You are here

Bibliography

Export 8 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is SMC  [Clear All Filters]
2011
Dreier J, Kerschbaum F. Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation. In: PASSAT'11 - Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust. PASSAT'11 - Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust. Boston, Massachusetts, USA: IEEE Computer Society; 2011. pp. 916-924.
Pibernik R, Zhang Y, Kerschbaum F, Schröpfer A. Secure collaborative supply chain planning and inverse optimization - The JELS model. European Journal of Operations Research [Internet]. 2011 ;208(1):75 - 85 . Available from: http://www.sciencedirect.com/science/article/pii/S0377221710005552
2010
Burkhart M, Strasser M, Many D, Dimitropoulos X. SEPIA: privacy-preserving aggregation of multi-domain network events and statistics. In: Proceedings of the 19th USENIX conference on Security. Proceedings of the 19th USENIX conference on Security. Washington, DC, USA: USENIX Association; 2010. pp. 15–15. Available from: http://dl.acm.org/citation.cfm?id=1929820.1929840
2009
Bogetoft P, Christensen DL, Damgárd I, Geisler M, Jakobsen T, Krøigaard M, Nielsen JD, Nielsen JB, Nielsen K, Pagter J, et al. Financial Cryptography and Data Security. In: Dingledine R, Golle P Financial Cryptography and Data Security. Vol. 6052. 1stst ed. Financial Cryptography and Data Security. Berlin, Heidelberg: Springer-Verlag; 2009. pp. 325–343. Available from: http://dx.doi.org/10.1007/978-3-642-03549-4_20
2008
Ben-David A, Nisan N, Pinkas B. FairplayMP: a system for secure multi-party computation. In: CCS'08 - Proceedings of the 15th ACM conference on Computer and communications security. CCS'08 - Proceedings of the 15th ACM conference on Computer and communications security. Alexandria, VA, USA: ACM; 2008. pp. 257–266. Available from: http://doi.acm.org/10.1145/1455770.1455804
Faltings B, Leaute T, Petcu A. Privacy guarantees through distributed constraint satisfaction. Lausanne, Switzerland: Swiss Federal Institute of Technology (EPFL); 2008.
2006
Atallah M, Blanton M, Deshpand V, Frikken K, Li J, Schwarz L. Secure Collaborative Planning, Forecasting, and Replenishment. In: Proceedings of Multi-Echelon/Public Applications of Supply Chain Management Conference. Proceedings of Multi-Echelon/Public Applications of Supply Chain Management Conference. ; 2006. pp. 1-52.
2004
Atallah M, Bykova M, Li J, Frikken K, Topkara M. Private collaborative forecasting and benchmarking. In: WPES'04 - Proceedings of the 2004 ACM workshop on Privacy in the electronic society. WPES'04 - Proceedings of the 2004 ACM workshop on Privacy in the electronic society. Washington, DC, USA: ACM; 2004. pp. 103–114. Available from: http://doi.acm.org/10.1145/1029179.1029204