{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:03:07Z","timestamp":1725559387908},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540287407"},{"type":"electronic","value":"9783540287414"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11550648_5","type":"book-chapter","created":{"date-parts":[[2005,11,13]],"date-time":"2005-11-13T04:54:39Z","timestamp":1131857679000},"page":"47-58","source":"Crossref","is-referenced-by-count":1,"title":["BSCA-P: Privacy Preserving Coalition Formation"],"prefix":"10.1007","author":[{"given":"Bastian","family":"Blankenburg","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Klusch","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Blankenburg, B., Dash, R.K., Ramchurn, S.D., Klusch, M., Jennings, N.R.: Trusted kernel-based coalition formation. In: Proc. 4th Int. Conf. on Autonomous Agents and Multi-Agent Systems, Utrecht, Holland (2005) (to appear)","DOI":"10.1145\/1082473.1082623"},{"key":"5_CR2","unstructured":"Chalkiadakis, G., Boutilier, C.: Bayesian reinforcement learning for coalition formation under uncertainty. In: Proc. 3rd Int. Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), New York, USA. ACM Press, New York (2004)"},{"key":"5_CR3","first-page":"75","volume":"16","author":"J. Halpern","year":"2003","unstructured":"Halpern, J., O\u2019Neill, K.: Anonymity and information hiding in multiagent systems. Journal of Computer Security, Special Edition on CSFW\u00a016, 75\u201388 (2003)","journal-title":"Journal of Computer Security, Special Edition on CSFW"},{"key":"5_CR4","unstructured":"Kraus, S., Shehory, O., Taase, G.: The advantages of compromising in coalition formation with incomplete information. In: Proc. 3rd Int. Conference on Autonomous Agents and Multiagent Systems (AAMAS 2004), New York, USA. ACM Press, New York (2004)"},{"key":"5_CR5","volume-title":"A Course in Game Theory","author":"M.J. Osborne","year":"1994","unstructured":"Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge (1994)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44702-4_1","volume-title":"Designing Privacy Enhancing Technologies","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability and pseudonymity: a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 1\u20139. Springer, Heidelberg (2001)"},{"issue":"1","key":"5_CR7","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/357980.358017","volume":"26","author":"R.L. Rivest","year":"1983","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM\u00a026(1), 96\u201399 (1983)","journal-title":"Commun. ACM"},{"key":"5_CR8","series-title":"Annals of Mathematics Studies","first-page":"307","volume-title":"Contributions to the Theory of Games II","author":"L.S. Shapley","year":"1953","unstructured":"Shapley, L.S.: A value for n-person games. In: Kuhn, H.W., Tucker, A.W. (eds.) Contributions to the Theory of Games II. Annals of Mathematics Studies, vol.\u00a028, pp. 307\u2013317. Princeton University Press, Princeton (1953)"},{"issue":"1-2","key":"5_CR9","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/S0004-3702(98)00045-9","volume":"101","author":"O. Shehory","year":"1998","unstructured":"Shehory, O., Kraus, S.: Methods for task allocation via agent coalition formation. Artificial Intelligence Journal\u00a0101(1-2), 165\u2013200 (1998)","journal-title":"Artificial Intelligence Journal"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy, Oakland, California, pp. 44\u201354 (1997)","DOI":"10.1109\/SECPRI.1997.601314"},{"issue":"18","key":"5_CR11","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1111\/1467-8640.t01-1-00205","volume":"4","author":"J. Vassileva","year":"2002","unstructured":"Vassileva, J., Breban, S., Horsch, M.: Agent reasoning mechanism for long-term coalitions based on decision making and trust. Computational Intelligence\u00a04(18), 583\u2013595 (2002)","journal-title":"Computational Intelligence"}],"container-title":["Lecture Notes in Computer Science","Multiagent System Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11550648_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:59:27Z","timestamp":1619506767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11550648_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540287407","9783540287414"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11550648_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}