{"id":"https://openalex.org/W2152261182","doi":"https://doi.org/10.1109/dasfaa.2003.1192368","title":"Securing your data in agent-based P2P systems","display_name":"Securing your data in agent-based P2P systems","publication_year":2003,"publication_date":"2003-01-01","ids":{"openalex":"https://openalex.org/W2152261182","doi":"https://doi.org/10.1109/dasfaa.2003.1192368","mag":"2152261182"},"language":"en","primary_location":{"id":"doi:10.1109/dasfaa.2003.1192368","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasfaa.2003.1192368","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Eighth International Conference on Database Systems for Advanced Applications, 2003. (DASFAA 2003). Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033127375","display_name":"Linsey Pang","orcid":"https://orcid.org/0000-0002-4784-9795"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Xiaolin Pang","raw_affiliation_strings":["Department of Computer Science, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024551850","display_name":"Barbara Catania","orcid":"https://orcid.org/0000-0002-6443-169X"},"institutions":[{"id":"https://openalex.org/I83816512","display_name":"University of Genoa","ror":"https://ror.org/0107c5v14","country_code":"IT","type":"education","lineage":["https://openalex.org/I83816512"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"B. Catania","raw_affiliation_strings":["Department of Computer and Information Sciences, University of Genoa, Genoa, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, University of Genoa, Genoa, Italy","institution_ids":["https://openalex.org/I83816512"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077593594","display_name":"Kian\u2010Lee Tan","orcid":"https://orcid.org/0000-0001-9315-4057"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Kian-Lee Tan","raw_affiliation_strings":["SMA, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"SMA, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5033127375"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":2.4833,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.91448589,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"55","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8340535759925842},{"id":"https://openalex.org/keywords/mobile-agent","display_name":"Mobile agent","score":0.6919171214103699},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6410384178161621},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5937426686286926},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5641491413116455},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.5293598771095276},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.48848021030426025},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.45756441354751587},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.439449667930603},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4382408857345581},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18003976345062256}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8340535759925842},{"id":"https://openalex.org/C84875433","wikidata":"https://www.wikidata.org/wiki/Q3277848","display_name":"Mobile agent","level":2,"score":0.6919171214103699},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6410384178161621},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5937426686286926},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5641491413116455},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.5293598771095276},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.48848021030426025},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.45756441354751587},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.439449667930603},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4382408857345581},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18003976345062256},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/dasfaa.2003.1192368","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasfaa.2003.1192368","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Eighth International Conference on Database Systems for Advanced Applications, 2003. (DASFAA 2003). Proceedings.","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.119.1268","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.1268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ieeexplore.ieee.org/iel5/8482/26738/01192368.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.58.8609","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.8609","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://xena1.ddns.comp.nus.edu.sg/p2p/peerSecure.pdf","raw_type":"text"},{"id":"pmh:oai:iris.unige.it:11567/232172","is_oa":false,"landing_page_url":"http://hdl.handle.net/11567/232172","pdf_url":null,"source":{"id":"https://openalex.org/S4377196291","display_name":"CINECA IRIS Institutial Research Information System (University of Genoa)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I83816512","host_organization_name":"University of Genoa","host_organization_lineage":["https://openalex.org/I83816512"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W481140","https://openalex.org/W90561696","https://openalex.org/W1499103434","https://openalex.org/W1508438606","https://openalex.org/W1508640545","https://openalex.org/W1511209149","https://openalex.org/W1516634197","https://openalex.org/W1548162046","https://openalex.org/W1660562555","https://openalex.org/W2033778203","https://openalex.org/W2087027284","https://openalex.org/W2099849300","https://openalex.org/W2111809002","https://openalex.org/W2141784491","https://openalex.org/W2142822878","https://openalex.org/W2167443373","https://openalex.org/W2230275461","https://openalex.org/W3017235893","https://openalex.org/W4245788703","https://openalex.org/W4285719527","https://openalex.org/W4289127653","https://openalex.org/W6600025631","https://openalex.org/W6603725173","https://openalex.org/W6632928217","https://openalex.org/W6681062557"],"related_works":["https://openalex.org/W2499263230","https://openalex.org/W1578117481","https://openalex.org/W2538000603","https://openalex.org/W4239860053","https://openalex.org/W2163934533","https://openalex.org/W2390458437","https://openalex.org/W1506004353","https://openalex.org/W2134432369","https://openalex.org/W1697719893","https://openalex.org/W165676868"],"abstract_inverted_index":{"Peer-to-peer":[0],"(P2P)":[1],"technology":[2,10],"can":[3],"be":[4],"naturally":[5],"integrated":[6],"with":[7,129],"mobile":[8,23,54,121],"agent":[9,55,122],"in":[11,25,38,56,136],"Internet":[12,41],"applications,":[13],"taking":[14],"advantage":[15],"of":[16,22,34,52,69,107,139,143],"the":[17,32,50,57,67,76,82,97,105,124,148],"autonomy,":[18],"mobility,":[19],"and":[20,27,85,102,131],"efficiency":[21],"agents":[24],"accessing":[26],"processing":[28],"data.":[29],"We":[30],"address":[31],"problem":[33],"protecting":[35],"critical":[36],"information":[37,132],"agent-based":[39],"P2P":[40,58],"applications":[42],"under":[43,147],"two":[44,149],"different":[45],"scenarios.":[46],"First,":[47],"we":[48,65,95,103],"assume":[49,96],"route":[51,78,98],"a":[53,108,120,141],"system":[59],"is":[60,79,99,133],"fixed.":[61],"Under":[62],"this":[63,117],"assumption,":[64],"propose":[66,104],"usage":[68,106],"an":[70],"efficient":[71],"parallel":[72],"dispatch":[73],"model":[74],"where":[75],"agent's":[77],"signcrypted":[80],"at":[81],"first":[83],"step":[84],"dispatched":[86],"to":[87,91,112,127],"each":[88],"new":[89],"peer":[90,126],"collect":[92],"information.":[93],"Then,":[94],"not":[100],"specified":[101],"modified":[109],"multi-signcryption":[110],"scheme":[111],"guarantee":[113],"protection.":[114],"Based":[115],"on":[116],"second":[118],"approach,":[119],"determines":[123],"next":[125],"communicate":[128],"independently":[130],"collected":[134],"dynamically":[135],"one":[137],"round":[138],"visiting":[140],"group":[142],"peers.":[144],"Security":[145],"issues":[146],"proposed":[150],"models":[151],"are":[152],"then":[153],"discussed.":[154]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
