메뉴 건너뛰기




Volumn 10, Issue 1, 2008, Pages 108-125

An approach to securely identifying beneficial collaboration in decentralized logistics systems

Author keywords

Algorithm; Collaboration; Cryptography; Incentive compatible; Routing; Space filling curve

Indexed keywords

COLLABORATION; CRYPTOGRAPHIC TECHNIQUES; DELIVERY TASKS; EMPIRICAL DATUM; INCENTIVE COMPATIBLE; LOGISTICS SYSTEMS; MANAGE INFORMATIONS; OPERATIONS MANAGEMENTS; PICK-UP; POTENTIAL EFFICIENCIES; POTENTIAL VALUES; ROUTING; SPACE-FILLING CURVE; TRUCKING COMPANIES;

EID: 61349161743     PISSN: 15234614     EISSN: 15265498     Source Type: Journal    
DOI: 10.1287/msom.1070.0167     Document Type: Article
Times cited : (25)

References (22)
  • 3
    • 61349134994 scopus 로고    scopus 로고
    • How seagoing chemical Haulers may have tried to divide market
    • February 20
    • Bandler, J. 2003. How seagoing chemical Haulers may have tried to divide market. Wall Street J. (February 20) A1.
    • (2003) Wall Street J
    • Bandler, J.1
  • 5
    • 0001018101 scopus 로고
    • An O(N log N) planar travelling salesman heuristic based on spacefilling curves
    • Bartholdi III, J. J., L. K. Platzman. 1982. An O(N log N) planar travelling salesman heuristic based on spacefilling curves. Oper. Res. Lett. 1(4) 121-125.
    • (1982) Oper. Res. Lett , vol.1 , Issue.4 , pp. 121-125
    • Bartholdi III, J.J.1    Platzman, L.K.2
  • 6
    • 0023981296 scopus 로고
    • Heuristics based on space-filling curves for combinatorial problems in Euclidean space
    • Bartholdi III, J. J., L. K. Platzman. 1988. Heuristics based on space-filling curves for combinatorial problems in Euclidean space. Management Sci. 34(3) 157-160.
    • (1988) Management Sci , vol.34 , Issue.3 , pp. 157-160
    • Bartholdi III, J.J.1    Platzman, L.K.2
  • 7
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Diffie, W., M. Hellman. 1976. New directions in cryptography. IEEE Trans. Inform. Theory IT-22(6) 644-654.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 8
    • 3042684929 scopus 로고    scopus 로고
    • A cryptographic solution to a game theoretic problem
    • Springer-Verlag, Berlin, Germany
    • Dodis, Y., S. Halevi, T. Rabin. 2000. A cryptographic solution to a game theoretic problem. Advances in Cryptology-CRYPTO 2000. Springer-Verlag, Berlin, Germany.
    • (2000) Advances in Cryptology-CRYPTO 2000
    • Dodis, Y.1    Halevi, S.2    Rabin, T.3
  • 9
    • 26444497804 scopus 로고    scopus 로고
    • General cryptographic protocols
    • Cambridge University Press, New York
    • Goldreich, O. 2004a. General cryptographic protocols. The Foundations of Cryptography, Vol. 2. Cambridge University Press, New York.
    • (2004) The Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 10
    • 26444553177 scopus 로고    scopus 로고
    • Encryption schemes
    • Cambridge University Press, New York
    • Goldreich, O. 2004b. Encryption schemes. The Foundations of Cryptography, Vol. 2. Cambridge University Press, New York.
    • (2004) The Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 11
    • 0023545076 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • ACM Press, New York
    • Goldreich, O., S. Micali, A. Wigderson. 1987. How to play any mental game - A completeness theorem for protocols with honest majority. 19th ACM Sympos. Theory Comput. ACM Press, New York, 218-229.
    • (1987) 19th ACM Sympos. Theory Comput , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 13
    • 0034221374 scopus 로고    scopus 로고
    • The surplus inventory matching problem in the process industry
    • Kalagnanam, J., M. Trumbo, H. S. Lee. 2000. The surplus inventory matching problem in the process industry. Oper. Res. 48(4) 505-516.
    • (2000) Oper. Res , vol.48 , Issue.4 , pp. 505-516
    • Kalagnanam, J.1    Trumbo, M.2    Lee, H.S.3
  • 14
    • 0012907739 scopus 로고    scopus 로고
    • Quantitative analysis for Internetenabled supply chains
    • Keskinocak, P., S. Tayur. 2001. Quantitative analysis for Internetenabled supply chains. Interfaces 31(2) 70-89.
    • (2001) Interfaces , vol.31 , Issue.2 , pp. 70-89
    • Keskinocak, P.1    Tayur, S.2
  • 15
    • 0015604699 scopus 로고
    • An effective heuristic algorithm for the traveling-salesman problem
    • Lin, S., B. W. Kernighan. 1973. An effective heuristic algorithm for the traveling-salesman problem. Oper. Res. 21(2) 498-516.
    • (1973) Oper. Res , vol.21 , Issue.2 , pp. 498-516
    • Lin, S.1    Kernighan, B.W.2
  • 19
    • 51749088711 scopus 로고
    • Data encryption standard (DES)
    • NIS, 46-2, National Institutes of Standards and Technology, Gaithersburg, MD
    • NIS. 1988. Data encryption standard (DES). Technical Report FIPS PUB 46-2, National Institutes of Standards and Technology, Gaithersburg, MD. http://www.itl.nist.gov/fipspubs/fip46-2.htm.
    • (1988) Technical Report FIPS PUB
  • 20
    • 0003629991 scopus 로고
    • Secure hash standard
    • NIS, 180-1, National Institutes of Standards and Technology, Gaithersburg, MD
    • NIS. 1995. Secure hash standard. Technical Report FIPS PUB 180-1, National Institutes of Standards and Technology, Gaithersburg, MD. http://www.itl.nist.gov/fipspubs/fipl80-1.htm.
    • (1995) Technical Report FIPS PUB
  • 22
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • IEEE Computer Society Press, Los Alamitos, CA
    • Yao, A. C. 1986. How to generate and exchange secrets. Proc. 27th IEEE Sympos. Foundations Comput. Sci. IEEE Computer Society Press, Los Alamitos, CA, 162-167.
    • (1986) Proc. 27th IEEE Sympos. Foundations Comput. Sci , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.