{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:59:54Z","timestamp":1725569994095},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540651017"},{"type":"electronic","value":"9783540496533"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49653-x_88","type":"book-chapter","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T22:10:12Z","timestamp":1290204612000},"page":"891-902","source":"Crossref","is-referenced-by-count":0,"title":["MarketNet: Using Virtual Currency to Protect Information Systems"],"prefix":"10.1007","author":[{"given":"Y.","family":"Yemini","sequence":"first","affiliation":[]},{"given":"A.","family":"Dailianas","sequence":"additional","affiliation":[]},{"given":"D.","family":"Florissi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,15]]},"reference":[{"key":"88_CR1","doi-asserted-by":"crossref","unstructured":"Clearwater, S., editor. \u201cMarket-based Control of Distributed Systems,\u201d World Scientific Press, 1996.","DOI":"10.1142\/2741"},{"key":"88_CR2","unstructured":"Dailianas, A., and Y. Yemini \u201cA Protocol for Secure Financial Transactions,\u201d Paper in Preparation."},{"key":"88_CR3","unstructured":"Hull, J. C. \u201cOptions, Futures, and Other Derivatives,\u201d third edition, Prentice Hall."},{"key":"88_CR4","unstructured":"Kurose, J., M. Schwartz, and Y. Yemini \u201cA Microeconomic Approach to Optimization of Channel Access Policies in Multiaccess Networks,\u201d Proc. Of the 5th International Conference on Distributed Computer Systems, Denver, Colorado, 1995."},{"key":"88_CR5","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1257\/jep.8.3.75","volume":"8","author":"J. MacKie-Mason","year":"1994","unstructured":"MacKie-Mason, J., and H. Varian \u201cEconomic FAQs About the Internet,\u201d in The Journal of Economic Perspectives, vol. 8, no. 3, pp. 75\u201396, 1994. Reprinted (with revisions) in Internet Economics, J. Bailey and L. McKnight, eds. Cambridge, MIT Press, 1996.","journal-title":"The Journal of Economic Perspectives"},{"key":"88_CR6","volume-title":"Public Access to the Internet","author":"J. MacKie-Mason","year":"1993","unstructured":"MacKie-Mason, J., and H. Varian \u201cPricing the Internet,\u201d in B. Kahin and J. Keller, editors, Public Access to the Internet, ACM, Boston, Massachusetts, May 1993."},{"key":"88_CR7","doi-asserted-by":"crossref","unstructured":"Sairamesh, J., D. Ferguson, and Y. Yemini \u201cAn Approach to Pricing, Optimal Allocation and Quality of Service Provisioning in High-speed Packet Networks,\u201d in Proc. of the Conference on Computer Communications, Boston, Massachusetts, April 1995.","DOI":"10.1109\/INFCOM.1995.515988"},{"key":"88_CR8","unstructured":"Schneier, B. \u201cApplied Cryptography,\u201c second edition, John Wiley &Sons, pp. 139\u2013147."},{"key":"88_CR9","unstructured":"Spafford, E. \u201cThe Internet Worm Incident,\u201c Technical Report CSD-TR-933, Department of Computer Sciences, Purdue University, Sept. 19, 1991."},{"key":"88_CR10","unstructured":"Walsh, W., M. Wellman, P. Wurman, and J. MacKie-Mason \u201cSome Economics of Market-Based Distributed Scheduling,\u201d In Proc. of the 8th International Conference on Distributed Computing Systems (ICDCS-98), Amsterdam, the Netherlands, May 1998."},{"key":"88_CR11","doi-asserted-by":"crossref","unstructured":"Yemini, Y. \u201cSelfish Optimization in Computer Networks,\u201d Proc. of the 20th IEEE Conference on Decision and Control, pp. 281\u2013285, San Diego, CA., Dec. 1981.","DOI":"10.1109\/CDC.1981.269551"}],"container-title":["Lecture Notes in Computer Science","Research and Advanced Technology for Digital Libraries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49653-X_88","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T20:45:45Z","timestamp":1551127545000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49653-X_88"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540651017","9783540496533"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-49653-x_88","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}