-
1
-
-
70349243955
-
Security against the business partner
-
New York, NY, USA: ACM
-
F. Kerschbaum and R. J. Deitos, "Security against the business partner," in SWS '08: Proceedings of the 2008 ACM workshop on Secure web services. New York, NY, USA: ACM, 2008, pp. 1-10.
-
(2008)
SWS '08: Proceedings of the 2008 ACM workshop on Secure web services
, pp. 1-10
-
-
Kerschbaum, F.1
Deitos, R.J.2
-
2
-
-
77952903083
-
2008 data breach investigations report
-
Rep
-
W. Baker, D. Hylender, and A. Valentine, "2008 data breach investigations report," Rep., 2008.
-
(2008)
-
-
Baker, W.1
Hylender, D.2
Valentine, A.3
-
3
-
-
73649110531
-
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses
-
New York, NY, USA: ACM
-
R. Deitos, F. Kerschbaum, and P. Robinson, "A comprehensive security architecture for dynamic, web service based virtual organizations for businesses," in SWS '06: Proceedings of the 3rd ACM workshop on Secure web services. New York, NY, USA: ACM, 2006, pp. 103-104.
-
(2006)
SWS '06: Proceedings of the 3rd ACM workshop on Secure web services
, pp. 103-104
-
-
Deitos, R.1
Kerschbaum, F.2
Robinson, P.3
-
4
-
-
73649121229
-
Secure collaborative planning, forecasting, and replenishment,
-
Tech. Rep
-
V. Deshpande, M. Atallah, M. Blanton, K. Frikken, J. Li, and L. Schwarz, "Secure collaborative planning, forecasting, and replenishment," Tech. Rep., 2006.
-
(2006)
-
-
Deshpande, V.1
Atallah, M.2
Blanton, M.3
Frikken, K.4
Li, J.5
Schwarz, L.6
-
5
-
-
0002663868
-
The bullwhip effect in supply chains
-
H. Lee, P. Padmanabhan, and S. Whang, "The bullwhip effect in supply chains," Sloan Management Review, vol. 38, pp. 93-102, 1997.
-
(1997)
Sloan Management Review
, vol.38
, pp. 93-102
-
-
Lee, H.1
Padmanabhan, P.2
Whang, S.3
-
6
-
-
0034249441
-
Supply chain inventory management and the value of shared information
-
G. Cachon and M. Fisher, "Supply chain inventory management and the value of shared information," Management Science, vol. 46, no. 8, pp. 1032-1048, 2000.
-
(2000)
Management Science
, vol.46
, Issue.8
, pp. 1032-1048
-
-
Cachon, G.1
Fisher, M.2
-
8
-
-
33644553829
-
Centralised and decentralised supply chain planning
-
R. Pibernik and E. Sucky, "Centralised and decentralised supply chain planning," International Journal of Integrated Supply Management, vol. 2, no. 1/2, pp. 6-27, 2006.
-
(2006)
International Journal of Integrated Supply Management
, vol.2
, Issue.1-2
, pp. 6-27
-
-
Pibernik, R.1
Sucky, E.2
-
10
-
-
34249952289
-
An approach to inter-domain master planning in supply chains
-
July
-
R. Pibernik and E. Sucky, "An approach to inter-domain master planning in supply chains," International Journal of Production Economics, vol. 108, no. 1-2, pp. 200-212, July 2007.
-
(2007)
International Journal of Production Economics
, vol.108
, Issue.1-2
, pp. 200-212
-
-
Pibernik, R.1
Sucky, E.2
-
11
-
-
11844260076
-
Optimal policies for a multi-echelon inventory problem
-
A. J. Clark and H. Scarf, "Optimal policies for a multi-echelon inventory problem," Manage. Sci., vol. 50, no. 12 Supplement, pp. 1782-1790, 2004.
-
(2004)
Manage. Sci
, vol.50
, Issue.12 SUPPL.EMENT
, pp. 1782-1790
-
-
Clark, A.J.1
Scarf, H.2
-
13
-
-
0023545076
-
How to play any mental game
-
New York, NY, USA: ACM
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game," in STOC '87: Proceedings of the nineteenth annual ACM conference on Theory of computing. New York, NY, USA: ACM, 1987, pp. 218-229.
-
(1987)
STOC '87: Proceedings of the nineteenth annual ACM conference on Theory of computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
15
-
-
72949089461
-
On the practical importance of commmunication complexity for secure multi-party computation protocols
-
F. Kerschbaum, D. Dahlmeier, A. Schröpfer, and D. Biswas, "On the practical importance of commmunication complexity for secure multi-party computation protocols," ACM Symposium on Applied Computing, 2009.
-
(2009)
ACM Symposium on Applied Computing
-
-
Kerschbaum, F.1
Dahlmeier, D.2
Schröpfer, A.3
Biswas, D.4
-
16
-
-
38149066808
-
Primitives and applications for multi-party computation,
-
Ph.D. dissertation, University of Aarhus
-
T. Toft, "Primitives and applications for multi-party computation," Ph.D. dissertation, University of Aarhus, 2007.
-
(2007)
-
-
Toft, T.1
-
18
-
-
63449103075
-
A length-flexible threshold cryptosystem with applications
-
proceedings of ACISP'03
-
I. B. Damgard and M. J. Jurik, "A length-flexible threshold cryptosystem with applications," in In proceedings of ACISP'03, LNCS series, vol. 2727, 2003, pp. 350-364.
-
(2003)
LNCS series
, vol.2727
, pp. 350-364
-
-
Damgard, I.B.1
Jurik, M.J.2
-
19
-
-
84958639277
-
-
D. Boneh and M. Franklin, Ecient generation of shared rsa keys, in In Advances in Cryptology|CRYPTO 97, 1294, 1997, pp. 425-439.
-
D. Boneh and M. Franklin, "Ecient generation of shared rsa keys," in In Advances in Cryptology|CRYPTO 97, vol. 1294, 1997, pp. 425-439.
-
-
-
-
21
-
-
20444449399
-
Privacy preserving route planning
-
New York, NY, USA: ACM
-
K. B. Frikken and M. J. Atallah, "Privacy preserving route planning," in WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic society. New York, NY, USA: ACM, 2004, pp. 8-15.
-
(2004)
WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic society
, pp. 8-15
-
-
Frikken, K.B.1
Atallah, M.J.2
|