{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:55:56Z","timestamp":1725562556850},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_22","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"284-297","source":"Crossref","is-referenced-by-count":2,"title":["In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Mu\u00f1oz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Antonio","family":"Ma\u00f1a","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pablo","family":"Ant\u00f3n","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Trusted computing group: Tcg specifications (2005), https:\/\/www.trustedcomputinggroup.org\/specs\/"},{"key":"22_CR2","unstructured":"Carl, A.G., Homeier, P., Nettles, S.: Infrastructure for proof-referencing code. In: Proceedings Workshop on Foundations of Secure Mobile Code (1997)"},{"key":"22_CR3","unstructured":"Collberg, C.S., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. University of Auckland Technical Report 170 (2000)"},{"key":"22_CR4","unstructured":"Harrison, C., Chess, D., Kershenbaum, A.: Mobile agents: Are they a good idea?. IBM Research Report (1995)"},{"key":"22_CR5","unstructured":"Karnik, N.: Security in Mobile Agents systems. PhD thesis, Department of Computer Science, University of Minnesota (1998)"},{"key":"22_CR6","unstructured":"Ma\u00f1a, A.: Protecci\u00f3n de Software Basada en Tarjetas Inteligentes. PhD thesis, University of Malaga (2003)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1007\/978-3-540-73549-6_117","volume-title":"Ubiquitous Intelligence and Computing","author":"A. Ma\u00f1a","year":"2007","unstructured":"Ma\u00f1a, A., Mu\u00f1oz, A., Serrano, D.: Towards secure agent computing for ubiquitous computing and ambient intelligence. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol.\u00a04611, pp. 1201\u20131212. Springer, Heidelberg (2007)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Necula, G.: Proof-carrying code. In: Proceedings of 24th Annual Symposium on Principles of Programming Languages (1997)","DOI":"10.1145\/263699.263712"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient software-based fault isolation. In: Proceedings of the 14th ACM Symposium on Operating Systems Principles, pp. 203\u2013216 (1993)","DOI":"10.1145\/168619.168635"},{"key":"22_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48749-2_13","volume-title":"Secure Internet Programming","author":"V. Roth","year":"1999","unstructured":"Roth, V.: Mutual protection of cooperating agents. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol.\u00a01603. Springer, Heidelberg (1999)"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","first-page":"368","volume-title":"Languages and Compilers for Parallel Computing","author":"J. Stern","year":"1994","unstructured":"Stern, J., Hachez, G., Koeune, F., Quisquater, J.J.: Robust object watermarking: Application to code. In: Banerjee, U., Gelernter, D., Nicolau, A., Padua, D.A. (eds.) LCPC 1993. LNCS, vol.\u00a0768, pp. 368\u2013378. Springer, Heidelberg (1994)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Yee, S.B.: A sanctuary for mobile agents. In: Secure Internet Programming (1999)","DOI":"10.1007\/3-540-48749-2_12"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-540-45069-6_23","volume-title":"Computer Aided Verification","author":"L. Bozga","year":"2003","unstructured":"Bozga, L., Lakhnech, Y., Perin, M.: Hermes, a tool verifying secrecy properties of unbounded security protocols. In: Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol.\u00a02725, pp. 219\u2013222. Springer, Heidelberg (2003)"},{"key":"22_CR14","unstructured":"Foundation for Intelligent Physical Agents: FIPA Abstract Architecture Specification (2002), http:\/\/www.fipa.org\/specs\/fipa00001"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Mu\u00f1oz, A., Ma\u00f1a, A., Harjani, R., Montenegro, M.: Agent Protection based on the use of cryptographic hardware. In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009 to be held in Seattle,Washington, July 20-July 24, IEEE, Los Alamitos (2009)","DOI":"10.1109\/COMPSAC.2009.152"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:35Z","timestamp":1606186595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}