{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:04Z","timestamp":1750307464159,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,12,16]],"date-time":"2009-12-16T00:00:00Z","timestamp":1260921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,12,16]]},"DOI":"10.1145\/1838002.1838038","type":"proceedings-article","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:15:36Z","timestamp":1280754936000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Mobile agent watermarking (MAW)"],"prefix":"10.1145","author":[{"given":"Abid","family":"Khan","sequence":"first","affiliation":[{"name":"COMSATS Institute of Information Technology, Islamabad, Pakistan"}]},{"given":"Xiamu","family":"Niu","sequence":"additional","affiliation":[{"name":"Harbin Institute of Technology, P. R. China"}]},{"given":"Waqas","family":"Anwar","sequence":"additional","affiliation":[]},{"given":"Mansoor","family":"Ahmed","sequence":"additional","affiliation":[{"name":"COMSATS Institute of Information Technology, Islamabad, Pakistan"}]},{"given":"Ali Nawaz","family":"Khan","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2009,12,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Chunyan Ma Arturo Concepcion \"A Security Evaluation Model for Multi-Agent Distributed Systems\" Technologies for Business Information Systems 403--415 LNCS Springer 2007.  Chunyan Ma Arturo Concepcion \"A Security Evaluation Model for Multi-Agent Distributed Systems\" Technologies for Business Information Systems 403--415 LNCS Springer 2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1166\/juci.2007.008"},{"key":"e_1_3_2_1_3_1","article-title":"Reliable Multiagent System for E-Business Applications","volume":"18","author":"Kannammal A.","year":"2006","unstructured":"A. Kannammal , V. Ramachandran et al , \" Reliable Multiagent System for E-Business Applications \", Academic Open Internet Journal Vol. 18 , 2006 A. Kannammal, V. Ramachandran et al, \"Reliable Multiagent System for E-Business Applications\", Academic Open Internet Journal Vol. 18, 2006","journal-title":"Academic Open Internet Journal"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588541"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1176987"},{"key":"e_1_3_2_1_6_1","volume-title":"Object Oriented Technology: ECOOp'98 Workshop","volume":"1998","author":"Hohl F.","unstructured":"F. Hohl , \" A Model of Attacks of Malicious Host Against Mobile Agents\" , Object Oriented Technology: ECOOp'98 Workshop , Volume 1543\/ 1998 , LNCS, Springer F. Hohl, \"A Model of Attacks of Malicious Host Against Mobile Agents\", Object Oriented Technology: ECOOp'98 Workshop, Volume 1543\/1998, LNCS, Springer"},{"key":"e_1_3_2_1_7_1","first-page":"371","volume-title":"ASIAN'99","author":"Chan A. H. W.","year":"1999","unstructured":"A. H. W. Chan , Michael R. Lyu , \" Security Modeling and Evaluation for Mobile Code Paradigm\" , ASIAN'99 , LNCS 1742, pp. 371 -- 372 , 1999 . Springer. A. H. W. Chan, Michael R. Lyu, \"Security Modeling and Evaluation for Mobile Code Paradigm\", ASIAN'99, LNCS 1742, pp. 371--372, 1999. Springer."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647628.732436"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/380171.380193"},{"issue":"1","key":"e_1_3_2_1_10_1","first-page":"48","article-title":"A hybrid approach for mobile agent security using reversible watermarking and dynamic data structure","volume":"1","author":"Khan Abid","year":"2007","unstructured":"Abid Khan , Xiamu Niu and Zhang Yong , \" A hybrid approach for mobile agent security using reversible watermarking and dynamic data structure \" IJCSES , Vol. 1 , No. 1 , January 2007 Pages: 48 -- 53 ISSN: 0973--4406 Abid Khan, Xiamu Niu and Zhang Yong, \"A hybrid approach for mobile agent security using reversible watermarking and dynamic data structure\" IJCSES, Vol. 1, No. 1, January 2007 Pages: 48--53 ISSN: 0973--4406","journal-title":"IJCSES"},{"key":"e_1_3_2_1_11_1","unstructured":"S. Loureiro \"Mobile Code Protection\". PhD thesis ENST Paris \/ Institut Eurecom 2001.  S. Loureiro \"Mobile Code Protection\". PhD thesis ENST Paris \/ Institut Eurecom 2001."