Parallelizing secure linear programming
暂无分享,去创建一个
[1] Hau L. Lee,et al. Information sharing in a supply chain , 2000, Int. J. Manuf. Technol. Manag..
[2] John A. Nelder,et al. A Simplex Method for Function Minimization , 1965, Comput. J..
[3] Richard Pibernik,et al. An approach to inter-domain master planning in supply chains , 2007 .
[4] G. L. Thompson,et al. Solving Linear Programs Using Distributed Parallel Computing. , 1994 .
[5] Matthew Wiswall,et al. A Parallel Implementation of the Simplex Function Minimization Routine , 2007 .
[6] Herbert E. Scarf,et al. Optimal Policies for a Multi-Echelon Inventory Problem , 1960, Manag. Sci..
[7] George B. Dantzig,et al. Linear Programming 1: Introduction , 1997 .
[8] Matthew K. Franklin,et al. Efficient Generation of Shared RSA Keys (Extended Abstract) , 1997, CRYPTO.
[9] Ivan Damgård,et al. A generalization of Paillier’s public-key system with applications to electronic voting , 2010, International Journal of Information Security.
[10] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[11] Debmalya Biswas,et al. On the practical importance of communication complexity for secure multi-party computation protocols , 2009, SAC '09.
[12] Marshall L. Fisher,et al. Supply Chain Inventory Management and the Value of Shared Information , 2000 .
[13] Jacek Gondzio,et al. Parallel interior-point solver for structured linear programs , 2003, Math. Program..
[14] G. Rosenberg. Enumeration of All Extreme Equilibria of Bimatrix Games with Integer Pivoting and Improved Degeneracy Check , 2005 .
[15] David F. Pyke,et al. Inventory management and production planning and scheduling , 1998 .
[16] Mikhail J. Atallah,et al. Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[17] Jan Camenisch,et al. Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.
[18] M. Padberg. Linear Optimization and Extensions , 1995 .
[19] Luigi Rizzo,et al. Dummynet: a simple approach to the evaluation of network protocols , 1997, CCRV.
[20] R. Kapuściński,et al. Value of Information in Capacitated Supply Chains , 1999 .
[21] Wang Dong,et al. BSP-based parallel simplex method , 2000, Proceedings Fourth International Conference/Exhibition on High Performance Computing in the Asia-Pacific Region.
[22] Herbert Meyr,et al. Planning Hierarchy, Modeling and Advanced Planning Systems , 2003, Supply Chain Management.
[23] Ivan Damgård,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000, EUROCRYPT.
[24] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[25] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[26] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[27] Stephen J. Wright. Primal-Dual Interior-Point Methods , 1997, Other Titles in Applied Mathematics.
[28] Ivan Damgård,et al. Multiparty Computation Goes Live , 2008, IACR Cryptol. ePrint Arch..
[29] Leslie G. Valiant,et al. A bridging model for parallel computation , 1990, CACM.
[30] Robert J. Vanderbei,et al. Linear Programming: Foundations and Extensions , 1998, Kluwer international series in operations research and management service.
[31] Florian Kerschbaum,et al. Security against the business partner , 2008, SWS '08.