[
    {
        "key": "7EDPQAZ4",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/7EDPQAZ4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/7EDPQAZ4",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/1368/items/CT9C5F5U",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 213104,
                "username": "mehdi.piltan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mehdi.piltan",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "7EDPQAZ4",
            "version": 1,
            "parentItem": "CT9C5F5U",
            "itemType": "note",
            "note": "<p>test 2</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-02-07T02:35:22Z",
            "dateModified": "2013-02-07T02:35:27Z"
        }
    },
    {
        "key": "D9C3CCND",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/D9C3CCND",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/D9C3CCND",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/1368/items/W27T5U4Z",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 213104,
                "username": "mehdi.piltan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mehdi.piltan",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "D9C3CCND",
            "version": 1,
            "parentItem": "W27T5U4Z",
            "itemType": "attachment",
            "linkMode": "linked_url",
            "title": "group library annotations files that are transferred to others zotero - Google Search",
            "accessDate": "2013-02-07T02:34:06Z",
            "url": "https://www.google.ca/search?q=%E2%80%A2%09annotations+do+not+stay+on+files+that+are+transferred+to+others&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a#hl=en&client=firefox-a&hs=XJd&tbo=d&rls=org.mozilla:en-US%3Aofficial&sclient=psy-ab&q=group+library+annotations+files+that+are+transferred+to+others+zotero&oq=group+library+annotations+files+that+are+transferred+to+others+zotero&gs_l=serp.3...5317.8288.4.8464.14.14.0.0.0.0.80.794.14.14.0.les%3B..0.0...1c.1.2.serp.wXhTWXw57Hg&pbx=1&bav=on.2,or.r_gc.r_pw.r_cp.r_qf.&bvm=bv.42080656,d.cGE&fp=5724ffdea04b6dbe&biw=1608&bih=508",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-02-07T02:34:06Z",
            "dateModified": "2013-02-07T02:34:06Z"
        }
    },
    {
        "key": "VN3M2R5U",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/VN3M2R5U",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/VN3M2R5U",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 213104,
                "username": "mehdi.piltan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mehdi.piltan",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "VN3M2R5U",
            "version": 1,
            "itemType": "webpage",
            "title": "group library annotations files that are transferred to others zotero - Google Search",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://www.google.ca/search?q=%E2%80%A2%09annotations+do+not+stay+on+files+that+are+transferred+to+others&ie=utf-8&oe=utf-8&aq=t&rls=org.mozilla:en-US:official&client=firefox-a#hl=en&client=firefox-a&hs=XJd&tbo=d&rls=org.mozilla:en-US%3Aofficial&sclient=psy-ab&q=group+library+annotations+files+that+are+transferred+to+others+zotero&oq=group+library+annotations+files+that+are+transferred+to+others+zotero&gs_l=serp.3...5317.8288.4.8464.14.14.0.0.0.0.80.794.14.14.0.les%3B..0.0...1c.1.2.serp.wXhTWXw57Hg&pbx=1&bav=on.2,or.r_gc.r_pw.r_cp.r_qf.&bvm=bv.42080656,d.cGE&fp=5724ffdea04b6dbe&biw=1608&bih=508",
            "accessDate": "2013-02-07T02:33:41Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "FQTQ8DET"
            ],
            "relations": {},
            "dateAdded": "2013-02-07T02:33:41Z",
            "dateModified": "2013-02-07T02:33:41Z"
        }
    },
    {
        "key": "Z7R8BQQ4",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/Z7R8BQQ4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/Z7R8BQQ4",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/1368/items/JBVBM8Z6",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 213104,
                "username": "mehdi.piltan",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mehdi.piltan",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "Z7R8BQQ4",
            "version": 1,
            "parentItem": "JBVBM8Z6",
            "itemType": "note",
            "note": "<p>Test</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-02-07T02:33:27Z",
            "dateModified": "2013-02-07T02:33:35Z"
        }
    },
    {
        "key": "C3PNXNPW",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/C3PNXNPW",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/C3PNXNPW",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Mataric",
            "parsedDate": "1993",
            "numChildren": 0
        },
        "data": {
            "key": "C3PNXNPW",
            "version": 1,
            "itemType": "conferencePaper",
            "title": "Designing emergent behaviors: from local interactions to collective intelligence",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Maja J",
                    "lastName": "Mataric"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "Proceedings of the second international conference on From animals to animats 2 : simulation of adaptive behavior",
            "conferenceName": "",
            "publisher": "MIT Press",
            "place": "Cambridge, MA, USA",
