{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:21:24Z","timestamp":1743139284986,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811566332"},{"type":"electronic","value":"9789811566349"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-6634-9_13","type":"book-chapter","created":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T14:27:09Z","timestamp":1594996029000},"page":"129-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing Mobile Agents Migration Using Tree Parity Machine with New Tiny Encryption Algorithm"],"prefix":"10.1007","author":[{"given":"Pradeep","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Niraj","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"K. M.","family":"Chaitra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ahila, S.S., Shunmuganathan, K.L.: Overview of mobile agent security issues. In: International Conference on Information Communication and Embedded Systems, pp. 1\u20136. S. A. Engineering College, Chennai (2014)","key":"13_CR1","DOI":"10.1109\/ICICES.2014.7033808"},{"issue":"7","key":"13_CR3","first-page":"6","volume":"136","author":"S Dhingra","year":"2016","unstructured":"Dhingra, S., Savalgi, A.A., Jain, S.: Laplace transformation based cryptographic technique in network security. Int. J. Comput. Appl. 136(7), 6\u201310 (2016)","journal-title":"Int. J. Comput. Appl."},{"unstructured":"Wayne, J., Tom, K.: NIST Special Publication 800-19\u2013Mobile Agent Security, pp. 1\u201352. National Institute of Standards and Technology, Computer Security Division, Gaithersburg (1999)","key":"13_CR5"},{"key":"13_CR6","first-page":"1","volume":"8","author":"MR Karim","year":"2018","unstructured":"Karim, M.R.: Security for mobile agents and platforms: securing the code and protecting its integrity. J. Inf. Technol. Softw. Eng. 8, 1\u20133 (2018)","journal-title":"J. Inf. Technol. Softw. Eng."},{"issue":"3","key":"13_CR7","first-page":"397","volume":"1","author":"P Kumar","year":"2011","unstructured":"Kumar, P., Vatsa, A.K.: Novel security architecture and mechanism for identity based information retrieval system in MANET. Int. J. Mob. Adhoc Netw. 1(3), 397\u2013404 (2011)","journal-title":"Int. J. Mob. Adhoc Netw."},{"issue":"6","key":"13_CR8","first-page":"30","volume":"2","author":"M Amit","year":"2012","unstructured":"Amit, M., Anamika, C.: Mobile agent: security issues and solution. Int. J. Comput. Technol. Electron. Eng. 2(6), 30\u201332 (2012)","journal-title":"Int. J. Comput. Technol. Electron. Eng."},{"unstructured":"Vogler, H., Kunkelmann, T., Moschgath, M.L.: An approach for mobile agent security and fault tolerance using distributed transactions. In: Proceeding of the 1997 International Conference on Parallel and Distributed Systems, Germany, pp. 268\u2013274 (1997)","key":"13_CR9"},{"issue":"9","key":"13_CR10","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225\u20136232 (2010)","journal-title":"Expert Syst. Appl."},{"key":"13_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.procs.2015.08.100","volume":"60","author":"Z Chadha","year":"2015","unstructured":"Chadha, Z., Hela, H., Khaled, G.: Security during communication in mobile agents system. Proc. Comput. Sci. 60, 17\u201326 (2015)","journal-title":"Proc. Comput. Sci."},{"issue":"1","key":"13_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13635-018-0073-z","volume":"2018","author":"J Mart\u00ednez Padilla","year":"2018","unstructured":"Mart\u00ednez Padilla, J., Meyer-Baese, U., Foo, S.: Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions. EURASIP J. Inf. Secur. 2018(1), 1\u201316 (2018). \n                  https:\/\/doi.org\/10.1186\/s13635-018-0073-z","journal-title":"EURASIP J. Inf. Secur."},{"issue":"1","key":"13_CR15","first-page":"39","volume":"2","author":"N Singhal","year":"2012","unstructured":"Singhal, N., Dixit, A., Agarwal, R.P., Sharma, A.K.: Need of securing migrating crawling agent, remote platform and the data collection. Int. J. Electron. Comput. Sci. Eng. 2(1), 39\u201345 (2012)","journal-title":"Int. J. Electron. Comput. Sci. Eng."},{"issue":"1","key":"13_CR16","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s41870-017-0065-0","volume":"10","author":"N Singhal","year":"2017","unstructured":"Singhal, N., Dixit, A., Agarwal, R.P., Sharma, A.K.: A reliability based approach for securing migrating crawlers. Int. J. Inf. Technol. 10(1), 91\u201398 (2017). \n                  https:\/\/doi.org\/10.1007\/s41870-017-0065-0","journal-title":"Int. J. Inf. Technol."},{"unstructured":"Alves-Foss, Harrison: The use of encrypted functions for mobile agent security. In: Proceedings of the 37th Hawaii International Conference on System Sciences, pp. 1\u201310 (2004)","key":"13_CR19"},{"doi-asserted-by":"publisher","unstructured":"Mukherjee, A., Deng, H., Agrawal, D.P.: Distributed pair wise key generation using shared polynomials for wireless ad hoc networks. In: Belding-Royer, E.M., Al Agha, K., Pujolle, G. (eds.) MWCN 2004. IFIPAICT, vol. 162, pp. 215\u2013226. Springer, Boston (2005). \n                  https:\/\/doi.org\/10.1007\/0-387-23150-1_19","key":"13_CR20","DOI":"10.1007\/0-387-23150-1_19"},{"unstructured":"Homood, K.: Lagrange interpolation for mobile agent connection encryption. Ibn Al-Haitham J. Pure Appl. Sci., 1\u201312 (2012)","key":"13_CR21"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Data Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-6634-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T21:04:12Z","timestamp":1595019852000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-6634-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811566332","9789811566349"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-6634-9_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICACDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Computing and Data Sciences","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Valletta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malta","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icacds2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icacds.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"354","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}