{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:30:42Z","timestamp":1730226642185,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iat.2004.1343012","type":"proceedings-article","created":{"date-parts":[[2004,11,8]],"date-time":"2004-11-08T16:28:24Z","timestamp":1099931304000},"page":"531-535","source":"Crossref","is-referenced-by-count":11,"title":["Distributed constraint satisfaction and optimization with privacy enforcement"],"prefix":"10.1109","author":[{"given":"M.C.","family":"Silaghi","sequence":"first","affiliation":[]},{"given":"D.","family":"Mitra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Incentive compatible open constraint optimization","author":"fallings","year":"2003","journal-title":"Electronic Commerce"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"10","article-title":"The effect of policies for selecting the solution of a DisCSP on privacy loss","author":"silaghi","year":"2004","journal-title":"AAMAS"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/IAT.2003.1241156"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(01)00174-6"},{"key":"9","article-title":"A suite of secure multi-party algorithms for solving DisCSPs","volume":"cs 2004 4","author":"silaghi","year":"2004","journal-title":"Technical Report"},{"key":"8","article-title":"Solving a distributed CSP with cryptographic multi-party computations, without revealing constraints and without involving trusted servers","author":"silaghi","year":"2003","journal-title":"IJCAI-DCR"},{"key":"11","article-title":"Using privacy loss to guide decisions in distributed CSP search","author":"wallace","year":"2004","journal-title":"FLAIRS'04"},{"key":"12","article-title":"Secure distributed constraint satisfaction: Reaching agreement without revealing private information","author":"yokoo","year":"2002","journal-title":"CP"}],"event":{"name":"Proceedings. IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004).","location":"Beijing, China"},"container-title":["Proceedings. IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9301\/29567\/01343012.pdf?arnumber=1343012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T23:56:16Z","timestamp":1489535776000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1343012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/iat.2004.1343012","relation":{},"subject":[]}}