Introduction to information technology, chapter 2nd, information technologies: Concepts and management ,
Distributed constraint satisfaction for formalizing distributed problem solving, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems, pp.614-621, 1992. ,
DOI : 10.1109/ICDCS.1992.235101
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.3408
An asynchronous complete method for distributed constraint optimization, Proceedings of the second international joint conference on Autonomous agents and multiagent systems , AAMAS '03, pp.161-168, 2003. ,
DOI : 10.1145/860575.860602
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4816
The effect of policies for selecting the solution of a discsp on privacy loss, AAMAS '04: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, pp.1396-1397, 2004. ,
Distributed constraint satisfaction and optimization with privacy enforcement, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)., pp.531-535, 2004. ,
DOI : 10.1109/IAT.2004.1343012
Secure Generalized Vickrey Auction Using Homomorphic Encryption, Lecture Notes in Computer Science, vol.2742 ,
DOI : 10.1007/978-3-540-45126-6_17
Privacy-preserving linear programming, Proceedings of the 2009 ACM symposium on Applied Computing, SAC '09, 2002. ,
DOI : 10.1145/1529282.1529729
Secure and Private Collaborative Linear Programming, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.1-8, 2006. ,
DOI : 10.1109/COLCOM.2006.361848
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.4716
A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming, 2009 International Conference on Advanced Information Networking and Applications, 2009. ,
DOI : 10.1109/AINA.2009.133
A Study of Several Specific Secure Two-party Computation Problems, 2001. ,
Privacy-preserving linear programming, Optimization Letters, vol.185, issue.1, pp.28-34, 2010. ,
DOI : 10.1007/s11590-010-0199-5
A Computational Study of Dantzig-Wolfe Decomposition, 2001. ,
Privacy-preserving cooperative scientific computations, Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp.273-282, 2001. ,
Hiccups on the road to privacy-preserving linear programming, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.117-120, 2009. ,
DOI : 10.1145/1655188.1655207
Integer and combinatorial optimization, 1988. ,
DOI : 10.1002/9781118627372