            "date": "1993",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "432–441",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "0-262-63149-0",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "Honolulu, Hawai, United States",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "79KDKG3A"
            ],
            "relations": {},
            "dateAdded": "2009-08-21T11:41:44Z",
            "dateModified": "2009-08-21T11:41:44Z"
        }
    },
    {
        "key": "W27T5U4Z",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/W27T5U4Z",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/W27T5U4Z",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Varas and Hirsch",
            "parsedDate": "2008-11-12",
            "numChildren": 1
        },
        "data": {
            "key": "W27T5U4Z",
            "version": 1,
            "itemType": "conferencePaper",
            "title": "Bandwidth Overload Avoidance using D-Caf: A Distributed Context-Aware Firewall",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Cristián",
                    "lastName": "Varas"
                },
                {
                    "creatorType": "author",
                    "firstName": "Thomas",
                    "lastName": "Hirsch"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "",
            "conferenceName": "Jornadas Chilenas de Computación",
            "publisher": "",
            "place": "Punta Arenas, Chile",
            "date": "2008-11-12",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "en",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "FQTQ8DET"
            ],
            "relations": {},
            "dateAdded": "2009-08-21T11:40:53Z",
            "dateModified": "2009-08-21T11:40:53Z"
        }
    },
    {
        "key": "CGI32TJB",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/CGI32TJB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/CGI32TJB",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Kleis et al.",
            "parsedDate": "2007-12",
            "numChildren": 0
        },
        "data": {
            "key": "CGI32TJB",
            "version": 1,
            "itemType": "conferencePaper",
            "title": "Network Immunity: What can we learn from nature for network protection?",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "M.",
                    "lastName": "Kleis"
                },
                {
                    "creatorType": "author",
                    "firstName": "T.",
                    "lastName": "Hirsch"
                },
                {
                    "creatorType": "author",
                    "firstName": "T.",
                    "lastName": "Zseby"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "Bio-Inspired Models of Network, Information and Computing Systems, 2007. Bionetics 2007. 2nd",
            "conferenceName": "",
            "publisher": "",
            "place": "",
            "date": "Dec. 2007",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "283-286",
            "series": "",
            "seriesNumber": "",
            "DOI": "10.1109/BIMNICS.2007.4610128",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "artificial immune systems"
                },
                {
                    "tag": "communication networks"
                },
                {
                    "tag": "network immunity"
                },
                {
                    "tag": "network protection"
                },
                {
                    "tag": "security of data"
                },
                {
                    "tag": "telecommunication computing"
                },
                {
                    "tag": "telecommunication networks"
                },
                {
                    "tag": "telecommunication securityartificial immune systems"
                }
            ],
            "collections": [
                "FQTQ8DET"
            ],
            "relations": {},
            "dateAdded": "2009-08-21T11:40:34Z",
            "dateModified": "2009-08-21T11:40:34Z"
        }
    },
    {
        "key": "P8ADFAG8",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/P8ADFAG8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/P8ADFAG8",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Zseby et al.",
            "parsedDate": "2008",
            "numChildren": 0
        },
        "data": {
            "key": "P8ADFAG8",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Self-Protecting Networks - How Cooperation Strategies Can Strengthen Network Security (Selbstschützende Netze - Netzwerksicherheit durch Kooperation)",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Tanja",
                    "lastName": "Zseby"
                },
                {
                    "creatorType": "author",
                    "firstName": "Michael",
                    "lastName": "Kleis"
                },
                {
                    "creatorType": "author",
                    "firstName": "Thomas",
                    "lastName": "Hirsch"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "it - Information Technology",
            "publisher": "",
            "place": "",
            "date": "2008",
            "volume": "50",
