{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:44:45Z","timestamp":1730195085728,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aiccsa.2005.1387089","type":"proceedings-article","created":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T15:16:50Z","timestamp":1112368610000},"page":"519-526","source":"Crossref","is-referenced-by-count":1,"title":["Design, implementation and testing of mobile agent protection mechanism for MANETS"],"prefix":"10.1109","author":[{"given":"K.E.A.","family":"Negm","sequence":"first","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"journal-title":"TG Traffic Generator","year":"0","key":"18"},{"key":"15","first-page":"1","article-title":"Pseudo-random number generation with cryptographic algorithms: The DSS case","volume":"1294","author":"bellare","year":"1997","journal-title":"LNCS"},{"key":"16","first-page":"10","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"196","author":"elgamal","year":"1984","journal-title":"LNCS"},{"key":"13","first-page":"437","article-title":"Mobile agents","author":"white","year":"1997","journal-title":"Software Agents"},{"key":"14","first-page":"190","article-title":"Mobile agent programming in ajanta","author":"tripathi","year":"1999","journal-title":"Proc of 19th IEEE International Conference on Distributed Computing Systems"},{"key":"11","first-page":"591","article-title":"Security for mobile agents: Issues and requirements","author":"farmer","year":"1996","journal-title":"Proc of the 19th International Information Systems Security Conference"},{"journal-title":"Pattern-Oriented Software Architecture A System of Patterns","year":"1996","author":"buschmann","key":"12"},{"key":"3","article-title":"Scalable and secure global name services for mobile agents","author":"roth","year":"2000","journal-title":"6th ECOOP Workshop on Mobile Object Systems Operating System Support Security and Programming Languages"},{"key":"2","article-title":"Application intrusion detection","volume":"cs 99 17","author":"sielken","year":"1999","journal-title":"Univ of Virginia Computer Science Technical Report"},{"key":"1","first-page":"79","article-title":"ATP anti tampering program","author":"vincenzetti","year":"1993","journal-title":"Proc of Security IV Conf -USENIX Assoc"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2004.1297447"},{"journal-title":"OMG-TC-orbos\/97","article-title":"Mobile agent system interoperability facilities specification","year":"1997","key":"7"},{"journal-title":"FIPA 1997 Specification Part 1 Ver 2 0","article-title":"Agent management","year":"1998","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/32.685258"},{"key":"4","first-page":"154","article-title":"D'Agents: Security in a multiple language, mobile-agent system","volume":"1419","author":"gray","year":"1998","journal-title":"LNCS"},{"key":"9","first-page":"519","article-title":"Implementation of secure mobile agent for ad-hoc networks","volume":"2","author":"negm","year":"2003","journal-title":"WEAS Transactions on Communications"},{"journal-title":"Jumping Beans White Paper","year":"1998","key":"8"}],"event":{"name":"The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005.","location":"Cairo, Egypt"},"container-title":["The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9525\/30191\/01387089.pdf?arnumber=1387089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T23:58:12Z","timestamp":1489535892000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1387089\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2005.1387089","relation":{},"subject":[]}}