{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:49Z","timestamp":1725562609484},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_21","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T05:14:43Z","timestamp":1281503683000},"page":"270-283","source":"Crossref","is-referenced-by-count":1,"title":["Secure Multi-Agent System for Multi-Hop Environments"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Kraxberger","sequence":"first","affiliation":[]},{"given":"Peter","family":"Danner","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Hein","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1145\/544741.544843","volume-title":"AAMAS 2002: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems","author":"H. Dyke Parunak van","year":"2002","unstructured":"van Dyke Parunak, H., Brueckner, S., Sauter, J.: Digital pheromone mechanisms for coordination of unmanned vehicles. In: AAMAS 2002: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 449\u2013450. ACM, New York (2002)"},{"issue":"1","key":"21_CR2","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MIS.2005.13","volume":"20","author":"F.P. Maturana","year":"2005","unstructured":"Maturana, F.P., Staron, R.J., Hall, K.H.: Methodologies and tools for intelligent agents in distributed control. IEEE Intelligent Systems\u00a020(1), 42\u201349 (2005)","journal-title":"IEEE Intelligent Systems"},{"key":"21_CR3","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/11734697_3","volume-title":"Engineering Self-Organising Systems","author":"G. Picard","year":"2006","unstructured":"Picard, G., Bernon, C., Gleizes, M.P.: Etto: Emergent timetabling by cooperative self-organization. In: Brueckner, S.A., Di Marzo Serugendo, G., Hales, D., Zambonelli, F. (eds.) ESOA 2005. LNCS (LNAI), vol.\u00a03910, pp. 31\u201345. Springer, Heidelberg (2006)"},{"unstructured":"George, J.P., Gleizes, M.P., Glize, P., Regis, C.: Real-time simulation for flood forecast: an adaptive multi-agent system staff. In: AISB 2003: Proceedings of the 3rd Symposium on Adaptive Agents and Multi-Agent Systems, pp. 7\u201311 (2003)","key":"21_CR4"},{"unstructured":"Schurr, N., Marecki, J., Tambe, M., Scerri, P.: The future of disaster response: Humans working with multiagent teams using defacto. In: AAAI Spring Symposium on AI Technologies for Homeland Security (2005)","key":"21_CR5"},{"issue":"17","key":"21_CR6","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1016\/S0140-3664(00)00253-X","volume":"23","author":"W.A. Jansen","year":"2000","unstructured":"Jansen, W.A.: Countermeasures for mobile agent security. Computer Communications\u00a023(17), 1667\u20131676 (2000)","journal-title":"Computer Communications"},{"doi-asserted-by":"crossref","unstructured":"Wallach, D.S.: A survey of peer-to-peer security issues. In: International Symposium on Software Security, pp. 42\u201357 (2002)","key":"21_CR7","DOI":"10.1007\/3-540-36532-X_4"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/PTP.2004.1334954","volume-title":"P2P 2004: Proceedings of the Fourth International Conference on Peer-to-Peer Computing","author":"S. Campadello","year":"2004","unstructured":"Campadello, S.: Peer-to-peer security in mobile devices: A user perspective. In: P2P 2004: Proceedings of the Fourth International Conference on Peer-to-Peer Computing, pp. 252\u2013257. IEEE Computer Society, Los Alamitos (2004)"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/11827405_39","volume-title":"Database and Expert Systems Applications","author":"A. Mondal","year":"2006","unstructured":"Mondal, A., Kitsuregawa, M.: Privacy, security and trust in p2p environments: A perspective. In: Bressan, S., K\u00fcng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol.\u00a04080, pp. 682\u2013686. Springer, Heidelberg (2006)"},{"unstructured":"Lundberg, J.: Routing security in ad hoc networks. Technical Report 501, Helsinki University of Technology (2000)","key":"21_CR10"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"},{"key":"21_CR12","first-page":"1976","volume-title":"INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies","author":"Y.C. Hu","year":"2003","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a03, pp. 1976\u20131986. IEEE, Los Alamitos (2003)"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/586110.586117","volume-title":"CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41\u201347. ACM, New York (2002)"},{"issue":"1","key":"21_CR14","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1504\/IJBPIM.2005.006962","volume":"1","author":"K. Aberer","year":"2005","unstructured":"Aberer, K., Datta, A., Hauswirth, M.: A decentralized public key infrastructure for customer-to-customer e-commerce. International Journal of Business Process Integration and Management\u00a01(1), 26\u201333 (2005)","journal-title":"International Journal of Business Process Integration and Management"},{"doi-asserted-by":"crossref","unstructured":"Lesueur, F., Me, L., Tong, V.: An efficient distributed PKI for structured P2P networks. In: P2P 2009. IEEE Ninth International Conference on Peer-to-Peer Computing, September 2009, pp. 1\u201310 (2009)","key":"21_CR15","DOI":"10.1109\/P2P.2009.5284491"},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1109\/ICN.2008.124","volume-title":"ICN 2008: Proceedings of the Seventh International Conference on Networking","author":"T. Cholez","year":"2008","unstructured":"Cholez, T., Chrisment, I., Festor, O.: A distributed and adaptive revocation mechanism for p2p networks. In: ICN 2008: Proceedings of the Seventh International Conference on Networking, pp. 290\u2013295. IEEE Computer Society, Los Alamitos (2008)"},{"key":"21_CR17","first-page":"931","volume-title":"IWCMC 2009: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing","author":"S. Kraxberger","year":"2009","unstructured":"Kraxberger, S., Payer, U.: Security concept for peer-to-peer systems. In: IWCMC 2009: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pp. 931\u2013936. ACM, New York (2009)"},{"issue":"1","key":"21_CR18","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11276-006-3723-x","volume":"13","author":"R. Poovendran","year":"2007","unstructured":"Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wirel. Netw.\u00a013(1), 27\u201359 (2007)","journal-title":"Wirel. Netw."},{"unstructured":"JADE Board: Jade security add-on guide. Technical report, TILAB S.p.A (2005)","key":"21_CR19"},{"issue":"5","key":"21_CR20","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1016\/j.cose.2006.12.003","volume":"26","author":"X. Vila","year":"2007","unstructured":"Vila, X., Schuster, A., Riera, A.: Security for a multi-agent system based on jade. Computers and Security\u00a026(5), 391\u2013400 (2007)","journal-title":"Computers and Security"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:56:34Z","timestamp":1606168594000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}