{"id":"https://openalex.org/W2125139437","doi":"https://doi.org/10.1109/icect.2004.1319737","title":"Analysis of a free roaming agent result-truncation defense scheme","display_name":"Analysis of a free roaming agent result-truncation defense scheme","publication_year":2004,"publication_date":"2004-01-01","ids":{"openalex":"https://openalex.org/W2125139437","doi":"https://doi.org/10.1109/icect.2004.1319737","mag":"2125139437"},"language":"en","primary_location":{"id":"doi:10.1109/icect.2004.1319737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icect.2004.1319737","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008266220","display_name":"Jianying Zhou","orcid":"https://orcid.org/0000-0003-0594-0432"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Jianying Zhou","raw_affiliation_strings":["Institute for Infocomm Research, Singapore","Institute for Infocomm Research, Heng Mui Keng Terrace, Singapore#TAB#"],"affiliations":[{"raw_affiliation_string":"Institute for Infocomm Research, Singapore","institution_ids":["https://openalex.org/I3005327000"]},{"raw_affiliation_string":"Institute for Infocomm Research, Heng Mui Keng Terrace, Singapore#TAB#","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032553494","display_name":"Jos\u00e9 A. Onieva","orcid":"https://orcid.org/0000-0002-7280-090X"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]},{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES","SG"],"is_corresponding":false,"raw_author_name":"J.A. Onieva","raw_affiliation_strings":["Computer Science Department, University of Malaga, Malaga, Spain","Institute for Infocomm Research, Heng Mui Keng Terrace, Singapore#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Malaga, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]},{"raw_affiliation_string":"Institute for Infocomm Research, Heng Mui Keng Terrace, Singapore#TAB#","institution_ids":["https://openalex.org/I3005327000"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100641212","display_name":"Javier L\u00f3pez","orcid":"https://orcid.org/0000-0001-8066-9991"},"institutions":[{"id":"https://openalex.org/I3005327000","display_name":"Institute for Infocomm Research","ror":"https://ror.org/053rfa017","country_code":"SG","type":"facility","lineage":["https://openalex.org/I115228651","https://openalex.org/I3005327000","https://openalex.org/I91275662"]},{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES","SG"],"is_corresponding":false,"raw_author_name":"J. Lopez","raw_affiliation_strings":["Computer Science Department, University of Malaga, Malaga, Spain","Institute for Infocomm Research, Heng Mui Keng Terrace, Singapore#TAB#"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, University of Malaga, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]},{"raw_affiliation_string":"Institute for Infocomm Research, Heng Mui Keng Terrace, Singapore#TAB#","institution_ids":["https://openalex.org/I3005327000"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008266220"],"corresponding_institution_ids":["https://openalex.org/I3005327000"],"apc_list":null,"apc_paid":null,"fwci":1.1588,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.83272556,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"221","last_page":"226"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.972599983215332,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12288","display_name":"Optimization and Search Problems","score":0.963100016117096,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/roaming","display_name":"Roaming","score":0.9032785892486572},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7187033295631409},{"id":"https://openalex.org/keywords/truncation","display_name":"Truncation (statistics)","score":0.6535599827766418},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6391839385032654},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5709984302520752},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5251069664955139},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.4692862927913666},{"id":"https://openalex.org/keywords/mobile-agent","display_name":"Mobile agent","score":0.46018537878990173},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.45964834094047546},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4409351646900177},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34809374809265137},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.17811861634254456},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.16709783673286438}],"concepts":[{"id":"https://openalex.org/C194498986","wikidata":"https://www.wikidata.org/wiki/Q680016","display_name":"Roaming","level":2,"score":0.9032785892486572},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7187033295631409},{"id":"https://openalex.org/C106195933","wikidata":"https://www.wikidata.org/wiki/Q7847935","display_name":"Truncation (statistics)","level":2,"score":0.6535599827766418},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6391839385032654},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5709984302520752},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5251069664955139},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.4692862927913666},{"id":"https://openalex.org/C84875433","wikidata":"https://www.wikidata.org/wiki/Q3277848","display_name":"Mobile agent","level":2,"score":0.46018537878990173},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.45964834094047546},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4409351646900177},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34809374809265137},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.17811861634254456},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.16709783673286438},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icect.2004.1319737","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icect.2004.1319737","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W148356847","https://openalex.org/W1510235502","https://openalex.org/W1518545579","https://openalex.org/W1570296326","https://openalex.org/W2029502463","https://openalex.org/W2164995180","https://openalex.org/W6606020327","https://openalex.org/W6658109379"],"related_works":["https://openalex.org/W2369138185","https://openalex.org/W2945277231","https://openalex.org/W4210904806","https://openalex.org/W2388705066","https://openalex.org/W4312698066","https://openalex.org/W2015804271","https://openalex.org/W2118242884","https://openalex.org/W1987962585","https://openalex.org/W2135437889","https://openalex.org/W2312090451"],"abstract_inverted_index":{"Mobile":[0],"agents":[1,12,91],"play":[2],"an":[3,102,142],"important":[4],"role":[5],"in":[6,10,24,79,104],"electronic":[7],"commerce.":[8],"Security":[9],"free-roaming":[11,90,129],"is":[13,22,49,98,122],"especially":[14],"hard":[15],"to":[16,35,63,81,136,139],"achieve":[17],"when":[18,118],"the":[19,50,65,84,115,125],"mobile":[20],"code":[21],"executed":[23],"hosts":[25,56],"that":[26,110],"may":[27],"behave":[28],"maliciously.":[29],"Some":[30],"schemes":[31],"have":[32],"been":[33],"proposed":[34,76],"protect":[36],"agent":[37],"data":[38],"(or":[39,57],"computation":[40,87],"results).":[41],"However,":[42,107],"a":[43,77,119,128],"known":[44],"vulnerability":[45],"of":[46,86,89,127],"these":[47],"techniques":[48],"truncation":[51,85,116],"attack":[52,103,117],"where":[53],"two":[54,134],"visited":[55],"one":[58],"revisited":[59],"host)":[60],"can":[61],"collude":[62],"discard":[64],"partial":[66],"results":[67,88],"collected":[68],"between":[69],"their":[70],"respective":[71],"visits.":[72],"Cheng":[73],"and":[74,93],"Wei":[75],"scheme":[78,97,138],"IC1CS'O2":[80],"defense":[82],"against":[83,100],"(Cheng":[92],"Wei,":[94],"2002).":[95],"Cheng-Wei":[96,137],"effective":[99],"such":[101,141],"most":[105],"cases.":[106],"we":[108],"demonstrate":[109],"it":[111],"still":[112],"suffers":[113],"from":[114],"special":[120],"loop":[121],"established":[123],"on":[124],"path":[126],"agent.":[130],"We":[131],"further":[132],"propose":[133],"amendments":[135],"avoid":[140],"attack.":[143]},"counts_by_year":[{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
