{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:55:20Z","timestamp":1725497720339},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/gamenets.2009.5137413","type":"proceedings-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T15:05:14Z","timestamp":1246460714000},"page":"295-298","source":"Crossref","is-referenced-by-count":0,"title":["Secure communication: A mechanism design approach"],"prefix":"10.1109","author":[{"given":"Ludovic","family":"Renou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tristan","family":"Tomala","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910002"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/138027.138036"},{"year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.3982\/TE921"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.2307\/1912346"},{"key":"5","first-page":"32","article-title":"distributed games: from mechanisms to protocols","author":"monderer","year":"1999","journal-title":"Proceedings of the Sixteenth National Conference on Artificial Intelligence"},{"journal-title":"Game Theory","year":"1991","author":"fudenberg","key":"4"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9018-2"}],"event":{"name":"2009 International Conference on Game Theory for Networks (GameNets)","start":{"date-parts":[[2009,5,13]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2009,5,15]]}},"container-title":["2009 International Conference on Game Theory for Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5076471\/5137364\/05137413.pdf?arnumber=5137413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T04:23:51Z","timestamp":1489811031000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5137413\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/gamenets.2009.5137413","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}