{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T20:40:48Z","timestamp":1717879248438},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,5,3]],"date-time":"2015-05-03T00:00:00Z","timestamp":1430611200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s11277-015-2604-y","type":"journal-article","created":{"date-parts":[[2015,5,2]],"date-time":"2015-05-02T11:01:07Z","timestamp":1430564467000},"page":"207-230","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks"],"prefix":"10.1007","volume":"84","author":[{"given":"Vanga","family":"Odelu","sequence":"first","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,3]]},"reference":[{"issue":"2","key":"2604_CR1","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1007\/s11277-012-0712-5","volume":"70","author":"A Zakerolhosseini","year":"2013","unstructured":"Zakerolhosseini, A., & Nikooghadam, M. (2013). Secure transmission of mobile agent in dynamic distributed environments. Wireless Personal Communications, 70(2), 641\u2013656.","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"2604_CR2","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1016\/j.csi.2003.11.010","volume":"26","author":"IC Lin","year":"2004","unstructured":"Lin, I. C., Ou, H. H., & Hwang, M. S. (2004). Efficient access control and key management schemes for mobile agents. Computer Standards & Interfaces, 26(5), 423\u2013433.","journal-title":"Computer Standards & Interfaces"},{"issue":"22","key":"2604_CR3","doi-asserted-by":"crossref","first-page":"3347","DOI":"10.1016\/j.ins.2006.01.005","volume":"176","author":"JW Baek","year":"2006","unstructured":"Baek, J. W., & Yeom, H. Y. (2006). A timed mobile agent planning approach for distributed information retrieval in dynamic network environments. Information sciences, 176(22), 3347\u20133378.","journal-title":"Information sciences"},{"issue":"3","key":"2604_CR4","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/295685.298136","volume":"42","author":"DB Lange","year":"1999","unstructured":"Lange, D. B., & Oshima, M. (1999). Seven good reasons for mobile agents. Communications of the ACM, 42(3), 88\u201389.","journal-title":"Communications of the ACM"},{"issue":"12","key":"2604_CR5","doi-asserted-by":"crossref","first-page":"2308","DOI":"10.1016\/j.comcom.2006.03.005","volume":"29","author":"O Esparza","year":"2006","unstructured":"Esparza, O., Mu\u00f1oz, J. L., Soriano, M., & Forn\u00e9, J. (2006). Secure brokerage mechanisms for mobile electronic commerce. Computer Communications, 29(12), 2308\u20132321.","journal-title":"Computer Communications"},{"issue":"8","key":"2604_CR6","doi-asserted-by":"crossref","first-page":"9900","DOI":"10.1016\/j.eswa.2011.02.039","volume":"38","author":"YF Chung","year":"2011","unstructured":"Chung, Y. F., Chen, Y. T., Chen, T. L., & Chen, T. S. (2011). An agent-based english auction protocol using elliptic curve cryptosystem for mobile commerce. Expert Systems with Applications, 38(8), 9900\u20139907.","journal-title":"Expert Systems with Applications"},{"issue":"480","key":"2604_CR7","doi-asserted-by":"crossref","first-page":"354","DOI":"10.2307\/3619777","volume":"77","author":"RWD Nickalls","year":"1993","unstructured":"Nickalls, R. W. D. (1993). A new approach to solving the cubic: Cardan\u2019s solution revealed. The Mathematical Gazette, 77(480), 354\u2013359.","journal-title":"The Mathematical Gazette"},{"key":"2604_CR8","volume-title":"Cryptography and network security, principles and practices, 2003","author":"W Stallings","year":"2003","unstructured":"Stallings, W. (2003). Cryptography and network security, principles and practices, 2003 (3rd ed.). India: Pearson Education.","edition":"3"},{"key":"2604_CR9","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"AK Das","year":"2012","unstructured":"Das, A. K., Paul, N. R., & Tripathy, L. (2012). Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences, 209, 80\u201392.","journal-title":"Information Sciences"},{"issue":"5","key":"2604_CR10","doi-asserted-by":"crossref","first-page":"2007","DOI":"10.1109\/TIT.2008.920224","volume":"54","author":"R Dutta","year":"2008","unstructured":"Dutta, R., & Barua, R. (2008). Provably secure constant round contributory group key agreement in dynamic setting. IEEE Transactions on Information Theory, 54(5), 2007\u20132025.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"2604_CR11","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/1880022.1880027","volume":"13","author":"P Sarkar","year":"2010","unstructured":"Sarkar, P. (2010). A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security (TISSEC), 13(4), 33.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"2","key":"2604_CR12","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s10623-005-6344-y","volume":"38","author":"DR Stinson","year":"2006","unstructured":"Stinson, D. R. (2006). Some observations on the theory of cryptographic hash functions. Designs, Codes and Cryptography, 38(2), 259\u2013277.","journal-title":"Designs, Codes and Cryptography"},{"key":"2604_CR13","unstructured":"National Institute of Standards FIPS PUB 197 and Technology (NIST). Advanced encryption standard. U.S. Department of Commerce, November 2001. Accessed Nov, 2010 from http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197"},{"key":"2604_CR14","unstructured":"Bellare, M., Boldyreva, A., & Micali, S. (2000). Public-key encryption in a multi-user setting: Security proofs and improvements. In International conference on the theory and application of cryptographic techniques, advances in Cryptology-EUROCRYPT 2000 (pp. 259\u2013274). Bruges: Springer."