E. Turban, R. K. Rainer, and R. E. Potter, Introduction to information technology, chapter 2nd, information technologies: Concepts and management

M. Yokoo, E. H. Durfee, T. Ishida, and K. Kuwabar, Distributed constraint satisfaction for formalizing distributed problem solving, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems, pp.614-621, 1992.
DOI : 10.1109/ICDCS.1992.235101

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.3408

P. J. Modi, W. Shen, M. Tambe, and M. Yokoo, An asynchronous complete method for distributed constraint optimization, Proceedings of the second international joint conference on Autonomous agents and multiagent systems , AAMAS '03, pp.161-168, 2003.
DOI : 10.1145/860575.860602

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4816

M. Silaghi and V. Rajeshirke, The effect of policies for selecting the solution of a discsp on privacy loss, AAMAS '04: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, pp.1396-1397, 2004.

M. C. Silaghi and D. Mitra, Distributed constraint satisfaction and optimization with privacy enforcement, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)., pp.531-535, 2004.
DOI : 10.1109/IAT.2004.1343012

K. Suzuki and M. Yokoo, Secure Generalized Vickrey Auction Using Homomorphic Encryption, Lecture Notes in Computer Science, vol.2742
DOI : 10.1007/978-3-540-45126-6_17

J. Vaidya, Privacy-preserving linear programming, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, 2002.
DOI : 10.1145/1529282.1529729

J. Li and M. J. Atallah, Secure and Private Collaborative Linear Programming, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.1-8, 2006.
DOI : 10.1109/COLCOM.2006.361848

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.4716

J. Vaidya, A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming, 2009 International Conference on Advanced Information Networking and Applications, 2009.
DOI : 10.1109/AINA.2009.133

W. Du, A Study of Several Specific Secure Two-party Computation Problems, 2001.

O. L. Mangasarian, Privacy-preserving linear programming, Optimization Letters, vol.185, issue.1, pp.28-34, 2010.
DOI : 10.1007/s11590-010-0199-5

J. R. Tebboth, A Computational Study of Dantzig-Wolfe Decomposition, 2001.

W. Du and M. J. Atallah, Privacy-preserving cooperative scientific computations, Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp.273-282, 2001.

A. Bednarz, N. Bean, and M. Roughan, Hiccups on the road to privacy-preserving linear programming, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.117-120, 2009.
DOI : 10.1145/1655188.1655207

G. L. Nemhauser and L. A. Wolsey, Integer and combinatorial optimization, 1988.
DOI : 10.1002/9781118627372