{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:24:26Z","timestamp":1743089066886,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_30","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"293-303","source":"Crossref","is-referenced-by-count":0,"title":["Experimental DRM Model Using Mobile Code and White-Box Encryption"],"prefix":"10.1007","author":[{"given":"Stefan-Vladimir","family":"Ghita","sequence":"first","affiliation":[]},{"given":"Victor-Valeriu","family":"Patriciu","sequence":"additional","affiliation":[]},{"given":"Ion","family":"Bica","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Patriviu, V., Bica, I., Togan, M., Ghita, S.: A Generalized DRM Architectural Framework. In: Advances in Electrical and Computer Engineering, pp. 43\u201348 (2011) ISSN: 1582-7445","DOI":"10.4316\/AECE.2011.01007"},{"key":"30_CR2","unstructured":"OMA-DRM 2.0, Open Mobile Alliance Digital Rights Management (2012), \n                      http:\/\/www.openmobilealliance.org"},{"key":"30_CR3","unstructured":"IETF DRM procedings Working Group, \n                      http:\/\/www.ietf.org\/\n                    , MPEG-4 IPMP-x, Specific DRM solution by the MPEG-4 (2012), \n                      http:\/\/www.mpeg.org"},{"key":"30_CR4","unstructured":"ISMA Cryp 2.0, Internet Media Streaming Alliance Encryption & Authentication Specification 2.0 (2012), \n                      http:\/\/www.isma.tv\/spec-request.html"},{"key":"30_CR5","unstructured":"Arnab, A., Hutchison, A.: A Requirement Analysis of Enterprise DRM Systems. In: ISSA, Johannesburg, South Africa (2005)"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Liu, Q., Safavi-Naini, R., Sheppard, N.P.: Digital rights management for content distribution. In: ACSW 2003, Proceedings of the First Australasian Information Security Workshop (2003)","DOI":"10.1145\/1029146.1029163"},{"key":"30_CR7","unstructured":"OMA-ODRL 2.0, Open Mobile Alliance Open Digital Rights Language, \n                      http:\/\/odrl.net\/"},{"key":"30_CR8","unstructured":"XrML 2.0, eXtensible Rights Markup Language (2012), \n                      http:\/\/www.xrml.org"},{"key":"30_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-540-30564-4_16","volume-title":"Selected Areas in Cryptography","author":"O. Billet","year":"2004","unstructured":"Billet, O., Gilbert, H., Ech-Chatbi, C.: Cryptanalysis of a White Box AES Implementation. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol.\u00a03357, pp. 227\u2013240. Springer, Heidelberg (2004)"},{"key":"30_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-540-77360-3_17","volume-title":"Selected Areas in Cryptography","author":"B. Wyseur","year":"2007","unstructured":"Wyseur, B., Michiels, W., Gorissen, P., Preneel, B.: Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.\u00a04876, pp. 264\u2013277. Springer, Heidelberg (2007)"},{"key":"30_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-642-04159-4_27","volume-title":"Selected Areas in Cryptography","author":"W. Michiels","year":"2009","unstructured":"Michiels, W., Gorissen, P., Hollmann, H.D.L.: Cryptanalysis of a Generic Class of White-Box Implementations. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol.\u00a05381, pp. 414\u2013428. Springer, Heidelberg (2009)"},{"key":"30_CR12","unstructured":"Bruce, S.: Crypto-Gram blog post, The Futility of Digital Copy Prevention (2001), \n                      http:\/\/www.schneier.com\/crypto-gram-0105.html#3"},{"key":"30_CR13","unstructured":"JADE 4.1.1, Java Agent DEvelopment Framework (2012), \n                      http:\/\/jade.tilab.com\/"},{"issue":"4","key":"30_CR14","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s11859-008-0419-3","volume":"13","author":"L. Ping","year":"2008","unstructured":"Ping, L., Zhengding, L., Fuhao, Z., Hefei, L.: A DRM System Based on Mobile Agent for Digital Rights Redistribution. Wuhan University Journal of Natural Sciences\u00a013(4), 475\u2013480 (2008), doi:10.1007\/s11859-008-0419-3","journal-title":"Wuhan University Journal of Natural Sciences"},{"key":"30_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/3-540-68671-1_6","volume-title":"Mobile Agents and Security","author":"F. Hohl","year":"1998","unstructured":"Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 92\u2013113. Springer, Heidelberg (1998)"},{"key":"30_CR16","unstructured":"Ametller, J., Robles, S., Ortega-Ruiz, J.A.: Self Protected Mobile Agents. In: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2004, NY, USA, pp. 362\u2013367 (2004) ISBN: 1-58113-864-4"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Basit, H., Pugliesi, S., Smyth, W., Turpin, A., Jarzabek, S.: Efficient Token Based Clone Detection with Flexible Tokenization. In: ESEC\/FSE, pp. 513\u2013515 (2007)","DOI":"10.1145\/1295014.1295029"},{"key":"30_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44647-8_1","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"B. Barak","year":"2001","unstructured":"Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 1\u201318. Springer, Heidelberg (2001)"},{"issue":"8","key":"30_CR19","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TSE.2002.1027797","volume":"28","author":"C.S. Collberg","year":"2002","unstructured":"Collberg, C.S., Thomborson, C.: Watermarking, tamper-proffing, and obfuscation: tools for software protection. IEEE Transactions on Software Engineering\u00a028(8), 735\u2013746 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"1","key":"30_CR20","first-page":"83","volume":"1","author":"S. Armoogum","year":"2011","unstructured":"Armoogum, S., Asvin, C.: Obfuscation Techniques for Mobile Agent code confidentiality. Journal of Information & Systems Management\u00a01(1), 83\u201394 (2011) ISSN: 0976-2930","journal-title":"Journal of Information & Systems Management"},{"key":"30_CR21","unstructured":"DashO Java Obfuscator (2012), \n                      http:\/\/www.preemptive.com\/products\/dasho\/"},{"key":"30_CR22","unstructured":"KlassMaster Java Obfuscator (2012), \n                      http:\/\/www.zelix.com\/klassmaster\/"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T00:44:01Z","timestamp":1674521041000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_30","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}