{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:46:11Z","timestamp":1725468371600},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540649595"},{"type":"electronic","value":"9783540498179"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0057658","type":"book-chapter","created":{"date-parts":[[2006,7,31]],"date-time":"2006-07-31T00:46:28Z","timestamp":1154306788000},"page":"183-194","source":"Crossref","is-referenced-by-count":18,"title":["Ensuring the integrity of agent-based computations by short proofs"],"prefix":"10.1007","author":[{"given":"Ingrid","family":"Biehl","sequence":"first","affiliation":[]},{"given":"Bernd","family":"Meyer","sequence":"additional","affiliation":[]},{"given":"Susanne","family":"Wetzel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,6,29]]},"reference":[{"issue":"n.1","key":"16_CR1","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/0022-0000(89)90018-4","volume":"39","author":"M. Abadi","year":"1989","unstructured":"M. Abadi, J. Feigenbaum, J. Kilian, On Hiding Information from an Oracle, Journal of Computer and System Science, vol. 39, n. 1, pp. 21\u201350, 1989.","journal-title":"Journal of Computer and System Science"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"S. Arora, C. Lund, R. Motwani, M. Sudan, M. Szegedy, Proof Verification and Hardness of Approximation Problems, Proc. of the 33rd IEEE FOCS, pp. 14\u201323, 1992.","DOI":"10.1109\/SFCS.1992.267823"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"D. Beaver, Secure Multiparty Computation Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority, Journal of Cryptology, Springer, pp. 75\u2013122, 1991.","DOI":"10.1007\/BF00196771"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, S. Eggers, Extensibility, Safety and Performance in the Spin Operating System, Proc. of the 15th Symposium on Operating Systems Principles, 1995.","DOI":"10.1145\/224056.224077"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"M. Blum, P. Feldman, S. Micali, Non-Interactive Zero-Knowledge and Its Application (Extended Abstract), Proc. of the 20th ACM STOC, pp. 103\u2013112, 1988.","DOI":"10.1145\/62212.62222"},{"key":"16_CR6","unstructured":"C. Cachin, M. Stadler, Efficient Private Information Retrieval and Oblivious Transfer, unpublished, 1997."},{"key":"16_CR7","unstructured":"J. Feigenbaum, P. Lee, Trust Management and Proof-Carrying Code in Secure Mobile-Code Applications, DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997, Position Paper."},{"key":"16_CR8","unstructured":"J. S. Fritzinger, M. M\u00fcller, Java Security, httpwwwjavasoftcom securitywhitepaperps, 1996."},{"key":"16_CR9","unstructured":"F. Hohl, An Approach to Solve the Problem of Malicious Hosts, Universit\u00e4t Stuttgart, Fakult\u00e4t Informatik, Fakult\u00e4tsbericht Nr. 1997\/03."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"F. Hohl, Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts, in: Giovanni Vigna (Ed.), Mobile Agents and Security, Lecture Notes in Computer Science, Springer, 1997.","DOI":"10.1007\/3-540-68671-1_6"},{"key":"16_CR11","unstructured":"W. C. Hsieh, M. E. Fiuczynski, C. Garrett, D. Becker, B. N. Bershad, Language Support for Extensible Operating Systems, Proc. of the Workshop on Compiler Support for System Software, 1996."},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"E. Kushilevitz, R. Ostrovsky, Replication is Not Needed: Single Database, Computationally-Private Information Retrieval, Proc. of the 29th ACM STOC, 1997.","DOI":"10.1109\/SFCS.1997.646125"},{"key":"16_CR13","unstructured":"P. Lee, G. Necula, Research on Proof-Carrying Code For Mobile-Code Security, DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997, Position Paper."},{"key":"16_CR14","unstructured":"S. McCanne, V. Jacobson, The bsd Packet Filter: A New Architecture for User-level Packet Capture, Proc. of the USENIX Technical Conference, pp. 259\u2013269, 1993."},{"key":"16_CR15","unstructured":"C. Meadows, Detecting Attacks on Mobile Agents, DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997, Position Paper."},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography, CRC Press Inc., 1997.","DOI":"10.1201\/9781439821916"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"G. Necula, Proof Carrying Code, Proc. of the 24th Annual Symposium on Principles of Programming Languages, 1997.","DOI":"10.1145\/263699.263712"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"T. Sander, C. T. Tschudin, Protecting Mobile Agents Against Malicious Hosts, in: Giovanni Vigna (Ed.), Mobile Agents and Security, Lecture Notes in Computer Science, Springer, 1997.","DOI":"10.1007\/3-540-68671-1_4"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"A. Polishchuk, D. A. Spielman, Nearly-linear Size Holographic Proofs, Proc. of the 26th ACM STOC, 1994.","DOI":"10.1145\/195058.195132"},{"key":"16_CR20","unstructured":"G. Vigna, Protecting Mobile Agents through Tracing, to appear in the Proc. of the ECOOP Workshop on Mobile Object Systems\u201997."},{"key":"16_CR21","unstructured":"R. Wahbe, S. Lucco, T. E. Anderson, S. L. Graham, Efficient Software-based Fault Isolation, Proc. ACM SIGCOMM Symposium 1996, 1996."},{"key":"16_CR22","unstructured":"B. S. Yee, A Sanctuary for Mobile Agents, DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997, Position Paper."}],"container-title":["Lecture Notes in Computer Science","Mobile Agents"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0057658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T08:14:56Z","timestamp":1555748096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0057658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649595","9783540498179"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/bfb0057658","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}