{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T23:04:05Z","timestamp":1762297445229,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/gamenets.2009.5137423","type":"proceedings-article","created":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T11:05:14Z","timestamp":1246446314000},"page":"374-383","source":"Crossref","is-referenced-by-count":5,"title":["Combinatorial agency with audits"],"prefix":"10.1109","author":[{"given":"Raphael","family":"Eidenbenz","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/MDSO.2005.31"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.2307\/1912246"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.2307\/3003320"},{"year":"2004","author":"foster","journal-title":"The Grid Blueprint for a New Computing Infrastructure","key":"15"},{"key":"16","first-page":"425440","article-title":"uncheatable distributed computations","author":"golle","year":"2001","journal-title":"Proc 2001 Conf Topics in Cryptology (CT-RSA '01)"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1111\/j.1468-0262.2007.00734.x"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1111\/j.0347-0520.2004.00372.x"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1037\/0022-3514.64.2.257"},{"key":"12","article-title":"distrust - the hidden cost of control","volume":"1203","author":"falk","year":"2004","journal-title":"IZA Discussion Paper IZA DP No"},{"key":"21","article-title":"distributed asymmetric verification in computational grids","author":"kuhn","year":"2008","journal-title":"Proc 22nd IEEE International Parallel and Distributed Processing Symposium (IPDPS)"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1016\/0304-405X(76)90026-X"},{"year":"0","key":"22"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1017\/CBO9780511800481"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1007\/3-540-61680-2_82"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1145\/380752.380883"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1177\/014616728062007"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1111\/j.1467-6494.1985.tb00375.x"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1016\/j.labeco.2004.06.001"},{"key":"29","doi-asserted-by":"crossref","DOI":"10.1109\/SECPRI.2003.1199338","article-title":"hardening functions for large scale distributed computations","author":"szajda","year":"2003","journal-title":"Proc 2003 IEEE Symposium on Security and Privacy"},{"key":"3","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/11944874_32","article-title":"mixed strategies in combinatorial agency","author":"babaioff","year":"2006","journal-title":"Proc 2nd International Workshop on Internet and Network Economics (WINE)"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/1134707.1134710"},{"key":"10","article-title":"working paper","author":"emek","year":"2008","journal-title":"Computing Optimal Contracts in Series-Parallel Heterogeneous Combinatorial Agencies"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/GRID.2004.14"},{"key":"7","article-title":"uncheatable grid computing","author":"du","year":"2004","journal-title":"Proc 24th International Conference on Distributed Computing Systems (ICDCS)"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/1282380.1282395"},{"year":"1975","author":"crew","journal-title":"Theory of the Firm","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1111\/j.1468-0335.1937.tb00002.x"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.2307\/258191"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1007\/978-3-540-77120-3_33"}],"event":{"name":"2009 International Conference on Game Theory for Networks (GameNets)","start":{"date-parts":[[2009,5,13]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2009,5,15]]}},"container-title":["2009 International Conference on Game Theory for Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5076471\/5137364\/05137423.pdf?arnumber=5137423","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T17:28:39Z","timestamp":1497806919000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5137423\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/gamenets.2009.5137423","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}