            "issue": "6",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "390-396",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2009-08-21T11:40:30Z",
            "dateModified": "2009-08-21T11:40:30Z"
        }
    },
    {
        "key": "CT9C5F5U",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/CT9C5F5U",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/CT9C5F5U",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Khurana",
            "parsedDate": "2005",
            "numChildren": 1
        },
        "data": {
            "key": "CT9C5F5U",
            "version": 1,
            "itemType": "book",
            "title": "Autonomic nervous system : a practical introduction.",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Ramesh",
                    "lastName": "Khurana"
                }
            ],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2005",
            "publisher": "Butterworth-Heinemann Med",
            "place": "[S.l.]",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "9780750672245",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "FQTQ8DET"
            ],
            "relations": {},
            "dateAdded": "2009-08-21T11:39:54Z",
            "dateModified": "2009-08-21T11:39:54Z"
        }
    },
    {
        "key": "XIH9DAN9",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/XIH9DAN9",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/XIH9DAN9",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Hirt et al.",
            "parsedDate": "2000",
            "numChildren": 0
        },
        "data": {
            "key": "XIH9DAN9",
            "version": 1,
            "itemType": "book",
            "title": "Efficient Secure Multi-Party Computation",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Martin",
                    "lastName": "Hirt"
                },
                {
                    "creatorType": "author",
                    "firstName": "Ueli",
                    "lastName": "Maurer"
                },
                {
                    "creatorType": "author",
                    "firstName": "Bartosz",
                    "lastName": "Przydatek"
                }
            ],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2000",
            "publisher": "",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "MTU57TD3"
            ],
            "relations": {},
            "dateAdded": "2009-08-21T11:38:18Z",
            "dateModified": "2009-08-21T11:38:18Z"
        }
    },
    {
        "key": "C2R4JVMT",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/C2R4JVMT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/C2R4JVMT",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Herranz Sotoca",
            "parsedDate": "2005",
            "numChildren": 0
        },
        "data": {
            "key": "C2R4JVMT",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Some Digital Signature Schemes with Collective Signers",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Javier",
                    "lastName": "Herranz Sotoca"
                }
            ],
            "abstractNote": "ABSTRACT Digital signatures are one of the most important consequences of the appearance of public key cryptography, in 1976. These schemes provide authentication, integrity and non-repudiation to digital communications. Some extensions or variations of the concept of digital signature have been introduced, and many specific realizations of these new types of nature schemes have been proposed. In this thesis, we deal with the basic definitions and required security properties of traditional signature schemes and two of its extensions: distributed signature schemes and ring signature schemes. We review the state of the art in these two topics; then we propose and analyze new specific schemes for different scenarios. Namely, we first study distributed signature schemes for general access structures, based on RSA; then we show that such schemes can be used to construct other cryptographic protocols: distributed key distribution schemes and metering schemes. With respect to ring signatures, we opose schemes for both a scenario where the keys are of the Discrete Logarithm type and a scenario where the public keys of users are inferred from their personal identities. Finally, we also propose some distributed ring signature schemes, a kind of schemes which combine the concepts of distributed signatures and ring signatures. We formally prove the security of all these proposals, assuming that some mathematical problems are hard to solve. Specifically, we base the security of our schemes in the hardness of either the RSA problem, or the Discrete Logarithm problem, or the Computational Diffie-Hellman problem.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "2005",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.tesisenxarxa.net/TDX-0518105-161043/",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "http://www.scientificcommons.org/2314584",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "743"
                },
                {
                    "tag": "APLICADA"
                },
                {
                    "tag": "IV"
                },
                {
                    "tag": "MATEMÀTICA"
                }
            ],
            "collections": [
                "MTU57TD3"
            ],
