{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:35:39Z","timestamp":1725410139327},"reference-count":13,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aina.2003.1192894","type":"proceedings-article","created":{"date-parts":[[2003,12,22]],"date-time":"2003-12-22T12:34:10Z","timestamp":1072096450000},"page":"302-305","source":"Crossref","is-referenced-by-count":0,"title":["A secure model in agent-based marketplace"],"prefix":"10.1109","author":[{"family":"Ying-Hong Wang","sequence":"first","affiliation":[]},{"family":"Chen-An Wang","sequence":"additional","affiliation":[]},{"family":"Jen-Shium Chiang","sequence":"additional","affiliation":[]},{"family":"Wen-Hung Lo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/280765.280804"},{"key":"ref11","first-page":"411","article-title":"Data Protection in Mobile Agents; one-time key based approach","author":"park","year":"2001","journal-title":"IEEE ISADS 01"},{"key":"ref12","first-page":"9","article-title":"Mobile Agent-Based Platform Supports to e_Market Place","author":"wang","year":"2001","journal-title":"Proceeding of the Seventh International Conference on Distributed Multimedia System (DMS2001)"},{"year":"0","key":"ref13"},{"article-title":"Cryptography and Network Security: Principles and Practice","year":"0","author":"stallings","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1201\/1079\/43250.27.4.19991001\/30275.5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/4236.612220"},{"article-title":"NIST Special Publication 800&#x2013;19: Mobile Agent Security","year":"1999","author":"jansen","key":"ref5"},{"key":"ref8","article-title":"Mobile Agents over e-business","author":"wang","year":"0","journal-title":"Accepted by CATA-2002"},{"article-title":"Frontiers of Electronic Commerce","year":"0","author":"kalakota","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.1999.766120"},{"article-title":"Programming and Deploying Java&#x2122; Mobile Agents with aglets&#x2122;","year":"0","author":"lange","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1999.812680"}],"event":{"name":"17th International Conference on Advanced Information Networking and Applications. AINA 2003","acronym":"AINA-03","location":"Xi'an, China"},"container-title":["17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8485\/26745\/01192894.pdf?arnumber=1192894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T17:59:44Z","timestamp":1489427984000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1192894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/aina.2003.1192894","relation":{},"subject":[]}}