{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:19:56Z","timestamp":1725538796409},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642049033"},{"type":"electronic","value":"9783642049040"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04904-0_24","type":"book-chapter","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T10:21:49Z","timestamp":1254824509000},"page":"177-180","source":"Crossref","is-referenced-by-count":0,"title":["Secure Distributed Human Computation"],"prefix":"10.1007","author":[{"given":"Craig","family":"Gentry","sequence":"first","affiliation":[]},{"given":"Zulfikar","family":"Ramzan","sequence":"additional","affiliation":[]},{"given":"Stuart","family":"Stubblebine","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"24_CR1","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L. Ahn von","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Communications of the ACM\u00a047(2), 56\u201360 (2004)","journal-title":"Communications of the ACM"},{"key":"24_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"von Ahn, L., Dabbish, L.: Labeling Images with a Computer Game. In: ACM CHI 2004 (2004), \n                  \n                    http:\/\/www.espgame.org\/","key":"24_CR3","DOI":"10.1145\/985692.985733"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-Authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 103\u2013118. Springer, Heidelberg (1997)"},{"issue":"4","key":"24_CR5","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1002\/dir.10063","volume":"17","author":"X. Dr\u00e8ze","year":"2003","unstructured":"Dr\u00e8ze, X., Hussherr, F.: Internet Advertising: Is Anybody Watching? Journal of Interactive Marketing\u00a017(4), 8\u201323 (2003)","journal-title":"Journal of Interactive Marketing"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1007\/11507840_28","volume-title":"Financial Cryptography and Data Security","author":"C. Gentry","year":"2005","unstructured":"Gentry, C., Ramzan, Z., Stubblebine, S.: Secure Distributed Human Computation (Short Form). In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol.\u00a03570, pp. 328\u2013332. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Gentry, C., Ramzan, Z., Stubblebine, S.: Secure Distributed Human Computation. In: Proc. ACM Conference on Electronic Commerce (2005)","key":"24_CR7","DOI":"10.1145\/1064009.1064026"},{"key":"24_CR8","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography, vol.\u00a02. Cambridge University Press, Cambridge (2004)"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/3-540-45353-9_31","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"P. Golle","year":"2001","unstructured":"Golle, P., Mironov, I.: Uncheatable Distributed Computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, p. 425. Springer, Heidelberg (2001)"},{"unstructured":"Golle, P., Stubblebine, S.: Distributed computing with payout: task assignment for financial- and strong- security. In: Financial Cryptography 2001 (2001)","key":"24_CR10"},{"unstructured":"Prahalad, C.K., Hart, S.: The Fortune at the Bottom of the Pyramid. Strategy + Business\u00a0(26), Q1 (2000)","key":"24_CR11"},{"unstructured":"Spam Net Web Site, \n                  \n                    http:\/\/www.cloudmark.com","key":"24_CR12"},{"unstructured":"Vipul\u2019s Razor Web Site, \n                  \n                    http:\/\/sourceforge.net\/projects\/razor","key":"24_CR13"},{"unstructured":"Wikipedia. Click Fraud, \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/Click_fraud","key":"24_CR14"},{"doi-asserted-by":"crossref","unstructured":"Zhou, F., Zhuang, L., Zhao, B., Huang, L., Joseph, A.D., Kubiatowicz, J.: Approximate Object Location and Spam Filtering. In: ACM Middleware 2003 (2003)","key":"24_CR15","DOI":"10.1007\/3-540-44892-6_1"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04904-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T00:30:24Z","timestamp":1578529824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04904-0_24"}},"subtitle":["(Extended Abstract)"],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642049033","9783642049040"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04904-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}