            "relations": {
                "owl:sameAs": "http://zotero.org/groups/1355/items/CG5C32KC"
            },
            "dateAdded": "2009-08-21T11:37:13Z",
            "dateModified": "2009-08-21T11:37:13Z"
        }
    },
    {
        "key": "2FQ27TPS",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/2FQ27TPS",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/2FQ27TPS",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Daza et al.",
            "parsedDate": "2008",
            "numChildren": 0
        },
        "data": {
            "key": "2FQ27TPS",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Some Protocols Useful on the Internet from Threshold Signature Schemes",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Vanesa",
                    "lastName": "Daza"
                },
                {
                    "creatorType": "author",
                    "firstName": "Javier",
                    "lastName": "Herranz"
                },
                {
                    "creatorType": "author",
                    "firstName": "Germán",
                    "lastName": "Sáez"
                }
            ],
            "abstractNote": "In a threshold signature scheme, a group of players shares some secret information in such a way that only those subsets with a minimum number of players can compute a valid signature. In this paper we propose methods to construct some computationally secure distributed protocols from threshold signature schemes. Namely, we construct metering schemes from threshold non-interactive signature schemes. We also show that threshold deterministic signature schemes can be used to design distributed key distribution schemes. Furthermore, the constructed protocols attain some desirable properties and have useful applications on the Internet. 1",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "2008",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://citeseerx.ist.psu.edu/viewdoc/summary?doi=?doi=10.1.1.118.6303",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "http://www.scientificcommons.org/42416270",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "MTU57TD3"
            ],
            "relations": {
                "owl:sameAs": "http://zotero.org/groups/1355/items/5UK4R6J7"
            },
            "dateAdded": "2009-08-21T11:36:35Z",
            "dateModified": "2009-08-21T11:36:35Z"
        }
    },
    {
        "key": "BJDAT8D6",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/BJDAT8D6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/BJDAT8D6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "BJDAT8D6",
            "version": 1,
            "itemType": "webpage",
            "title": "Nick Szabo's Home Page",
            "creators": [],
            "abstractNote": "",
            "websiteTitle": "",
            "websiteType": "",
            "date": "",
            "publisher": "",
            "place": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://szabo.best.vwh.net/index.html",
            "accessDate": "2009-06-02T08:27:49Z",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "MTU57TD3"
            ],
            "relations": {
                "owl:sameAs": "http://zotero.org/groups/1355/items/XH52UV2P"
            },
            "dateAdded": "2009-08-21T11:36:35Z",
            "dateModified": "2009-08-21T11:36:35Z"
        }
    },
    {
        "key": "SSWTNCMZ",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/SSWTNCMZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/SSWTNCMZ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Georgiou and Shvartsman",
            "parsedDate": "2007",
            "numChildren": 0
        },
        "data": {
            "key": "SSWTNCMZ",
            "version": 1,
            "itemType": "book",
            "title": "Do-All Computing in Distributed Systems",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Chryssis",
                    "lastName": "Georgiou"
                },
                {
                    "creatorType": "author",
                    "firstName": "Alex A",
                    "lastName": "Shvartsman"
                }
            ],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2007",
            "publisher": "Springer-Verlag New York, Inc.",
            "place": "Secaucus, NJ, USA",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "0387309187",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "MTU57TD3"
            ],
            "relations": {
                "owl:sameAs": "http://zotero.org/groups/1355/items/4N3EVJBH"
            },
            "dateAdded": "2009-08-21T11:36:35Z",
            "dateModified": "2009-08-21T11:36:35Z"
        }
    },
    {
        "key": "T72U2I93",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/T72U2I93",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/T72U2I93",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Daza et al.",
            "parsedDate": "2007",
            "numChildren": 0
        },
        "data": {
            "key": "T72U2I93",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Cryptographic techniques for mobile ad-hoc networks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "V",
                    "lastName": "Daza"
                },
                {
                    "creatorType": "author",
