{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T11:31:00Z","timestamp":1778499060257,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,5]],"date-time":"2011-06-05T00:00:00Z","timestamp":1307232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,5]]},"DOI":"10.1145\/1993574.1993605","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T11:53:52Z","timestamp":1307361232000},"page":"199-208","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":174,"title":["Selling privacy at auction"],"prefix":"10.1145","author":[{"given":"Arpita","family":"Ghosh","sequence":"first","affiliation":[{"name":"Yahoo Research, Santa Clara, CA, USA"}]},{"given":"Aaron","family":"Roth","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.13"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2133036.2133090"},{"key":"e_1_3_2_1_4_1","volume-title":"The New York Times","author":"Clifford Stephanie","year":"2010"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2005.04.007"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of Theory and Applications of Models of Computation, 5th International Conference, TAMC 2008","volume":"4978","author":"Dwork C.","year":"2008"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807342.1807369"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the ACM-SIAM Symposium on Discrete Algorithms","author":"Gupta A.","year":"2010"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536464"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"J. Hartline and A. Karlin. Profit maximization in mechanism design. Algorithmic Game Theory page 331 2007.  J. Hartline and A. Karlin. Profit maximization in mechanism design. Algorithmic Game Theory page 331 2007.","DOI":"10.1017\/CBO9780511800481.015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374390"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/234215.234476"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1028128.1028156"},{"key":"e_1_3_2_1_15_1","volume-title":"The New York Times","author":"Lohr Steve","year":"2010"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.41"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"K. Nissim R. Smorodinsky and M. Tennenholtz. Approximately Optimal Mechanism Design via Differential Privacy. Arxiv preprint arXiv:1004.2888 2010.  K. Nissim R. Smorodinsky and M. Tennenholtz. Approximately Optimal Mechanism Design via Differential Privacy. Arxiv preprint arXiv:1004.2888 2010.","DOI":"10.2139\/ssrn.2017224"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.78"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1695143"}],"event":{"name":"EC '11: ACM Conference on Electronic Commerce","location":"San Jose California USA","acronym":"EC '11","sponsor":["SIGecom Special Interest Group on Economics and Computation"]},"container-title":["Proceedings of the 12th ACM conference on Electronic commerce"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993574.1993605","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993574.1993605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:05Z","timestamp":1750244405000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993574.1993605"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,5]]},"references-count":19,"alternative-id":["10.1145\/1993574.1993605","10.1145\/1993574"],"URL":"https:\/\/doi.org\/10.1145\/1993574.1993605","relation":{},"subject":[],"published":{"date-parts":[[2011,6,5]]},"assertion":[{"value":"2011-06-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}