{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:52:51Z","timestamp":1729648371660,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icdcs.2006.25","type":"proceedings-article","created":{"date-parts":[[2006,8,2]],"date-time":"2006-08-02T20:10:31Z","timestamp":1154549431000},"page":"57-57","source":"Crossref","is-referenced-by-count":3,"title":["Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search"],"prefix":"10.1109","author":[{"given":"S.","family":"Dobrev","sequence":"first","affiliation":[]},{"given":"P.","family":"Flocchini","sequence":"additional","affiliation":[]},{"given":"N.","family":"Santoro","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-006-0154-y"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1002\/net.20095"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1137\/0210062"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/11516798_5"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2000.840953"},{"key":"6","article-title":"Host revocation authority: A way of protecting mobile agents from malicious hosts","volume":"2722","author":"esparza","year":"2003","journal-title":"LNCS"},{"key":"5","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-27796-5_11","article-title":"Improved bounds for optimal black hole search in a network","author":"dobrev","year":"2004","journal-title":"Proc of 10th Int Coll on Structural Information and Communication Complexity"},{"key":"4","article-title":"Mobile search for a black hole in an anonymous ring","author":"dobrev","year":"2006","journal-title":"Algorithmica"},{"key":"9","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","article-title":"Protecting mobile agents against malicious hosts","author":"sander","year":"1998","journal-title":"Proc of Conf on Mobile Agent Security"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/11429647_17"},{"key":"11","first-page":"241","article-title":"Mobile computations and hostile hosts","author":"vitek","year":"1999","journal-title":"Mobile Objects"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1932-1501641-2"}],"event":{"name":"26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)","location":"Lisboa, Portugal"},"container-title":["26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10967\/34569\/01648844.pdf?arnumber=1648844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T04:15:37Z","timestamp":1497672937000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1648844\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icdcs.2006.25","relation":{},"subject":[]}}