{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:12:15Z","timestamp":1725466335930},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642311031"},{"type":"electronic","value":"9783642311048"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31104-8_16","type":"book-chapter","created":{"date-parts":[[2012,6,25]],"date-time":"2012-06-25T12:59:54Z","timestamp":1340629194000},"page":"183-194","source":"Crossref","is-referenced-by-count":5,"title":["Asynchrony and Collusion in the N-party BAR Transfer Problem"],"prefix":"10.1007","author":[{"given":"Xavier","family":"Vila\u00e7a","sequence":"first","affiliation":[]},{"given":"Oksana","family":"Denysyuk","sequence":"additional","affiliation":[]},{"given":"Lu\u00eds","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Anderson, D.: Boinc: A system for public-resource computing and storage. In: Proceedings of the 5th IEEE\/ACM International Workshop on Grid Computing, GRID 2004, Pittsburgh, PA, USA, pp. 4\u201310. IEEE (November 2004)","key":"16_CR1"},{"doi-asserted-by":"crossref","unstructured":"Aiyer, S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.P., Porth, C.: BAR fault tolerance for cooperative services. In: Proceedings of the 20th ACM Symposium on Operating Systems Principles, SOSP 2005, Brighton, United Kingdom, pp. 45\u201358. ACM (October 2005)","key":"16_CR2","DOI":"10.1145\/1095809.1095816"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-642-25873-2_27","volume-title":"Principles of Distributed Systems","author":"X. Vila\u00e7a","year":"2011","unstructured":"Vila\u00e7a, X., Leit\u00e3o, J., Correia, M., Rodrigues, L.: N-party BAR Transfer. In: Fern\u00e0ndez Anta, A., Lipari, G., Roy, M. (eds.) OPODIS 2011. LNCS, vol.\u00a07109, pp. 392\u2013408. Springer, Heidelberg (2011)"},{"issue":"3","key":"16_CR4","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1111\/1467-937X.t01-1-00023","volume":"69","author":"K. Eliaz","year":"2002","unstructured":"Eliaz, K.: Fault-tolerant implementation. Review of Economic Studies\u00a069(3), 589\u2013610 (2002)","journal-title":"Review of Economic Studies"},{"doi-asserted-by":"crossref","unstructured":"Moscibroda, T., Schmid, S., Wattenhofer, R.: On the topologies formed by selfish peers. In: Proceedings of the 25th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, PODC 2006, Denver, CO, USA, pp. 133\u2013142. ACM (July 2006)","key":"16_CR5","DOI":"10.1145\/1146381.1146403"},{"key":"16_CR6","series-title":"Annals of Mathematics Studies","first-page":"287","volume-title":"Contributions to the Theory of Games IV","author":"R.J. Aumann","year":"1959","unstructured":"Aumann, R.J.: Acceptable points in General Cooperative $n$-person Games. In: Contributions to the Theory of Games IV. Annals of Mathematics Studies, vol.\u00a0(40), pp. 287\u2013324. Princeton University Press, Princeton (1959)"},{"issue":"1","key":"16_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/0022-0531(87)90099-8","volume":"42","author":"B. Bernheim","year":"1987","unstructured":"Bernheim, B., Peleg, B., Whinston, M.: Coalition-proof nash equilibria i. concepts. Journal of Economic Theory\u00a042(1), 1\u201312 (1987)","journal-title":"Journal of Economic Theory"},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1006\/game.1996.0095","volume":"17","author":"D. Moreno","year":"1996","unstructured":"Moreno, D., Wooders, J.: Coalition-proof equilibrium. Games and Economic Behavior\u00a017(1), 80\u2013112 (1996)","journal-title":"Games and Economic Behavior"},{"doi-asserted-by":"crossref","unstructured":"Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: Proceedings of the 25th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, PODC 2006, Denver, CO, USA, pp. 53\u201362. ACM (July 2006)","key":"16_CR9","DOI":"10.1145\/1146381.1146393"},{"doi-asserted-by":"crossref","unstructured":"Clement, A., Napper, J., Li, H., Martin, J.P., Alvisi, L., Dahlin, M.: Theory of BAR games. In: Proceedings of the 26th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, PODC 2007, Portland, OR, USA, pp. 358\u2013359. ACM (August 2007)","key":"16_CR10","DOI":"10.1145\/1281100.1281172"},{"unstructured":"Li, H., Clement, A., Wong, E., Napper, J., Roy, I., Alvisi, L., Dahlin, M.: BAR gossip. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2006, Seattle, WA, USA, pp. 191\u2013204. USENIX Association (November 2006)","key":"16_CR11"},{"unstructured":"Li, H., Clement, A., Marchetti, M., Kapritsos, M., Robison, L., Alvisi, L., Dahlin, M.: Flightpath: Obedience vs choice in cooperative services. In: Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008, San Diego, CA, USA, pp. 355\u2013368. USENIX Association (December 2008)","key":"16_CR12"},{"doi-asserted-by":"crossref","unstructured":"Mokhtar, S., Pace, A., Qu\u00e9ma, V.: FireSpam: Spam resilient gossiping in the BAR model. In: Proceedings of the 29th IEEE International Symposium on Reliable Distributed Systems, SRDS 2010, New Delhi, India, pp. 225\u2013234. IEEE (October 2010)","key":"16_CR13","DOI":"10.1109\/SRDS.2010.33"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-642-15763-9_41","volume-title":"Distributed Computing","author":"E.L. Wong","year":"2010","unstructured":"Wong, E.L., Leners, J.B., Alvisi, L.: It\u2019s on Me! The Benefit of Altruism in BAR Environments. In: Lynch, N.A., Shvartsman, A.A. (eds.) DISC 2010. LNCS, vol.\u00a06343, pp. 406\u2013420. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Cachin, C., Guerraoui, R., Rodrigues, L.: Introduction to Reliable and Secure Distributed Programming, 2nd edn. Springer-Verlag New York, Inc. (2011)","key":"16_CR15","DOI":"10.1007\/978-3-642-15260-3"},{"doi-asserted-by":"crossref","unstructured":"Vila\u00e7a, X., Denysyuk, O., Rodrigues, L.: Asynchrony and collusion in the N-party BAR transfer problem. Arxiv preprint arXiv:1204.4044v1 (2012)","key":"16_CR16","DOI":"10.1007\/978-3-642-31104-8_16"}],"container-title":["Lecture Notes in Computer Science","Structural Information and Communication Complexity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31104-8_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:44:55Z","timestamp":1620128695000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31104-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642311031","9783642311048"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31104-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}