                    "firstName": "J",
                    "lastName": "Herranz"
                },
                {
                    "creatorType": "author",
                    "firstName": "P",
                    "lastName": "Morillo"
                },
                {
                    "creatorType": "author",
                    "firstName": "C",
                    "lastName": "Rafols"
                }
            ],
            "abstractNote": "In this paper, we propose some cryptographic techniques to securely set up a mobile ad-hoc network. The process is fully self-managed by the nodes, without any trusted party. New nodes can join the network and are able to obtain the same capabilities as initial nodes; further, each node can obtain a pair of secret/public keys to secure and authenticate its communication. Two additional features of our system are that it allows to implement threshold operations (signature or decryption) involving subgroups of nodes in the network and that any subgroup with a small number of nodes (between 2 and 6) can obtain a common secret key without any communication after the set up phase.",
            "publicationTitle": "Computer Networks",
            "publisher": "",
            "place": "",
            "date": "12/2007",
            "volume": "51",
            "issue": "18",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "4938-4950",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "Computer Networks",
            "DOI": "10.1016/j.comnet.2007.08.002",
            "citationKey": "",
            "url": "http://linkinghub.elsevier.com/retrieve/pii/S1389128607002253",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "13891286",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "MTU57TD3"
            ],
            "relations": {
                "owl:sameAs": "http://zotero.org/groups/1355/items/2F3Z9U8A"
            },
            "dateAdded": "2009-08-21T11:36:35Z",
            "dateModified": "2009-08-21T11:36:35Z"
        }
    },
    {
        "key": "TAM2DQ29",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/TAM2DQ29",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/TAM2DQ29",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Gambetta",
            "parsedDate": "1988",
            "numChildren": 0
        },
        "data": {
            "key": "TAM2DQ29",
            "version": 1,
            "itemType": "conferencePaper",
            "title": "Can We Trust Trust?",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Diego",
                    "lastName": "Gambetta"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "Trust: Making and Breaking Cooperative Relations",
            "conferenceName": "",
            "publisher": "Basil Blackwell",
            "place": "",
            "date": "1988",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "213–237",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "MTU57TD3"
            ],
            "relations": {
                "owl:sameAs": "http://zotero.org/groups/1355/items/2IGW8XI4"
            },
            "dateAdded": "2009-08-21T11:36:35Z",
            "dateModified": "2009-08-21T11:36:35Z"
        }
    },
    {
        "key": "QW86ENCH",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/QW86ENCH",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/QW86ENCH",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Douceur",
            "parsedDate": "2002",
            "numChildren": 0
        },
        "data": {
            "key": "QW86ENCH",
            "version": 1,
            "itemType": "conferencePaper",
            "title": "The Sybil Attack",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "John R",
                    "lastName": "Douceur"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems",
            "conferenceName": "",
            "publisher": "Springer-Verlag",
            "place": "London, UK",
            "date": "2002",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "251–260",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "3-540-44179-4",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2009-08-21T11:32:56Z",
            "dateModified": "2009-08-21T11:32:56Z"
        }
    },
    {
        "key": "JBVBM8Z6",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/JBVBM8Z6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/JBVBM8Z6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Dasgupta",
            "parsedDate": "1999",
            "numChildren": 1
        },
        "data": {
            "key": "JBVBM8Z6",
            "version": 1,
            "itemType": "book",
            "title": "Artificial immune systems and their applications",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "D",
                    "lastName": "Dasgupta"
                }
            ],
            "abstractNote": "",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "1999",
            "publisher": "Springer",
            "place": "Berlin ;;New York",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "9783540643906",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "FQTQ8DET"
            ],
            "relations": {},
            "dateAdded": "2009-08-21T11:30:59Z",
            "dateModified": "2009-08-21T11:30:59Z"
        }
    },
    {
