{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:45:06Z","timestamp":1729673106928,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/hpcsa.2002.1019165","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T18:04:13Z","timestamp":1056564253000},"page":"258-267","source":"Crossref","is-referenced-by-count":1,"title":["Bandwidth efficient tamper detection for distributed Java systems"],"prefix":"10.1109","author":[{"given":"M.","family":"Jochen","sequence":"first","affiliation":[]},{"given":"L.","family":"Marvel","sequence":"additional","affiliation":[]},{"given":"L.L.","family":"Pollock","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","volume":"2","author":"knuth","year":"1981","journal-title":"The Art of Computer Programming Seminumerical Algorithms"},{"key":"ref11","article-title":"Efficient code certification","author":"kozen","year":"1998","journal-title":"Technical Report 98&#x2013;1661"},{"journal-title":"The Java Virtual Machine Specification","year":"1999","author":"lindholm","key":"ref12"},{"journal-title":"Securing Java Getting Down to Business with Mobile Code","year":"1999","author":"mcgraw","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/52.877857"},{"year":"1977","key":"ref15"},{"year":"1995","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"ref18","article-title":"MASSA: Mobile agents security through static\/dynamic analysis","author":"orso","year":"2001","journal-title":"Proceedings of the ICSE Workshop on Software Engineering and Mobility (ICSE-2001)"},{"key":"ref19","article-title":"The MD5 Message-Digest Algorithm","author":"rivest","year":"1992","journal-title":"RFC 1321"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-68671-1_1","article-title":"Security issues in mobile code systems","volume":"1419","author":"chess","year":"1998","journal-title":"Mobile Agents and Security"},{"key":"ref3","first-page":"451","article-title":"Analysis of key-exchange protocols and their use for building secure channels","author":"canetti","year":"2001","journal-title":"Advances in Cryptology &#x2013; EURO-CRYPT"},{"key":"ref6","article-title":"Byte code engineering with the JavaClass API","author":"dahm","year":"1998","journal-title":"Technical Report B-17&#x2013;98"},{"journal-title":"Cryptix Foundation Limited","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352608"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1998.730905"},{"key":"ref2","first-page":"52","article-title":"Proof-carrying authentication","author":"appel","year":"1999","journal-title":"Computer Communications of the ACM"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378825"},{"journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","author":"katzenbeisser","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"ref22","article-title":"On Formal models for secure key exchange","author":"shoup","year":"1999","journal-title":"Report RZ 3120 (#93166)"},{"journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C","year":"1996","author":"schneier","key":"ref21"},{"journal-title":"A New Approach to Mobile Code Security","year":"1999","author":"wallach","key":"ref23"}],"event":{"name":"16th Annual International Symposium on High Performance Computing Systems and Applications","acronym":"HPCSA-02","location":"Moncton, NB, Canada"},"container-title":["Proceedings 16th Annual International Symposium on High Performance Computing Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7938\/21891\/01019165.pdf?arnumber=1019165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:41:16Z","timestamp":1497552076000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1019165\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/hpcsa.2002.1019165","relation":{},"subject":[]}}