{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:06:32Z","timestamp":1761401192939,"version":"3.28.0"},"reference-count":6,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1109\/icect.2004.1319737","type":"proceedings-article","created":{"date-parts":[[2004,11,12]],"date-time":"2004-11-12T19:14:14Z","timestamp":1100286854000},"page":"221-226","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of a free roaming agent result-truncation defense scheme"],"prefix":"10.1109","author":[{"family":"Jianying Zhou","sequence":"first","affiliation":[]},{"given":"J.A.","family":"Onieva","sequence":"additional","affiliation":[]},{"given":"J.","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"Programming satan's agents","author":"roth","year":"2001","journal-title":"1st International Workshop on Secure Mobile Multi-Agent Sys-tems"},{"key":"ref3","first-page":"29","article-title":"Mobile agents and tel-cos' nightmares","author":"karjoth","year":"2000","journal-title":"Technical Report 55(7\/8)"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/3-540-48749-2_12","article-title":"A sanctuary for mobile agents","author":"yee","year":"1999","journal-title":"Secure internet Programming"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","article-title":"Protecting mobile agents against malicious hosts","volume":"1419","author":"sander","year":"1998","journal-title":"Mobile Agents and Security"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/BFb0057659","article-title":"Protecting the computation results of free-roaming agents","volume":"1477","author":"karjoth","year":"1998","journal-title":"Mobile Agents"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-36159-6_1","article-title":"Defenses against the truncation of computation results of free-roaming agents","volume":"2513","author":"cheng","year":"2002","journal-title":"Fourth International Conference on Information and Communications Security"}],"event":{"name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","start":{"date-parts":[[2004,7,9]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2004,7,9]]}},"container-title":["Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9218\/29236\/01319737.pdf?arnumber=1319737","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T07:52:59Z","timestamp":1497599579000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1319737\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/icect.2004.1319737","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}