Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure
暂无分享,去创建一个
Jaideep Vaidya | Haibing Lu | Lingyu Wang | Yuan Hong | Jaideep Vaidya | Lingyu Wang | Haibing Lu | Yuan Hong
[1] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[2] Yihua Zhang,et al. PICCO: a general-purpose compiler for private distributed computation , 2013, CCS.
[3] Wei Li,et al. Privacy-preserving horizontally partitioned linear programs with inequality constraints , 2013, Optim. Lett..
[4] Jaideep Vaidya,et al. Secure and efficient distributed linear programming , 2012, J. Comput. Secur..
[5] Ananth Grama,et al. An efficient protocol for Yao's millionaires' problem , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[6] Shigenobu Kobayashi,et al. A genetic algorithm for privacy preserving combinatorial optimization , 2007, GECCO '07.
[7] Zvi Galil,et al. Proceedings of the 30th IEEE symposium on Foundations of computer science , 1994, FOCS 1994.
[8] Kenneth Steiglitz,et al. Combinatorial Optimization: Algorithms and Complexity , 1981 .
[9] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[10] N. Metropolis,et al. Equation of State Calculations by Fast Computing Machines , 1953, Resonance.
[11] Jaideep Vaidya,et al. An inference–proof approach to privacy-preserving horizontally partitioned linear programs , 2014, Optim. Lett..
[12] Wenliang Du,et al. A study of several specific secure two-party computation problems , 2001 .
[13] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[14] Jaideep Vaidya. A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[15] G. Croes. A Method for Solving Traveling-Salesman Problems , 1958 .
[16] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[17] Martín Abadi,et al. Code-Carrying Authorization , 2008, ESORICS.
[18] Mikhail J. Atallah,et al. Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[19] Jaideep Vaidya,et al. A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications , 2014, J. Inf. Syst..
[20] Olvi L. Mangasarian. Privacy-preserving horizontally partitioned linear programs , 2012, Optim. Lett..
[21] Chris Clifton,et al. An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems , 2008, Manuf. Serv. Oper. Manag..
[22] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[23] Jaideep Vaidya,et al. Efficient Distributed Linear Programming with Limited Disclosure , 2011, DBSec.
[24] Octavian Catrina,et al. Secure Multiparty Linear Programming Using Fixed-Point Arithmetic , 2010, ESORICS.
[25] Bart Preneel,et al. Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings , 2010, ESORICS.
[26] Chris Clifton,et al. An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems , 2003 .
[27] Yingjiu Li,et al. Data and Applications Security and Privacy XXV , 2011 .
[28] C. D. Gelatt,et al. Optimization by Simulated Annealing , 1983, Science.
[29] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[30] Matthew Roughan,et al. Hiccups on the road to privacy-preserving linear programming , 2009, WPES '09.
[31] Basit Shafiq,et al. Privacy-Preserving Tabu Search for Distributed Graph Coloring , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[32] Jaideep Vaidya,et al. Privacy-preserving linear programming , 2009, SAC '09.
[33] Alice Bednarz,et al. Methods for two-party privacy-preserving linear programming. , 2012 .
[34] Yvo Desmedt,et al. Encryption Schemes , 1999, Algorithms and Theory of Computation Handbook.
[35] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.