agents:Agent-Based Information Discovery and Management on the Internet, M. Klusch, Ed., Springer-Verlag, New York, Chapter 18, 431-446."}],"container-title":["Studies in Computational Intelligence","E-Service Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-37017-8_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,14]],"date-time":"2025-01-14T17:19:26Z","timestamp":1736875166000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-37017-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540370154","9783540370178"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-37017-8_14","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2007]]}}}