{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T06:11:33Z","timestamp":1769839893378,"version":"3.49.0"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/infocom.2017.8057004","type":"proceedings-article","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T16:28:21Z","timestamp":1507220901000},"page":"1-9","source":"Crossref","is-referenced-by-count":52,"title":["AccountTrade: Accountable protocols for big data trading against dishonest consumers"],"prefix":"10.1109","author":[{"given":"Taeho","family":"Jung","sequence":"first","affiliation":[]},{"given":"Xiang-Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wenchao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Linlin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Junze","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jiahui","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Cheng","family":"Su","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126295"},{"key":"ref38","first-page":"526","article-title":"Accountability: definition and relationship to verifiability","author":"truderung","year":"2010","journal-title":"CCS"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626306"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1743384.1743409"},{"key":"ref30","author":"lichman","year":"2013","journal-title":"UCI Machine Learning Repository"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1021\/ci600526a"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14778\/2311906.2311907"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAW.2011.37"},{"key":"ref34","volume":"77","author":"rajaraman","year":"2012","journal-title":"Mining of Massive Datasets"},{"key":"ref10","first-page":"21","article-title":"On the resemblance and containment of documents","author":"broder","year":"1997","journal-title":"Compression and Complexity of Sequences"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2009.5274919"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(97)00031-7"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/509961.509965"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1282280.1282359"},{"key":"ref14","author":"commission","year":"2014","journal-title":"Data Brokers A Call for Transparency and Accountability"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/800157.805047"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2046265"},{"key":"ref17","first-page":"281","article-title":"Summary cache: a scalable wide-area web cache sharing protocol","volume":"8","author":"fan","year":"2000","journal-title":"TON"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.157"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.438"},{"key":"ref28","author":"leskovec","year":"0","journal-title":"SNAP Datasets Stanford large network dataset collection"},{"key":"ref4","year":"0","journal-title":"Ftc complaint offers lessons for data broker industry"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15549-9_47"},{"key":"ref3","year":"0","journal-title":"Ftc charges data brokers with helping scammer take more than $7 million from consumers' accounts"},{"key":"ref6","article-title":"A practical and secure coercion-resistant scheme for remote elections","author":"ara\u00fajo","year":"2008","journal-title":"Dagstuhl Seminar Proceedings Schloss Dagstuhl-Leibniz-Zentrum f&#x00FC;r Informatik"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524584"},{"key":"ref5","year":"0","journal-title":"Multimedia computing and computer vision lab"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10082-1_3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24085-0_21"},{"key":"ref2","year":"0","journal-title":"Ftc charges data broker with facilitating the theft of millions of dollars from consumers' accounts"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref1","year":"0","journal-title":"Data markets compared - a look at data market offerings from four providers"},{"key":"ref20","first-page":"119","article-title":"Accountable virtual machines","author":"haeberlen","year":"2010","journal-title":"OSDI"},{"key":"ref22","first-page":"242","article-title":"The append-only web bulletin board","author":"heather","year":"2008","journal-title":"Formal Aspects in Security and Trust"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2015.104"},{"key":"ref24","first-page":"45","article-title":"Collusion-tolerable privacy-preserving sum and product calculation without secure channel","volume":"12","author":"jung","year":"2014","journal-title":"TDSC"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3233\/SW-150175"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2577034"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2366773"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2495122"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.39"},{"key":"ref25","first-page":"221","article-title":"Key frame extraction methodology for video annotation","volume":"4","author":"khurana","year":"2013","journal-title":"IJCEIT"}],"event":{"name":"IEEE INFOCOM 2017 - IEEE Conference on Computer Communications","location":"Atlanta, GA, USA","start":{"date-parts":[[2017,5,1]]},"end":{"date-parts":[[2017,5,4]]}},"container-title":["IEEE INFOCOM 2017 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8049192\/8056940\/08057004.pdf?arnumber=8057004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T23:32:21Z","timestamp":1509147141000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8057004\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/infocom.2017.8057004","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}