{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:14:31Z","timestamp":1725574471759},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540405504"},{"type":"electronic","value":"9783540450801"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45080-1_12","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T04:54:03Z","timestamp":1294376043000},"page":"89-93","source":"Crossref","is-referenced-by-count":0,"title":["An Enhanced Security Model for Mobile Agent System"],"prefix":"10.1007","author":[{"given":"Li","family":"Feng","sequence":"first","affiliation":[]},{"given":"Feng","family":"Shan","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Ying","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/BFb0052350","volume-title":"Fast Software Encryption","author":"A. Young","year":"1997","unstructured":"Young, A., Yung, M.: Sliding Encryption:A Cryptographic Tool for Mobile Agents. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 230\u2013241. Springer, Heidelberg (1997)"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","volume-title":"Mobile Agents and Security","author":"T. Sander","year":"1998","unstructured":"Sander, T., Tschudin, C.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 44\u201360. Springer, Heidelberg (1998)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-68671-1_6","volume-title":"Mobile Agents and Security","author":"F. Hohl","year":"1998","unstructured":"Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 92\u2013113. Springer, Heidelberg (1998)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Helmer, G.: Intelligent agents for intrusion detection. In: Proceedings of IEEE Information Technology Conference, pp. 121\u2013124 (1998)","DOI":"10.1109\/IT.1998.713396"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45080-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T09:13:08Z","timestamp":1553332388000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45080-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540405504","9783540450801"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45080-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}