-
1
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computating
-
M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for non-cryptographic fault-tolerant distributed computating. In STOC, pages 1-10, 1988.
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Widgerson, A.3
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Com. of ACM, 24(2):84-88, 1981.
-
(1981)
Com. of ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
3
-
-
0242539803
-
Incentive compatible open constraint optimization
-
B. Fallings. Incentive compatible open constraint optimization. In Electronic Commerce, 2003.
-
(2003)
Electronic Commerce
-
-
Fallings, B.1
-
4
-
-
0036498333
-
Multi-agent oriented constraint satisfaction
-
J. Liu, H. Jing, and Y. Tang. Multi-agent oriented constraint satisfaction. Artificial Intelligence, 136:101-144, 2002.
-
(2002)
Artificial Intelligence
, vol.136
, pp. 101-144
-
-
Liu, J.1
Jing, H.2
Tang, Y.3
-
5
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Eurocrypt'99
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Eurocrypt'99, volume 1592 of LNCS, pages 223-238, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
6
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Comm. of the ACM, 22:612-613, 1979.
-
(1979)
Comm. of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
7
-
-
78649710259
-
Arithmetic circuit for the first solution of distributed CSPs with cryptographic multi-party computations
-
Halifax
-
M. Silaghi. Arithmetic circuit for the first solution of distributed CSPs with cryptographic multi-party computations. In IAT, Halifax, 2003.
-
(2003)
IAT
-
-
Silaghi, M.1
-
8
-
-
15544376515
-
Solving a distributed CSP with cryptographic multi-party computations, without revealing constraints and without involving trusted servers
-
M. Silaghi. Solving a distributed CSP with cryptographic multi-party computations, without revealing constraints and without involving trusted servers. In IJCAI-DCR, 2003.
-
(2003)
IJCAI-DCR
-
-
Silaghi, M.1
-
9
-
-
16244406372
-
A suite of secure multi-party algorithms for solving DisCSPs
-
FIT
-
M. Silaghi. A suite of secure multi-party algorithms for solving DisCSPs. Technical Report CS-2004-04, FIT, 2004.
-
(2004)
Technical Report
, vol.CS-2004-04
-
-
Silaghi, M.1
-
10
-
-
4544252889
-
The effect of policies for selecting the solution of a DisCSP on privacy loss
-
M. Silaghi and V. Rajeshirke. The effect of policies for selecting the solution of a DisCSP on privacy loss. In AAMAS, 2004.
-
(2004)
AAMAS
-
-
Silaghi, M.1
Rajeshirke, V.2
-
11
-
-
10044289604
-
Using privacy loss to guide decisions in distributed CSP search
-
R. Wallace and M. Silaghi. Using privacy loss to guide decisions in distributed CSP search. In FLAIRS'04, 2004.
-
(2004)
FLAIRS'04
-
-
Wallace, R.1
Silaghi, M.2
-
12
-
-
4544364879
-
Secure distributed constraint satisfaction: Reaching agreement without revealing private information
-
M. Yokoo, K. Suzuki, and K. Hirayama. Secure distributed constraint satisfaction: Reaching agreement without revealing private information. In CP, 2002.
-
(2002)
CP
-
-
Yokoo, M.1
Suzuki, K.2
Hirayama, K.3
|