{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T00:03:05Z","timestamp":1752537785026,"version":"3.41.2"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2000,10,1]],"date-time":"2000-10-01T00:00:00Z","timestamp":970358400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,10,1]],"date-time":"2000-10-01T00:00:00Z","timestamp":970358400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Distributed and Parallel Databases"],"published-print":{"date-parts":[[2000,10]]},"DOI":"10.1023\/a:1008733722279","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T11:37:32Z","timestamp":1040557052000},"page":"447-470","source":"Crossref","is-referenced-by-count":3,"title":["Secure Electronic Payments Based on Mobile Agents"],"prefix":"10.1007","volume":"8","author":[{"given":"Artur","family":"Rom\u00e3o","sequence":"first","affiliation":[]},{"given":"Miguel Mira","family":"Da Silva","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Silva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"270347_CR1","unstructured":"A. Chavez and P. Maes, \u201cKasbah: An agent marketplace for buying and selling goods, \u201d in Proceedings of the First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, London, UK, April 1996."},{"key":"270347_CR2","unstructured":"D. Chess, C. Harrison, and A. Kershenbaum, \u201cMobile agents: Are they a good idea?\u201d In [20]."},{"key":"270347_CR3","doi-asserted-by":"crossref","unstructured":"L. Gong, \u201cSecure java class loading, \u201d IEEE Internet Computing, vol. 2, no. 6, 1998.","DOI":"10.1109\/4236.735987"},{"key":"270347_CR4","unstructured":"F. Griffel, T. Tu, M. Mira da Silva, and M. Merz, \u201cElectronic contract negotiation as an application niche for mobile agents, \u201d in Proceedings of the First International Enterprise Distributed Object ComputingWorkshop, Queensland, Australia, Oct. 1997."},{"key":"270347_CR5","unstructured":"L. Hurst, \u201cMCK: Mobile communications kernel, \u201d in Daghstuhl Seminar on Mobile Software Agents, Daghstuhl, Germany, Oct. 1997."},{"key":"270347_CR6","unstructured":"International Telecommunications Union, Information Technology-Open Systems Interconnection-The Directory: Authentication Framework, 1993."},{"key":"270347_CR7","unstructured":"Iridium LLC, The Iridium System, http:\/\/www.iridium.com\/."},{"key":"270347_CR8","series-title":"Technical Report TR CS-97\u201303","volume-title":"A proposal for a new KQML specification","author":"Y. Labrou","year":"1997","unstructured":"Y. Labrou and T. Finnin, \u201cA proposal for a new KQML specification, \u201d Technical Report TR CS-97\u201303, Computer Science and Electrical Engineering Department, University of Maryland Baltimore County, Baltimore, USA, 1997."},{"key":"270347_CR9","doi-asserted-by":"crossref","unstructured":"G. Necula and P. Lee, \u201cSafe, untrusted agents using proof-carrying code, \u201d in Mobile Agents and Security, G. Vigna (Ed.), Springer-Verlag, 1997.","DOI":"10.1007\/3-540-68671-1_5"},{"key":"270347_CR10","unstructured":"ObjectSpace, Inc., Voyager Core Package Overview, 1997."},{"key":"270347_CR11","unstructured":"J. Ordille, \u201cWhen Agenst Roam, Who Can You Trust?\u201d in Proceedings of the First Conference on Emerging Technologies and Applications in Communications, Portland, USA, May 1996."},{"key":"270347_CR12","unstructured":"Rational Software Corp., UML\u2014Unified Modeling Language, Version 1.0, 1997."},{"key":"270347_CR13","doi-asserted-by":"crossref","unstructured":"K. Rothermel and R. Popescu-Zeletin, Mobile Agents, Springer, 1997. Lecture Notes in Computer Science 1219.","DOI":"10.1007\/3-540-62803-7"},{"key":"270347_CR14","doi-asserted-by":"crossref","unstructured":"T. Sander and C. Tschudin, \u201cProtecting mobile agents against malicious hosts, \u201d in Mobile Agents and Security, G. Vigna (Ed.), Springer-Verlag, 1997.","DOI":"10.1007\/3-540-68671-1_4"},{"key":"270347_CR15","unstructured":"A. Silva, M. Mira da Silva, and J. Delgado, \u201cAgentSpace: A framework for developing agent programming systems, \u201d in Proceedings of the Fourth International Conference on Intelligence in Services and Networks, Cernobbio, Italy, May 1997."},{"key":"270347_CR16","unstructured":"A. Silva, M. Mira da Silva, and J. Delgado, \u201cImproving current agent support systems: Focus on the agent execution system, \u201d in Java Mobile Agents Workshop of the OOPSLA'97, Atlanta, USA, Oct. 1997."},{"key":"270347_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of the Second International Workshop on Mobile Agents","author":"A. Silva","year":"1998","unstructured":"A. Silva, M. Mira da Silva, and J. Delgado, \u201cAn overview of AgentSpace: A next-generation mobile agent system, \u201d in Proceedings of the Second International Workshop on Mobile Agents, Stuttgart, Germany, Oct. 1998. Lecture Notes in Computer Science 1477, Springer."},{"key":"270347_CR18","unstructured":"The COSMOS Consortium, \u201cCOSMOS-Common open service markets for SMEs, \u201d Esprit Research Project no. 26,850. http:\/\/www.ponton-hamburg.de\/cosmos\/."},{"key":"270347_CR19","unstructured":"VISA International and MasterCard International, Secure Electronic Transaction (SET) Specification, Version 1.0, 1997."},{"key":"270347_CR20","doi-asserted-by":"crossref","unstructured":"J. Vitek and C. Tschudin, Mobile Object Systems-Towards the Programmable Internet, Springer, 1997. Lecture Notes in Computer Science 1222.","DOI":"10.1007\/3-540-62852-5"},{"key":"270347_CR21","unstructured":"Wabasoft, Inc., The Waba Platform. http:\/\/www.wabasoft.com\/."},{"key":"270347_CR22","unstructured":"U. Wilhelm, L. Butty\u00e1nn, and S. Staamann, \u201cOn the problem of trust in mobile agent systems, \u201d in Symposium on Network and Distributed Systems Security, San Diego, USA, March 1998."},{"key":"270347_CR23","unstructured":"U. Wilhelm and X. DeFago, \u201cObjets Prot\u00e9g\u00e9s Cryptographiquement, \u201d in Proceedings of RenPar'9, Lausanne, Switzerland, May 1997."},{"key":"270347_CR24","unstructured":"B. Yee, \u201cA sanctuary for mobile agents, \u201d in Proceedings of the DARPA Workshop on Foundations for Secure Mobile Code, Monterey, USA, March 1997."}],"container-title":["Distributed and Parallel Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008733722279.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008733722279\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008733722279.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T02:44:32Z","timestamp":1752461072000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008733722279"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,10]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2000,10]]}},"alternative-id":["270347"],"URL":"https:\/\/doi.org\/10.1023\/a:1008733722279","relation":{},"ISSN":["0926-8782","1573-7578"],"issn-type":[{"type":"print","value":"0926-8782"},{"type":"electronic","value":"1573-7578"}],"subject":[],"published":{"date-parts":[[2000,10]]}}}