{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:42:25Z","timestamp":1742384545054},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540896401"},{"type":"electronic","value":"9783540896418"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89641-8_23","type":"book-chapter","created":{"date-parts":[[2008,11,26]],"date-time":"2008-11-26T13:02:53Z","timestamp":1227704573000},"page":"317-331","source":"Crossref","is-referenced-by-count":11,"title":["Conditional Payments for Computing Markets"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Carbunar","sequence":"first","affiliation":[]},{"given":"Mahesh","family":"Tripunitara","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/3-540-48329-2_26","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"S. Brands","year":"1994","unstructured":"Brands, S.: Untraceable off-line cash in wallets with observers (extended abstract). In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 302\u2013318. Springer, Heidelberg (1994)"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/0-387-34799-2_25","volume-title":"Advances in Cryptology - CRYPTO \u201988","author":"D. Chaum","year":"1990","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 319\u2013327. Springer, Heidelberg (1990)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable grid computing. In: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS) (2004)","DOI":"10.1109\/ICDCS.2004.1281562"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Gentry, C., Ramzan, Z., Stubblebine, S.G.: Secure distributed human computation. In: ACM Conference on Electronic Commerce (2005)","DOI":"10.1145\/1064009.1064026"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/3-540-45353-9_31","volume-title":"Proceedings of RSA Conference 2001, Cryptographer\u2019s track","author":"P. Golle","year":"2001","unstructured":"Golle, P., Mironov, I.: Uncheatable distributed computations. In: Proceedings of RSA Conference 2001, Cryptographer\u2019s track. LNCS, pp. 425\u2013440. Springer, Heidelberg (2001)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/3-540-46088-8_23","volume-title":"Financial Cryptography","author":"P. Golle","year":"2002","unstructured":"Golle, P., Stubblebine, S.G.: Secure distributed computing in a commercial environment. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 279\u2013304. Springer, Heidelberg (2002)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021(2) (1978)","DOI":"10.1145\/359340.359342"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Sarmenta, L.F.G.: Sabotage-tolerance mechanisms for volunteer computing systems. In: Future Generation Computer Systems: Special Issue on Cluster Computing and the Grid, March 18 (2002)","DOI":"10.1016\/S0167-739X(01)00077-2"},{"issue":"11","key":"23_CR9","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Szajda, D., Lawson, B., Owen, J.: Hardening functions for large-scale distributed computations. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 216\u2013224 (2003)","DOI":"10.1109\/SECPRI.2003.1199338"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Szajda, D., Lawson, B., Owen, J.: Toward an optimal redundancy strategy for distributed computations. In: Proceedings of the 2005 IEEE International Conference on Cluster Computing (Cluster) (2005)","DOI":"10.1109\/CLUSTR.2005.347045"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89641-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,4]],"date-time":"2019-03-04T00:18:40Z","timestamp":1551658720000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89641-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540896401","9783540896418"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89641-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}