{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T06:13:40Z","timestamp":1741068820270,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642198748"},{"type":"electronic","value":"9783642198755"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19875-5_14","type":"book-chapter","created":{"date-parts":[[2011,3,11]],"date-time":"2011-03-11T12:29:03Z","timestamp":1299846543000},"page":"109-112","source":"Crossref","is-referenced-by-count":0,"title":["Securing Mobile Agents via Combining Encrypted Functions"],"prefix":"10.1007","author":[{"given":"Hamed","family":"Aouadi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"unstructured":"Hohl, F.: An approach to solve the problem of malicious hosts, retrieved from http:\/\/www.informatik.uni-stuttgart.de","key":"14_CR1"},{"unstructured":"Wilhelm, U.G.: A Technical Approach To Privacy Based On Mobile Agents Protected By Tamper-Resistant Hardware. PhD thesis, Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne (1999)","key":"14_CR2"},{"doi-asserted-by":"crossref","unstructured":"Ma\u00f1a, A., Pimentel, E.: An efficient software protection scheme. University of M\u00e1laga, Spain (2002)","key":"14_CR3","DOI":"10.1007\/0-306-46998-7_27"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-68671-1_6","volume-title":"Mobile Agents and Security","author":"F. Hohl","year":"1998","unstructured":"Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 92\u2013113. Springer, Heidelberg (1998)"},{"doi-asserted-by":"crossref","unstructured":"Sander, T., Tshudin, C.: Towards mobile cryptography. In: Proceeding 1998 IEEE Symposium on Security and Privacy, Oakland, California, pp. 215\u2013224 (May 1998)","key":"14_CR5","DOI":"10.1109\/SECPRI.1998.674837"},{"unstructured":"Aouadi, H.: Proposition d\u2019une Approche Hybride S\u00e9curisant les Agents Mobiles, Th\u00e8se de doctorat en informatique, universit\u00e9 de la Manouba, Tunisie (October 2009)","key":"14_CR6"},{"issue":"7","key":"14_CR7","first-page":"216","volume":"6","author":"H. Aouadi","year":"2006","unstructured":"Aouadi, H., Ahmed, M.B.: Security enhancements for mobile agents platforms. International Journal of Computer Science and Network Security (IJCSNS)\u00a06(7), 216\u2013221 (2006)","journal-title":"International Journal of Computer Science and Network Security (IJCSNS)"}],"container-title":["Advances in Intelligent and Soft Computing","Advances on Practical Applications of Agents and Multiagent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19875-5_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T03:46:57Z","timestamp":1741060017000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19875-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642198748","9783642198755"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19875-5_14","relation":{},"ISSN":["1867-5662","1867-5670"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1867-5670"}],"subject":[],"published":{"date-parts":[[2011]]}}}