{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T05:16:07Z","timestamp":1736658967501,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540681380"},{"type":"electronic","value":"9783540681410"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11944874_12","type":"book-chapter","created":{"date-parts":[[2006,11,27]],"date-time":"2006-11-27T18:41:09Z","timestamp":1164652869000},"page":"124-135","source":"Crossref","is-referenced-by-count":0,"title":["Mechanisms to Induce Random Choice"],"prefix":"10.1007","author":[{"given":"Antoniy","family":"Ganchev","sequence":"first","affiliation":[]},{"given":"Lata","family":"Narayanan","sequence":"additional","affiliation":[]},{"given":"Sunil","family":"Shende","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Conti, M., Gregori, E., Maselli, G.: Cooperation issues in mobile ad hoc networks. In: ICDCSW 2004: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW 2004), pp. 803\u2013808 (2004)","DOI":"10.1109\/ICDCSW.2004.1284125"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Proceedings of MOBIHOC, pp. 226\u2013236 (2002)","DOI":"10.1145\/513800.513828"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Marti, S., Guili, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of ACM MOBICOM, pp. 255\u2013265 (2000)","DOI":"10.1145\/345910.345955"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of Communications and Multimedia Security, pp. 107\u2013121 (2002)","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"12_CR5","unstructured":"Buttyan, L., Hubaux, J.P.: Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report DSC\/2001, Swiss Federal Institue of Technology (2001)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Zhong, S., Chen, J., Yang, Y.R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks. In: Proceedings of IEEE INFOCOM 2003, vol.\u00a03, pp. 1987\u20131997 (2003)","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/TMC.2005.71","volume":"4","author":"P. Kyasanur","year":"2005","unstructured":"Kyasanur, P., Vaidya, N.: Selfish MAC layer misbehavior in wireless networks. IEEE Transactions on Mobile Computing\u00a04, 502\u2013516 (2005)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"12_CR8","volume-title":"A Course In Game Theory","author":"M. Osbourne","year":"1996","unstructured":"Osbourne, M., Rubenstein, A.: A Course In Game Theory. The MIT Press, Cambridge (1996)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Cagalj, M., Ganeriwal, S., Aad, I., Hubaux, J.P.: On selfish behavior in CSMA\/CA networks. In: Proceedings of IEEE INFOCOM 2005, vol.\u00a04, pp. 2513\u20132524 (2005)","DOI":"10.1109\/INFCOM.2005.1498536"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"MacKenzie, A., Wicker, S.: Selfish users in Aloha: a game theoretic approach. In: Proceedings of IEEE Vehicular Technology Conference, pp. 1354\u20131357 (2001)","DOI":"10.1109\/VTC.2001.956417"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Nissan, N., Ronen, A.: Algorithmic mechanism design. In: STOC 1999: Proceedings of the thirty-first annual ACM symposium on Theory of computing, pp. 129\u2013140 (1999)","DOI":"10.1145\/301250.301287"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Feigenbaum, J., Papadimitrou, C., Sami, R., Shenker, S.: A BGP-based mechanism for lowest-cost routing. In: Proceedings of the 21st Symposium on Distributed Computing, pp. 173\u2013182 (2002)","DOI":"10.1145\/571825.571856"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Anderegg, L., Eidenbenz, S.: Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: MobiCom 2003: Proceedings of the 9th annual international conference on Mobile computing and networking, pp. 245\u2013259 (2003)","DOI":"10.1145\/938985.939011"}],"container-title":["Lecture Notes in Computer Science","Internet and Network Economics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11944874_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T04:50:08Z","timestamp":1736657408000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11944874_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540681380","9783540681410"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11944874_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}