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of 2004 IEEE ICNSC Taipei, Taiwan, March 21--23","author":"Lin His-Chung","year":"2004","unstructured":"His-Chung Lin , Sung-Ming Yen , and Her-Shu Chen , 2004 , \" Protection of Mobile agent Data Collection by Using Ring Signature \". In Proceedings of 2004 IEEE ICNSC Taipei, Taiwan, March 21--23 , 2004 His-Chung Lin, Sung-Ming Yen, and Her-Shu Chen, 2004, \"Protection of Mobile agent Data Collection by Using Ring Signature\". In Proceedings of 2004 IEEE ICNSC Taipei, Taiwan, March 21--23, 2004"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings PDCS 2004","author":"McDonald J. T.","year":"2004","unstructured":"J. T. McDonald , Alec Yasinsac , W. C. Thompson , \" Mobile Agent Data Integrity Using Multi-agent Architecture\". In Proceedings PDCS 2004 , San Francisco, CA, 14- -17 September 2004 . J. T. McDonald, Alec Yasinsac, W. C. Thompson, \"Mobile Agent Data Integrity Using Multi-agent Architecture\". In Proceedings PDCS 2004, San Francisco, CA, 14--17 September 2004."},{"key":"e_1_3_2_1_14_1","first-page":"275","volume-title":"LNCS 1603","author":"Roth V.","year":"1999","unstructured":"V. Roth . \" Mutual Protection of co-operating agents\" Secure Internet programming : Security Issues for Mobile and Distributed Objects , LNCS 1603 , New York, NY, USA : Springer-Verlag , pp. 275 -- 285 , 1999 . V. Roth. \"Mutual Protection of co-operating agents\" Secure Internet programming: Security Issues for Mobile and Distributed Objects, LNCS 1603, New York, NY, USA: Springer-Verlag, pp. 275--285, 1999."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/648051.746182"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"O.\n      Esparza M.\n      Fernandez M.\n      Soriano J. L.\n      Munoz and \n      J.\n      Forne 2003\n  . \"Mobile agent watermarking and fingerprinting: tracing malicious hosts\". \n  In DEXA\n   2003 volume \n  2736\n   of \n  LNCS\n  .  O. Esparza M. Fernandez M. Soriano J. L. Munoz and J. Forne 2003. \"Mobile agent watermarking and fingerprinting: tracing malicious hosts\". In DEXA 2003 volume 2736 of LNCS.","DOI":"10.1007\/978-3-540-45227-0_90"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of Security and Watermarking of Multimedia Contents IV, Electronic Imaging 2002","volume":"4675","author":"Tian J.","year":"2002","unstructured":"J. Tian , \"Wavelet-based reversible watermarking for authentication \". In Proceedings of Security and Watermarking of Multimedia Contents IV, Electronic Imaging 2002 , vol. 4675 . (20--25 Jan 2002 ) 679--690. J. Tian, \"Wavelet-based reversible watermarking for authentication\". In Proceedings of Security and Watermarking of Multimedia Contents IV, Electronic Imaging 2002, vol. 4675. (20--25 Jan 2002) 679--690."},{"key":"e_1_3_2_1_18_1","volume-title":"Lange and M. Oshima","author":"Lange D. B.","year":"1998","unstructured":"{ D. B. Lange 1998 } D. B . Lange and M. Oshima , 1998, \"Programming and deploying Java mobile agents with Aglets\", Addison Wesley. {D. B. Lange 1998} D. B. Lange and M. Oshima, 1998, \"Programming and deploying Java mobile agents with Aglets\", Addison Wesley."}],"event":{"name":"FIT '09: 7th International Conference on Frontiers of Information Technology","sponsor":["COMSATS Institute of Information Technology","SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"Abbottabad Pakistan","acronym":"FIT '09"},"container-title":["Proceedings of the 7th International Conference on Frontiers of Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1838002.1838038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1838002.1838038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:29Z","timestamp":1750248509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1838002.1838038"}},"subtitle":["security properties and attacks revisited"],"short-title":[],"issued":{"date-parts":[[2009,12,16]]},"references-count":18,"alternative-id":["10.1145\/1838002.1838038","10.1145\/1838002"],"URL":"https:\/\/doi.org\/10.1145\/1838002.1838038","relation":{},"subject":[],"published":{"date-parts":[[2009,12,16]]},"assertion":[{"value":"2009-12-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}