        "key": "WQ7GZAK6",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/WQ7GZAK6",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/WQ7GZAK6",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Antoniadis et al.",
            "parsedDate": "2004",
            "numChildren": 0
        },
        "data": {
            "key": "WQ7GZAK6",
            "version": 1,
            "itemType": "journalArticle",
            "title": "Comparing economic incentives in peer-to-peer networks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Panayotis",
                    "lastName": "Antoniadis"
                },
                {
                    "creatorType": "author",
                    "firstName": "Costas",
                    "lastName": "Courcoubetis"
                },
                {
                    "creatorType": "author",
                    "firstName": "Robin",
                    "lastName": "Mason"
                }
            ],
            "abstractNote": "Users who join a peer-to-peer network have, in general, suboptimal incentives to contribute to the network, because of the externalities that exist between them. The result is an inefficient network where the overall levels of contribution are less than would be the case if each peer acted in the interests of the entire network of peers. Incentives provided in the form of prices or contribution rules that require no money transfers can play an important role in reducing these inefficiency effects. The problem in designing such incentive schemes is information: Designing an optimal incentive scheme requires complete knowledge of the types and preferences of the individual peers and their identities. In this paper we discuss the above issues in terms of a simple but representative example by introducing the basic economic concepts and models. We then investigate the practical issue of designing several simpler incentive schemes requiring less information and compare their efficiency loss to the optimal. We show using numerical analysis that these schemes converge to a fixed proportion of the full information optimal as the number of peers in the network becomes large. This result means that it is not necessary to collect large amounts of information, or to undertake complicated calculations, in order to implement the correct incentives in a large peer-to-peer network.",
            "publicationTitle": "Computer Networks",
            "publisher": "",
            "place": "",
            "date": "2004",
            "volume": "46",
            "issue": "1",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "133 - 146",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "DOI: 10.1016/j.comnet.2004.03.021",
            "citationKey": "",
            "url": "http://www.sciencedirect.com/science/article/B6VRG-4C4VYJ7-1/2/0d72ff3c8c9492b3f15c539837040015",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "1389-1286",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "Internet Economics: Pricing and Policies",
            "tags": [
                {
                    "tag": "Mechanism"
                },
                {
                    "tag": "design"
                }
            ],
            "collections": [
                "K3ZZIWJT"
            ],
            "relations": {},
            "dateAdded": "2009-06-02T13:37:10Z",
            "dateModified": "2009-06-02T13:37:10Z"
        }
    },
    {
        "key": "9SJA5R8E",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/9SJA5R8E",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/9SJA5R8E",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Cohen",
            "parsedDate": "2003",
            "numChildren": 0
        },
        "data": {
            "key": "9SJA5R8E",
            "version": 1,
            "itemType": "book",
            "title": "Incentives Build Robustness in BitTorrent",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Bram",
                    "lastName": "Cohen"
                }
            ],
            "abstractNote": "The BitTorrent file distribution system uses tit-for-tat as a method of seeking pareto efficiency. It achieves a higher level of robustness and resource utilization than any currently known cooperative technique. We explain what BitTorrent does, and how economic methods are used to achieve that goal.",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "2003",
            "publisher": "",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "K3ZZIWJT"
            ],
            "relations": {},
            "dateAdded": "2009-06-02T13:32:23Z",
            "dateModified": "2009-06-02T13:32:23Z"
        }
    },
    {
        "key": "CDMRUDS5",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/CDMRUDS5",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/CDMRUDS5",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Osborne",
            "numChildren": 0
        },
        "data": {
            "key": "CDMRUDS5",
            "version": 1,
            "itemType": "bookSection",
            "title": "Nash equilibrium: Theory",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Martin J.",
                    "lastName": "Osborne"
                }
            ],
