메뉴 건너뛰기




Volumn , Issue , 2004, Pages 531-535

Distributed constraint satisfaction and optimization with privacy enforcement

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT SATISFACTION PROBLEM (CSP); DISTRIBUTED NEGOTIATION; MODEL OPTIMIZATION; PRIVACY ENFORCEMENT;

EID: 16244381413     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAT.2004.1343012     Document Type: Conference Paper
Times cited : (59)

References (12)
  • 1
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computating
    • M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for non-cryptographic fault-tolerant distributed computating. In STOC, pages 1-10, 1988.
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Widgerson, A.3
  • 2
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Com. of ACM, 24(2):84-88, 1981.
    • (1981) Com. of ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 3
    • 0242539803 scopus 로고    scopus 로고
    • Incentive compatible open constraint optimization
    • B. Fallings. Incentive compatible open constraint optimization. In Electronic Commerce, 2003.
    • (2003) Electronic Commerce
    • Fallings, B.1
  • 4
    • 0036498333 scopus 로고    scopus 로고
    • Multi-agent oriented constraint satisfaction
    • J. Liu, H. Jing, and Y. Tang. Multi-agent oriented constraint satisfaction. Artificial Intelligence, 136:101-144, 2002.
    • (2002) Artificial Intelligence , vol.136 , pp. 101-144
    • Liu, J.1    Jing, H.2    Tang, Y.3
  • 5
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Eurocrypt'99
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Eurocrypt'99, volume 1592 of LNCS, pages 223-238, 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 6
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Comm. of the ACM, 22:612-613, 1979.
    • (1979) Comm. of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 7
    • 78649710259 scopus 로고    scopus 로고
    • Arithmetic circuit for the first solution of distributed CSPs with cryptographic multi-party computations
    • Halifax
    • M. Silaghi. Arithmetic circuit for the first solution of distributed CSPs with cryptographic multi-party computations. In IAT, Halifax, 2003.
    • (2003) IAT
    • Silaghi, M.1
  • 8
    • 15544376515 scopus 로고    scopus 로고
    • Solving a distributed CSP with cryptographic multi-party computations, without revealing constraints and without involving trusted servers
    • M. Silaghi. Solving a distributed CSP with cryptographic multi-party computations, without revealing constraints and without involving trusted servers. In IJCAI-DCR, 2003.
    • (2003) IJCAI-DCR
    • Silaghi, M.1
  • 9
    • 16244406372 scopus 로고    scopus 로고
    • A suite of secure multi-party algorithms for solving DisCSPs
    • FIT
    • M. Silaghi. A suite of secure multi-party algorithms for solving DisCSPs. Technical Report CS-2004-04, FIT, 2004.
    • (2004) Technical Report , vol.CS-2004-04
    • Silaghi, M.1
  • 10
    • 4544252889 scopus 로고    scopus 로고
    • The effect of policies for selecting the solution of a DisCSP on privacy loss
    • M. Silaghi and V. Rajeshirke. The effect of policies for selecting the solution of a DisCSP on privacy loss. In AAMAS, 2004.
    • (2004) AAMAS
    • Silaghi, M.1    Rajeshirke, V.2
  • 11
    • 10044289604 scopus 로고    scopus 로고
    • Using privacy loss to guide decisions in distributed CSP search
    • R. Wallace and M. Silaghi. Using privacy loss to guide decisions in distributed CSP search. In FLAIRS'04, 2004.
    • (2004) FLAIRS'04
    • Wallace, R.1    Silaghi, M.2
  • 12
    • 4544364879 scopus 로고    scopus 로고
    • Secure distributed constraint satisfaction: Reaching agreement without revealing private information
    • M. Yokoo, K. Suzuki, and K. Hirayama. Secure distributed constraint satisfaction: Reaching agreement without revealing private information. In CP, 2002.
    • (2002) CP
    • Yokoo, M.1    Suzuki, K.2    Hirayama, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.