-
1
-
-
35048875418
-
Secure computation of the fcth-ranked element
-
Interlaken, Switzerland
-
Aggarwal, G., N. Mishra, B. Pinkas. 2004. Secure computation of the fcth-ranked element. Proc. IACR Eurocrypt (EUROCRYPT04), Interlaken, Switzerland, 40-55.
-
(2004)
Proc. IACR Eurocrypt (EUROCRYPT04)
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
2
-
-
77954694081
-
Secure supply-chain protocols
-
Newport Beach, CA
-
Atallah, M. J., H. G. Elmongui, V Deshpande, L. B. Schwarz. 2003. Secure supply-chain protocols. IEEE Internat. Conf E-Commerce. Newport Beach, CA, 293-302. http://doi.ieeecomputersociety.org/10.1109/COEC.2003.1210264.
-
(2003)
IEEE Internat. Conf E-Commerce
, pp. 293-302
-
-
Atallah, M.J.1
Elmongui, H.G.2
Deshpande, V.3
Schwarz, L.B.4
-
3
-
-
61349134994
-
How seagoing chemical Haulers may have tried to divide market
-
February 20
-
Bandler, J. 2003. How seagoing chemical Haulers may have tried to divide market. Wall Street J. (February 20) A1.
-
(2003)
Wall Street J
-
-
Bandler, J.1
-
5
-
-
0001018101
-
An O(N log N) planar travelling salesman heuristic based on spacefilling curves
-
Bartholdi III, J. J., L. K. Platzman. 1982. An O(N log N) planar travelling salesman heuristic based on spacefilling curves. Oper. Res. Lett. 1(4) 121-125.
-
(1982)
Oper. Res. Lett
, vol.1
, Issue.4
, pp. 121-125
-
-
Bartholdi III, J.J.1
Platzman, L.K.2
-
6
-
-
0023981296
-
Heuristics based on space-filling curves for combinatorial problems in Euclidean space
-
Bartholdi III, J. J., L. K. Platzman. 1988. Heuristics based on space-filling curves for combinatorial problems in Euclidean space. Management Sci. 34(3) 157-160.
-
(1988)
Management Sci
, vol.34
, Issue.3
, pp. 157-160
-
-
Bartholdi III, J.J.1
Platzman, L.K.2
-
8
-
-
3042684929
-
A cryptographic solution to a game theoretic problem
-
Springer-Verlag, Berlin, Germany
-
Dodis, Y., S. Halevi, T. Rabin. 2000. A cryptographic solution to a game theoretic problem. Advances in Cryptology-CRYPTO 2000. Springer-Verlag, Berlin, Germany.
-
(2000)
Advances in Cryptology-CRYPTO 2000
-
-
Dodis, Y.1
Halevi, S.2
Rabin, T.3
-
9
-
-
26444497804
-
General cryptographic protocols
-
Cambridge University Press, New York
-
Goldreich, O. 2004a. General cryptographic protocols. The Foundations of Cryptography, Vol. 2. Cambridge University Press, New York.
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
10
-
-
26444553177
-
Encryption schemes
-
Cambridge University Press, New York
-
Goldreich, O. 2004b. Encryption schemes. The Foundations of Cryptography, Vol. 2. Cambridge University Press, New York.
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
11
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
ACM Press, New York
-
Goldreich, O., S. Micali, A. Wigderson. 1987. How to play any mental game - A completeness theorem for protocols with honest majority. 19th ACM Sympos. Theory Comput. ACM Press, New York, 218-229.
-
(1987)
19th ACM Sympos. Theory Comput
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
0034221374
-
The surplus inventory matching problem in the process industry
-
Kalagnanam, J., M. Trumbo, H. S. Lee. 2000. The surplus inventory matching problem in the process industry. Oper. Res. 48(4) 505-516.
-
(2000)
Oper. Res
, vol.48
, Issue.4
, pp. 505-516
-
-
Kalagnanam, J.1
Trumbo, M.2
Lee, H.S.3
-
14
-
-
0012907739
-
Quantitative analysis for Internetenabled supply chains
-
Keskinocak, P., S. Tayur. 2001. Quantitative analysis for Internetenabled supply chains. Interfaces 31(2) 70-89.
-
(2001)
Interfaces
, vol.31
, Issue.2
, pp. 70-89
-
-
Keskinocak, P.1
Tayur, S.2
-
15
-
-
0015604699
-
An effective heuristic algorithm for the traveling-salesman problem
-
Lin, S., B. W. Kernighan. 1973. An effective heuristic algorithm for the traveling-salesman problem. Oper. Res. 21(2) 498-516.
-
(1973)
Oper. Res
, vol.21
, Issue.2
, pp. 498-516
-
-
Lin, S.1
Kernighan, B.W.2
-
16
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
Menezes, A. J., P. C. van Oorschot, S. A. Vanstone. 1996. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
17
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
ACM Press, Atlanta, GA
-
Naor, M., B. Pinkas. 1999. Oblivious transfer and polynomial evaluation. Proc. Thirty-First Annual ACM Sympos. Theory Comput. ACM Press, Atlanta, GA, 245-254.
-
(1999)
Proc. Thirty-First Annual ACM Sympos. Theory Comput
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
19
-
-
51749088711
-
Data encryption standard (DES)
-
NIS, 46-2, National Institutes of Standards and Technology, Gaithersburg, MD
-
NIS. 1988. Data encryption standard (DES). Technical Report FIPS PUB 46-2, National Institutes of Standards and Technology, Gaithersburg, MD. http://www.itl.nist.gov/fipspubs/fip46-2.htm.
-
(1988)
Technical Report FIPS PUB
-
-
-
20
-
-
0003629991
-
Secure hash standard
-
NIS, 180-1, National Institutes of Standards and Technology, Gaithersburg, MD
-
NIS. 1995. Secure hash standard. Technical Report FIPS PUB 180-1, National Institutes of Standards and Technology, Gaithersburg, MD. http://www.itl.nist.gov/fipspubs/fipl80-1.htm.
-
(1995)
Technical Report FIPS PUB
-
-
-
22
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE Computer Society Press, Los Alamitos, CA
-
Yao, A. C. 1986. How to generate and exchange secrets. Proc. 27th IEEE Sympos. Foundations Comput. Sci. IEEE Computer Society Press, Los Alamitos, CA, 162-167.
-
(1986)
Proc. 27th IEEE Sympos. Foundations Comput. Sci
, pp. 162-167
-
-
Yao, A.C.1
|