{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:38:19Z","timestamp":1729651099917,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icdcsw.2003.1203594","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"454-460","source":"Crossref","is-referenced-by-count":0,"title":["Toward a security architecture for smart messages: challenges, solutions, and open issues"],"prefix":"10.1109","author":[{"family":"Gang Xu","sequence":"first","affiliation":[]},{"given":"C.","family":"Borcea","sequence":"additional","affiliation":[]},{"given":"L.","family":"Iftode","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/3-540-68671-1_9","article-title":"D'Agents: Security in a multiple-language, mobile-agent system","volume":"1419","author":"gray","year":"1998","journal-title":"Mobile Agents and Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/570645.570648"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"key":"ref14","article-title":"Agent Server Architecture for the Ajanta Mobile-Agent System","author":"karnik","year":"1998","journal-title":"Proceedings of the 1998 International Conference on Parallel and Distributed Process-ine Techniques and Aoplications (PDPTA'98)"},{"key":"ref15","article-title":"Security in the Ajanta Mobile Agent System","author":"karnik","year":"2000","journal-title":"Software -Practice and Experience"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210183"},{"key":"ref17","article-title":"Robust Membership Management for Ad-hoc Groups","author":"maki","year":"2000","journal-title":"Proc 5th Nordic Work-shoo on Secure IT Systems (NORDSEC 2000)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s004460050050"},{"key":"ref19","first-page":"1","article-title":"Mobile objects and agents","author":"milojicic","year":"1998","journal-title":"USENIX Conference on Object-oriented Technologies and Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2003.1192730"},{"key":"ref3","article-title":"Key Agreement in Ad-hoc Networks","author":"asokan","year":"1999","journal-title":"Nordsec'99 Workshop"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/98.468361"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022260"},{"journal-title":"PGP Pretty Good Privacy","year":"1994","author":"garfinkel","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/3-540-68671-1_6","article-title":"Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts","volume":"1419","author":"hohl","year":"1998","journal-title":"Mobile Agents and Security"},{"journal-title":"Understanding Public-Key Infrastructure - Concepts Standards and Deployment Considerations","year":"1999","author":"adams","key":"ref2"},{"key":"ref9","article-title":"Mobile agents: Motivations and State of the Art","author":"gray","year":"2001","journal-title":"Handbook of Agent Technolouy"},{"year":"0","key":"ref1"},{"key":"ref20","article-title":"An Introduction to Citadel &#x2013; A Secure Cypto Coprocessor for Workstations","author":"palmer","year":"1994","journal-title":"IFIP SEC'94"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"ref21","article-title":"The TESLA Broadcast Authentication Protocol","author":"perrig","year":"2002","journal-title":"RSA CryptoBytes"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","article-title":"Protecting Mobile Agents against Malicious Hosts","volume":"1419","author":"sander","year":"1998","journal-title":"Mobile Agents and Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919111"},{"key":"ref26","article-title":"COCA: A secure distributed on-line certification authority","author":"zhou","year":"2000","journal-title":"Technical Report TR2000&#x2013;1828"},{"key":"ref25","article-title":"Telescript technology: An Introduction to the Language","author":"white","year":"1995","journal-title":"General Magic White Paper"}],"event":{"name":"23rd International Conference on Distributed Computing Systems Workshops, 2003.","location":"Providence, Rhode Island, USA"},"container-title":["23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8560\/27094\/01203594.pdf?arnumber=1203594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T08:15:33Z","timestamp":1497600933000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1203594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icdcsw.2003.1203594","relation":{},"subject":[]}}