},{"key":"2604_CR15","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.ins.2013.10.022","volume":"269","author":"V Odelu","year":"2014","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2014). A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Information Sciences, 269, 270\u2013285.","journal-title":"Information Sciences"},{"issue":"4","key":"2604_CR16","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1016\/S0097-8493(98)00035-1","volume":"22","author":"V Roth","year":"1998","unstructured":"Roth, V., & Mehrdad, J. S. (1998). Access control and key management for mobile agents. Computers & Graphics, 22(4), 457\u2013461.","journal-title":"Computers & Graphics"},{"issue":"1","key":"2604_CR17","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1002\/wcm.276","volume":"6","author":"CC Chang","year":"2006","unstructured":"Chang, C. C., & Lin, I. C. (2006). A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing, 6(1), 137\u2013146.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"2604_CR18","doi-asserted-by":"crossref","unstructured":"Saxena, N., Tsudik, G., & Yi, J. H. (2004). Access control in ad hoc groups. In International workshop on hot topics in peer-to-peer systems (HOT-P2P 2004) (pp. 2\u20137). Volendam: IEEE.","DOI":"10.1109\/PTPSYS.2004.2"},{"issue":"6","key":"2604_CR19","doi-asserted-by":"crossref","first-page":"3839","DOI":"10.1007\/s10916-012-9857-8","volume":"36","author":"M Nikooghadam","year":"2012","unstructured":"Nikooghadam, M., & Zakerolhosseini, A. (2012). Secure communication of medical information using mobile agents. Journal of Medical Systems, 36(6), 3839\u20133850.","journal-title":"Journal of Medical Systems"},{"key":"2604_CR20","doi-asserted-by":"crossref","first-page":"1432","DOI":"10.1016\/j.proeng.2012.06.177","volume":"38","author":"P Vijayakumar","year":"2012","unstructured":"Vijayakumar, P., Anand, K., Bose, S., Maheswari, V., Kowsalya, R., & Kannan, A. (2012). Hierarchical key management scheme for securing mobile agents with optimal computation time. Procedia Engineering, 38, 1432\u20131443.","journal-title":"Procedia Engineering"},{"issue":"3","key":"2604_CR21","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/j.csi.2013.10.006","volume":"36","author":"CH Hsu","year":"2014","unstructured":"Hsu, C. H., & Lin, Y. L. (2014). Improved migration for mobile computing in distributed networks. Computer Standards & Interfaces, 36(3), 577\u2013584.","journal-title":"Computer Standards & Interfaces"},{"issue":"1","key":"2604_CR22","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.csi.2007.10.011","volume":"31","author":"KH Huang","year":"2009","unstructured":"Huang, K. H., Chung, Y. F., Liu, C. H., Lai, F., & Chen, T. S. (2009). Efficient migration for mobile computing in distributed networks. Computer Standards & Interfaces, 31(1), 40\u201347.","journal-title":"Computer Standards & Interfaces"},{"issue":"7","key":"2604_CR23","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TC.2004.31","volume":"53","author":"Y Kim","year":"2004","unstructured":"Kim, Y., Perrig, A., & Tsudik, G. (2004). Group key agreement efficient in communication. IEEE Transactions on Computers, 53(7), 905\u2013921.","journal-title":"IEEE Transactions on Computers"},{"key":"2604_CR24","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2013). Lhsc: An effective dynamic key management scheme for linear hierarchical access control. In 5th international conference on communication systems and networks (COMSNETS 2013) (pp. 1\u20139). Bangalore: IEEE."},{"issue":"1","key":"2604_CR25","doi-asserted-by":"crossref","first-page":"42","DOI":"10.6029\/smartcr.2013.01.005","volume":"3","author":"V Odelu","year":"2013","unstructured":"Odelu, V., Das, A. K., & Goswami, A. (2013). A new key management scheme for a user hierarchy based on a hybrid cryptosystem. SmartCR, 3(1), 42\u201354.","journal-title":"SmartCR"},{"issue":"4","key":"2604_CR26","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"TA ElGamal","year":"1985","unstructured":"ElGamal, T. A. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469\u2013472.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"24","key":"2604_CR27","doi-asserted-by":"crossref","first-page":"2025","DOI":"10.1049\/el:19941398","volume":"30","author":"L Harn","year":"1994","unstructured":"Harn, L., & Xu, Y. (1994). Design of generalised elgamal type digital signature schemes based on discrete logarithm. Electronics Letters, 30(24), 2025\u20132026.","journal-title":"Electronics Letters"},{"issue":"4","key":"2604_CR28","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1002\/nem.739","volume":"20","author":"YH Chuang","year":"2010","unstructured":"Chuang, Y. H., & Tseng, Y. M. (2010). An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management, 20(4), 167\u2013180.","journal-title":"International Journal of Network Management"},{"key":"2604_CR29","volume-title":"Department of commerce","author":"SH Standard","year":"1995","unstructured":"Standard, S. H. (1995). Department of commerce. VA: NIST, National Technical Information Service, Springfield."},{"issue":"10","key":"2604_CR30","doi-asserted-by":"crossref","first-page":"1917","DOI":"10.1016\/j.jss.2010.05.072","volume":"83","author":"M Nikooghadam","year":"2010","unstructured":"Nikooghadam, M., Zakerolhosseini, A., & Moghaddam, M. E. (2010). Efficient utilization of elliptic curve cryptosystem for hierarchical access control. Journal of Systems and Software, 83(10), 1917\u20131929.","journal-title":"Journal of Systems and Software"},{"issue":"1","key":"2604_CR31","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MWC.2004.1269719","volume":"11","author":"K Lauter","year":"2004","unstructured":"Lauter, K. (2004). The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications, 11(1), 62\u201367.","journal-title":"IEEE Wireless Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2604-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2604-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2604-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T19:28:58Z","timestamp":1717874938000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2604-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,3]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["2604"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2604-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,3]]}}}