Foundations of Cryptography Volume II Basic Applications, 2004. ,
Privacy preserving e-negotiation Protocols based on secure multiparty computation, Proceedings of the IEEE SoutheastCon, pp.455-461, 2005. ,
DOI : 10.1109/secon.2005.1423287
A Multi-Attribute Auction Format for Procurement with Limited Disclosure of Buyer???s Preference Structure, Decision Support for Global Enterprises Annals of Information Systems, pp.257-267, 2007. ,
DOI : 10.1007/978-0-387-48137-1_15
Finding Pareto-Optimal Set of Distributed Vectors with Minimum Disclosure, Proceedings of the 6 th International Workshop on Distributed Computing, pp.144-149, 2004. ,
DOI : 10.1007/978-3-540-30536-1_17
Achieving Energy Efficiency and Security in Mobile Cloud Computing, Proceedings of the 3 rd International Conference on Cloud Computing and Services Sciences CLOSER 2013, 2013. ,
A practical approach to solve Secure Multi-party Computation problems, Proceedings of the 2002 workshop on New security paradigms , NSPW '02, pp.127-135, 2002. ,
DOI : 10.1145/844102.844125
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.5419
Towards a Structured Design of Electronic Negotiations, Group Decision and Negotiation, vol.12, issue.4, pp.311-335, 2003. ,
DOI : 10.1023/A:1024867820235
Privacy preserving auctions and mechanism design, Proceedings of the 1st ACM conference on Electronic commerce , EC '99, pp.129-139, 1999. ,
DOI : 10.1145/336992.337028
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.7459
A secure and optimally efficient multi-authority election scheme, European Transactions on Telecommunications, vol.1163, issue.2, pp.481-490, 1997. ,
DOI : 10.1002/ett.4460080506
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.8654
Secure Outsourced Computation in Multi-tenant Cloud, WCSC'11, IBM Workshop on Cryptography and Security in Clouds, 2011. ,