{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T05:44:16Z","timestamp":1748583856384},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353109"},{"type":"electronic","value":"9783642353116"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35311-6_5","type":"book-chapter","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T07:32:28Z","timestamp":1354606348000},"page":"58-71","source":"Crossref","is-referenced-by-count":11,"title":["Bayesian Mechanism Design with Efficiency, Privacy, and Approximate Truthfulness"],"prefix":"10.1007","author":[{"given":"Samantha","family":"Leung","sequence":"first","affiliation":[]},{"given":"Edward","family":"Lui","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: FOCS, pp. 94\u2013103 (2007)","DOI":"10.1109\/FOCS.2007.4389483"},{"key":"5_CR2","unstructured":"Xiao, D.: Is privacy compatible with truthfulness? IACR ePrint (2011)"},{"key":"5_CR3","unstructured":"Chen, Y., Chong, S., Kash, I.A., Moran, T., Vadhan, S.P.: Truthful mechanisms for agents that value privacy (2011) (manuscript)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Nissim, K., Smorodinsky, R., Tennenholtz, M.: Approximately optimal mechanism design via differential privacy. In: ITCS, pp. 203\u2013213 (2012)","DOI":"10.2139\/ssrn.2017224"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Nissim, K., Orlandi, C., Smorodinsky, R.: Privacy-aware mechanism design. In: EC, pp. 774\u2013789 (2012)","DOI":"10.1145\/2229012.2229073"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Huang, Z., Kannan, S.: The exponential mechanism for social welfare: Private, truthful, and nearly optimal. In: FOCS (2012)","DOI":"10.1109\/FOCS.2012.36"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"5_CR9","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press (1991)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press (2007)","DOI":"10.1017\/CBO9780511800481"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Shoham, Y., Leyton-Brown, K.: Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press (2009)","DOI":"10.1017\/CBO9780511811654"},{"issue":"2","key":"5_CR12","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1137\/1023038","volume":"23","author":"S.H. Tijs","year":"1981","unstructured":"Tijs, S.H.: Nash equilibria for noncooperative n-person games in normal form. SIAM Review\u00a023(2), 225\u2013237 (1981)","journal-title":"SIAM Review"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Abraham, I., Dolev, D., Halpern, J., Gonen, R.: Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation. In: PODC, pp. 53\u201362 (2006)","DOI":"10.1145\/1146381.1146393"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Halpern, J.Y.: Beyond nash equilibrium: solution concepts for the 21st century. In: PODC (2008)","DOI":"10.1145\/1400751.1400752"},{"key":"5_CR15","unstructured":"Halpern, J., Pass, R.: Game theory with costly computation: Formulation and application to protocol security. In: ICS, pp. 120\u2013142 (2010)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Birrell, E., Pass, R.: Approximately strategy-proof voting. In: IJCAI, pp. 67\u201372 (2011)","DOI":"10.21236\/ADA582553"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Kothari, A., Parkes, D.C., Suri, S.: Approximately-strategyproof and tractable multi-unit auctions (2004)","DOI":"10.1145\/779928.779948"},{"issue":"1","key":"5_CR18","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.geb.2003.08.002","volume":"48","author":"J. Schummer","year":"2004","unstructured":"Schummer, J.: Almost-dominant strategy implementation: exchange economies. Games and Economic Behavior\u00a048(1), 154\u2013170 (2004)","journal-title":"Games and Economic Behavior"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-642-25385-0_12","volume-title":"ASIACRYPT 2011","author":"R. Bhaskar","year":"2011","unstructured":"Bhaskar, R., Bhowmick, A., Goyal, V., Laxman, S., Thakurta, A.: Noiseless Database Privacy. In: Lee, D.H. (ed.) ASIACRYPT 2011. LNCS, vol.\u00a07073, pp. 215\u2013232. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Internet and Network Economics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35311-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T13:49:37Z","timestamp":1557409777000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35311-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353109","9783642353116"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35311-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}