            "abstractNote": "Game-theoretic reasoning pervades economic theory and is used widely in other social and behavioral sciences. An Introduction to Game Theory , by Martin J. Osborne, presents the main principles of game theory and shows how they can be used to understand economic, social, political, and biological phenomena. The book introduces in an accessible manner the main ideas behind the theory rather than their mathematical expression. All concepts are defined precisely, and logical reasoning is used throughout. The book requires an understanding of basic mathematics but assumes no specific knowledge of economics, political science, or other social or behavioral sciences.\n\nCoverage includes the fundamental concepts of strategic games, extensive games with perfect information, and coalitional games; the more advanced subjects of Bayesian games and extensive games with imperfect information; and the topics of repeated games, bargaining theory, evolutionary equilibrium, rationalizability, and maxminimization. The book offers a wide variety of illustrations from the social and behavioral sciences and more than 280 exercises. Each topic features examples that highlight theoretical points and illustrations that demonstrate how the theory may be used. Explaining the key concepts of game theory as simply as possible while maintaining complete precision, An Introduction to Game Theory is ideal for undergraduate and introductory graduate courses in game theory.",
            "bookTitle": "An Introduction to Game Theory",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "",
            "publisher": "",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "pages": "",
            "ISBN": "9780195128956",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.economics.utoronto.ca/osborne/igt/",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "K3ZZIWJT"
            ],
            "relations": {},
            "dateAdded": "2009-06-02T13:29:00Z",
            "dateModified": "2009-06-02T13:30:14Z"
        }
    },
    {
        "key": "EEHQAJHA",
        "version": 1,
        "library": {
            "type": "group",
            "id": 1368,
            "name": "Collaboration",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/collaboration",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/1368/items/EEHQAJHA",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/collaboration/items/EEHQAJHA",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 27252,
                "username": "relet",
                "name": "Thomas Hirsch",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/relet",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Roughgarden",
            "parsedDate": "2005-05",
            "numChildren": 0
        },
        "data": {
            "key": "EEHQAJHA",
            "version": 1,
            "itemType": "book",
            "title": "Selfish Routing and the Price of Anarchy",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Tim",
                    "lastName": "Roughgarden"
                }
            ],
            "abstractNote": "Most of us prefer to commute by the shortest route available, without taking into account the traffic congestion that we cause for others. Many networks, including computer networks, suffer from some type of this \"selfish routing.\" In Selfish Routing and the Price of Anarchy, Tim Roughgarden studies the loss of social welfare caused by selfish, uncoordinated behavior in networks. He quantifies the price of anarchy—the worst-possible loss of social welfare from selfish routing—and also discusses several methods for improving the price of anarchy with centralized control.\n\nRoughgarden begins with a relatively nontechnical introduction to selfish routing, describing two important examples that motivate the problems that follow. The first, Pigou's Example, demonstrates that selfish behavior need not generate a socially optimal outcome. The second, the counterintiuitve Braess's Paradox, shows that network improvements can degrade network performance. He then develops techniques for quantifying the price of anarchy (with Pigou's Example playing a central role). Next, he analyzes Braess's Paradox and the computational complexity of detecting it algorithmically, and he describes Stackelberg routing, which improves the price of anarchy using a modest degree of central control. Finally, he defines several open problems that may inspire further research. Roughgarden's work will be of interest not only to researchers and graduate students in theoretical computer science and optimization but also to other computer scientists, as well as to economists, electrical engineers, and mathematicians.",
            "series": "",
            "seriesNumber": "",
            "volume": "",
            "numberOfVolumes": "",
            "edition": "",
            "date": "May 2005",
            "publisher": "MIT Press",
            "place": "",
            "originalDate": "",
            "originalPublisher": "",
            "originalPlace": "",
            "format": "",
            "numPages": "",
            "ISBN": "978-0-262-18243-0",
            "DOI": "",
            "citationKey": "",
            "url": "http://mitpress.mit.edu/catalog/item/default.asp?tid=10339&ttype=2",
            "accessDate": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "K3ZZIWJT"
            ],
            "relations": {},
            "dateAdded": "2009-06-02T13:25:51Z",
            "dateModified": "2009-06-02T13:26:48Z"
        }
    }
]