{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T16:10:26Z","timestamp":1742314226241,"version":"3.40.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/allerton.2011.6120234","type":"proceedings-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T21:40:38Z","timestamp":1325886038000},"page":"682-692","source":"Crossref","is-referenced-by-count":3,"title":["One-to-n scrip systems for cooperative privacy-enhancing technologies"],"prefix":"10.1109","author":[{"given":"Mathias","family":"Humbert","sequence":"first","affiliation":[]},{"given":"Mohammad Hossein","family":"Manshaei","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"15","article-title":"Where do we stand on maximum entropy","author":"jaynes","year":"1978","journal-title":"The Maximum Entropy Formalism"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36504-4_20"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866344"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1397705.1397713"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MDSO.2005.31"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1145\/586110.586137","article-title":"Tarzan: A peer-to-peer anonymizing network layer","author":"freedman","year":"2002","journal-title":"CCS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1134707.1134723"},{"journal-title":"Challenges in Deploying Low-latency Anonymity","year":"2005","author":"dingledine","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2005.19"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03821-1_4"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1250910.1250955"},{"journal-title":"Measuring the Tor Network Evaluations of Client Requests to Directories","year":"2009","author":"loesing","key":"22"},{"key":"23","article-title":"Building incentives into Tor","author":"ngan","year":"2010","journal-title":"Financial Cryptography"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316887","author":"puterman","year":"1994","journal-title":"Markov Decision Processes"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-27809-2_24","article-title":"Practical anonymity for the masses with morphmix","author":"rennhard","year":"2004","journal-title":"Financial Cryptography"},{"journal-title":"Adventures in Stochastic Processes","year":"1992","author":"resnick","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462147"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.2307\/1992001"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.2140\/pjm.1955.5.285"},{"journal-title":"USA Today","article-title":"Communities print their own currency to keep cash flowing","year":"2009","key":"3"},{"journal-title":"Tor Project","year":"0","key":"2"},{"key":"10","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"0","journal-title":"Proceedings of 13th USENIX Security Symposium 2004"},{"journal-title":"Tor Metrics Portal","year":"0","key":"1"},{"key":"30","article-title":"Karma: A secure economic framework for peer-to-peer resource sharing","author":"vishnumurthy","year":"0","journal-title":"Workshop on Economics of Peer-to-Peer Systems 2003"},{"key":"7","article-title":"Participatory sensing","author":"burke","year":"0","journal-title":"World Sensor Web Workshop 2006"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-70630-4_14","article-title":"Par: Payment for anonymous routing","author":"androulaki","year":"2008","journal-title":"Privacy Enhancing Technologies"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-45126-6_7","article-title":"On the economics of anonymity","author":"acquisti","year":"2003","journal-title":"Financial Cryptography"},{"journal-title":"Tor Partially Blocked in China","year":"2009","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655195"}],"event":{"name":"2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","start":{"date-parts":[[2011,9,28]]},"location":"Monticello, IL","end":{"date-parts":[[2011,9,30]]}},"container-title":["2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111659\/6120135\/06120234.pdf?arnumber=6120234","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T15:35:52Z","timestamp":1742312152000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6120234\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/allerton.2011.6120234","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}