{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:49:10Z","timestamp":1725475750161},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540482871"},{"type":"electronic","value":"9783540482895"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11914853_30","type":"book-chapter","created":{"date-parts":[[2006,11,29]],"date-time":"2006-11-29T20:14:51Z","timestamp":1164831291000},"page":"498-515","source":"Crossref","is-referenced-by-count":2,"title":["Towards Truthful Feedback in P2P Data Structures"],"prefix":"10.1007","author":[{"given":"Erik","family":"Buchmann","sequence":"first","affiliation":[]},{"given":"Klemens","family":"B\u00f6hm","sequence":"additional","affiliation":[]},{"given":"Christian","family":"von der Weth","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation Systems. Communications of the ACM (CACM)\u00a043 (2000)","DOI":"10.1145\/355112.355122"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Khopkar, T., Li, X., Resnick, P.: Self-Selection, Slipping, Salvaging, Slacking, and Stoning: The Impacts of Negative Feedback at eBay. In: Proceedings of the 6th ACM Conference on Electronic Commerce (EC 2005), pp. 223\u2013231 (2005)","DOI":"10.1145\/1064009.1064033"},{"key":"30_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/11575726_5","volume-title":"Agent-Mediated Electronic Commerce VI. Theories for and Engineering of Distributed Mechanisms and Systems","author":"R. Jurca","year":"2006","unstructured":"Jurca, R., Faltings, B.: \u201cCONFESS\u201d. Eliciting Honest Feedback Without Independent Verification Authorities. In: Faratin, P., Rodr\u00edguez-Aguilar, J.-A. (eds.) AMEC 2004. LNCS, vol.\u00a03435, pp. 59\u201372. Springer, Heidelberg (2006)"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.1287\/mnsc.1050.0379","volume":"51","author":"N. Miller","year":"2005","unstructured":"Miller, N., Resnick, P., Zeckhauser, R.: Eliciting Informative Feedback: The Peer Prediction Method. Management Science\u00a051, 1359\u20131373 (2005)","journal-title":"Management Science"},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1126\/science.1102081","volume":"306","author":"D. Prelec","year":"2004","unstructured":"Prelec, D.: A Bayesian Truth Serum for Subjective Data. Science\u00a0306, 462\u2013466 (2004)","journal-title":"Science"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Gummadi, K., Gummadi, R., Gribble, S.D., Ratnasamy, S., Shenker, S., Stoica, I.: The Impact of DHT Routing Geometry on Resilience and Proximity. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM 2003) (2003)","DOI":"10.1145\/863955.863998"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A Scalable Content-Addressable Network. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM 2001) (2001)","DOI":"10.1145\/383059.383072"},{"key":"30_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/3-540-44751-2_15","volume-title":"Cooperative Information Systems","author":"K. Aberer","year":"2001","unstructured":"Aberer, K.: P-Grid: A Self-Organizing Access Structure for P2P Information Systems. In: Batini, C., Giunchiglia, F., Giorgini, P., Mecella, M. (eds.) CoopIS 2001. LNCS, vol.\u00a02172, pp. 179\u2013194. Springer, Heidelberg (2001)"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Malkhi, D., Naor, M., Ratajczak, D.: Viceroy: A Scalable and Dynamic Emulation of the Butterfly. In: Proceedings of the 21th ACM Symposium on Principles of Distributed Computing (PODC 2002), pp. 183\u2013192 (2002)","DOI":"10.1145\/571825.571857"},{"key":"30_CR10","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. In: Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM 2001) (2001)","DOI":"10.1145\/383059.383071"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"B\u00f6hm, K., Buchmann, E.: Free Riding-Aware Forwarding in Content-Addressable Networks. International Journal on Very Large Data Bases (VLDB) (2006)","DOI":"10.1007\/s00778-005-0175-3"},{"key":"30_CR12","unstructured":"Back, A.: Hashcash - A Denial of Service Counter-Measure (2002), http:\/\/hashcash.org"},{"key":"30_CR13","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Juels, A.: Proofs of Work and Bread Pudding Protocols. In: Proceedings of the 4th International Conference on Communications and Multimedia Security (CMS 1999) (1999)","DOI":"10.1007\/978-0-387-35568-9_18"},{"key":"30_CR14","unstructured":"Dewan, P., Dasgupta, P.: Securing P2P Networks Using Peer Reputations: Is There a Silver Bullet? In: Proceedings of the 2nd IEEE Consumer Communications and Networking Conference (CCNC 2005) (2005)"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM 2001) (2001)","DOI":"10.1145\/502585.502638"},{"key":"30_CR16","unstructured":"Garcia-Molina, H., Schlosser, M.T., Kamvar, S.D.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the 12th International World Wide Web Conference (WWW 2003) (2003)"},{"key":"30_CR17","doi-asserted-by":"crossref","unstructured":"Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering (TKDE)\u00a016 (2004)","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"30_CR18","unstructured":"Prelec, D., Weaver, R.G.: Truthful Answers are Surprisingly Common:Experimental Tests of the Bayesian Truth Serum. In: Proceedings of the Conference on Econometrics and Experimental Economics (CEEE 2006) (2006)"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Cornelli, F., Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Choosing Reputable Servents in a P2P Network. In: Proceedings of the 11th International World Wide Web Conference (WWW 2002), pp. 376\u2013386 (2002)","DOI":"10.1145\/511495.511496"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11914853_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T16:32:28Z","timestamp":1555950748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11914853_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540482871","9783540482895"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11914853_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}