{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:50:23Z","timestamp":1730238623187,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1109\/icdim.2008.4746769","type":"proceedings-article","created":{"date-parts":[[2009,1,16]],"date-time":"2009-01-16T10:29:46Z","timestamp":1232101786000},"page":"575-580","source":"Crossref","is-referenced-by-count":1,"title":["Integrity assurance of mobile agents through public-key encryption and watermarking"],"prefix":"10.1109","author":[{"family":"Noor-ul-Qayyum","sequence":"first","affiliation":[]},{"given":"Farooq","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1049\/ecej:20020504"},{"key":"22","article-title":"combinatorial enumeration","author":"goulden","year":"1983","journal-title":"Wiley-Interscience Series in Discrete Mathematics"},{"key":"17","first-page":"757","article-title":"a robust watermarking algorithm using attack pattern analysis","volume":"4179","author":"dongeun","year":"2006","journal-title":"LNCS"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/280765.280804"},{"year":"0","key":"15"},{"journal-title":"Code Protection and Application Hardening","year":"0","author":"obfuscator","key":"16"},{"year":"0","key":"13"},{"key":"14","first-page":"2235","article-title":"punishing manipulation attacks in mobile agent systems","author":"oscar","year":"2004","journal-title":"IEEE Communications Society Globecom"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"article-title":"dynamic graph-based software watermarking","year":"2004","author":"christian","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674837"},{"journal-title":"Java Cryptography Extensions Practical Guide for Programmers","year":"2004","author":"jason","key":"20"},{"key":"2","first-page":"92","article-title":"time limited blackbox security: protecting mobile agents from malicious hosts","volume":"1419","author":"hohl","year":"1998","journal-title":"LNCS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30178-3_21"},{"journal-title":"Zero-Knowledge A tutorial by Oded Goldreich","year":"0","author":"oded","key":"10"},{"key":"7","first-page":"137","article-title":"cryptographic traces for mobile agents","volume":"1419","author":"vigna","year":"1998","journal-title":"LNCS"},{"key":"6","article-title":"environmental key generation towards clueless agents","volume":"1419","author":"riordan","year":"1998","journal-title":"LNCS"},{"key":"5","article-title":"the use of encrypted functions for mobile agent security","author":"foss","year":"2004","journal-title":"Proceedings of the 37th Hawaii International Conference on System Sciences"},{"key":"4","first-page":"1","article-title":"on the (im)possibility of obfuscating programs","volume":"2139","author":"barak","year":"2001","journal-title":"LNCS"},{"key":"9","first-page":"201","article-title":"integrity of mobile agents: a new approach","volume":"4","author":"aneta","year":"2007","journal-title":"International Journal of Security and Networks"},{"year":"0","key":"8"}],"event":{"name":"2008 Third International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2008,11,13]]},"location":"London, United Kingdom","end":{"date-parts":[[2008,11,16]]}},"container-title":["2008 Third International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4733742\/4746691\/04746769.pdf?arnumber=4746769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T11:17:23Z","timestamp":1489749443000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4746769\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icdim.2008.4746769","relation":{},"subject":[],"published":{"date-parts":[[2008,11]]}}}