{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T15:21:35Z","timestamp":1720624895487},"reference-count":8,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2002,5,1]],"date-time":"2002-05-01T00:00:00Z","timestamp":1020211200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":4107,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronic Notes in Theoretical Computer Science"],"published-print":{"date-parts":[[2002,5]]},"DOI":"10.1016\/s1571-0661(04)80335-9","type":"journal-article","created":{"date-parts":[[2004,9,28]],"date-time":"2004-09-28T15:29:25Z","timestamp":1096385365000},"page":"29-40","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts"],"prefix":"10.1016","volume":"63","author":[{"given":"Jes\u00fas Arturo P\u00e9rez","family":"D\u00edaz","sequence":"first","affiliation":[]},{"given":"Dar\u00edo \u00c1lvarez","family":"Guti\u00e9rrez","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1571-0661(04)80335-9_NEWBIB1","unstructured":"P\u00e9rez D\u00edaz, J.A., and D. \u00c1lvarez Guti\u00e9rrez, Sahara: a comprehensive security architecture for mobile agents systems, Simposio Espaol de Informtica Distribuida, Orense, Spain. ISBN: 84\ue4f88158\ue4f8163\ue4f81."},{"key":"10.1016\/S1571-0661(04)80335-9_NEWBIB2","unstructured":"P\u00e9rez D\u00edaz, J.A., D. \u00c1lvarez Guti\u00e9rrez, and J.M. Cueva Lovelle, An implementation of a secure Java2-based mobile agent system, The Fifth International Conference on The Practical Application of Intelligent Agents and Multi-Agent Technology (PAAM 2000), Manchester, U.K. ISBN: 1\ue4f8902426\ue4f807-X."},{"key":"10.1016\/S1571-0661(04)80335-9_NEWBIB3","unstructured":"Fraunhofer IGD. Project, http:\/\/www.informatik.uni-stuttgart.de\/ipvr\/vs\/projekte\/mole\/mal\/preview\/SeMoA-(Secure-Mobile-Agents).9656.txt.htm."},{"key":"10.1016\/S1571-0661(04)80335-9_NEWBIB4","doi-asserted-by":"crossref","unstructured":"Wilhelm Uwe G., and S. Staamann, Protecting the Itinerary of Mobile Agents, Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems, Belgium, 1998.","DOI":"10.1007\/3-540-49255-0_79"},{"key":"10.1016\/S1571-0661(04)80335-9_NEWBIB5","series-title":"An approach to solve the problem of malicious hosts in mobile agent systems","author":"Hohl","year":"1997"},{"key":"10.1016\/S1571-0661(04)80335-9_NEWBIB6","series-title":"Protecting Mobile Agents against Malicious Host","author":"Sander","year":"1998"},{"key":"10.1016\/S1571-0661(04)80335-9_NEWBIB7","unstructured":"Sander T., and C. Tshudin, Towards Mobile Cryptography, International Computer Science Institute (ICSI), Technical Report, 97(049):1\u201314, November, 1997."},{"key":"10.1016\/S1571-0661(04)80335-9_NEWBIB8","unstructured":"Feigenbaum J., and Peter Lee, Trust Management and Proof carriying code in Secure Mobile-Code Applications, DARPA Workshop on Foundations for Secure Mobile Code Workshop, March, 1997."}],"container-title":["Electronic Notes in Theoretical Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104803359?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1571066104803359?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,3]],"date-time":"2019-02-03T07:22:55Z","timestamp":1549178575000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1571066104803359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,5]]},"references-count":8,"alternative-id":["S1571066104803359"],"URL":"https:\/\/doi.org\/10.1016\/s1571-0661(04)80335-9","relation":{},"ISSN":["1571-0661"],"issn-type":[{"value":"1571-0661","type":"print"}],"subject":[],"published":{"date-parts":[[2002,5]]}}}