-
1
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computating
-
M. Ben-Or, S. Goldwasser, and A. Widgerson. Completeness theorems for non-cryptographic fault-tolerant distributed computating. In STOC, pages 1-10, 1988.
-
(1988)
STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Widgerson, A.3
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Com. of ACM, 24(2):84-88, 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
4
-
-
84864572319
-
How to split a shared number into bits in constant round and unconditionally secure
-
2005
-
I. Damgård, M. Fitzi, J. B. Nielsen, and T. Toft. How to split a shared number into bits in constant round and unconditionally secure. Cryptology ePrint Archive, Report 2005/140, 2005. http://eprint.iacr.org.
-
(2005)
Cryptology EPrint Archive, Report
, vol.140
-
-
Damgård, I.1
Fitzi, M.2
Nielsen, J.B.3
Toft, T.4
-
5
-
-
0025228149
-
Enhancement schemes for constraint processing: Backjumping, learning, and cutset decomposition
-
R. Dechter. Enhancement schemes for constraint processing: Backjumping, learning, and cutset decomposition. AI'90, 1990.
-
(1990)
AI'90
-
-
Dechter, R.1
-
9
-
-
84864570691
-
Unconditionally secure constant round multi-party computation for equality, comparison, bits and exponentiation
-
E. Kiltz. Unconditionally secure constant round multi-party computation for equality, comparison, bits and exponentiation. Cryptology ePrint Archive, Report 2005/066, 2005. http://eprint.iacr.org.
-
(2005)
Cryptology EPrint Archive, Report2005/066
-
-
Kiltz, E.1
-
10
-
-
0004256761
-
-
PhD thesis, Georgia Inst. of Tech., Feb
-
M. Merritt. Cryptographic Protocols. PhD thesis, Georgia Inst. of Tech., Feb 1983.
-
(1983)
Cryptographic Protocols
-
-
Merritt, M.1
-
11
-
-
4544311969
-
An asynchronous complete method for distributed constraint optimization
-
P.J. Modi, M. Tambe, W.-M. Shen, and M. Yokoo. An asynchronous complete method for distributed constraint optimization. In AAMAS, Melbourne, 2003.
-
(2003)
AAMAS, Melbourne
-
-
Modi, P.J.1
Tambe, M.2
Shen, W.-M.3
Yokoo, M.4
-
13
-
-
84880707137
-
A scalable method for multiagent constraint optimization
-
Adrian Petcu and Boi Faltings. A scalable method for multiagent constraint optimization. In IJCAI, 2005.
-
(2005)
IJCAI
-
-
Petcu, A.1
Faltings, B.2
-
14
-
-
29344456460
-
Superstabilizing, fault-containing multiagent combinatorial optimization
-
Pittsburgh, Pennsylvania, USA, July. AAAI
-
Adrian Petcu and Boi Faltings. Superstabilizing, fault-containing multiagent combinatorial optimization. In Proceedings of the National Conference on Artificial Intelligence, AAAI-05, Pittsburgh, Pennsylvania, USA, July 2005. AAAI.
-
(2005)
Proceedings of the National Conference on Artificial Intelligence, AAAI-05
-
-
Petcu, A.1
Faltings, B.2
-
15
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Comm. of the ACM, 22:612-613, 1979.
-
(1979)
Comm. of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
84883431983
-
Using secure discsp solvers for generalized vickrey auctions, complete and stochastic secure techniques
-
M. Silaghi. Using secure discsp solvers for generalized vickrey auctions, complete and stochastic secure techniques. In IJCAI05 DCR Workshop, 2005.
-
(2005)
IJCAI05 DCR Workshop
-
-
Silaghi, M.1
-
17
-
-
15544376515
-
Solving a distributed CSP with cryptographic multi-party computations, without revealing constraints and without involving trusted servers
-
M.-C. Silaghi. Solving a distributed CSP with cryptographic multi-party computations, without revealing constraints and without involving trusted servers. In IJCAI-DCR, 2003.
-
(2003)
IJCAI-DCR
-
-
Silaghi, M.-C.1
-
18
-
-
15544367557
-
Meeting scheduling system guaranteeing n/2-privacy and resistant to statistical analysis (applicable to any DisCSP)
-
M.-C. Silaghi. Meeting scheduling system guaranteeing n/2-privacy and resistant to statistical analysis (applicable to any DisCSP). In 3rd IC on Web Intelligence, pages 711-715, 2004.
-
(2004)
3rd IC on Web Intelligence
, pp. 711-715
-
-
Silaghi, M.-C.1
-
20
-
-
84864559556
-
Hiding absence of solution for a discsp
-
M.-C. Silaghi. Hiding absence of solution for a discsp. In FLAIRS'05, 2005.
-
(2005)
FLAIRS'05
-
-
Silaghi, M.-C.1
-
21
-
-
84864571594
-
Zero-knowledge proofs for mixnets of secret shares and a version of ElGamal with modular homomorphism
-
M.-C. Silaghi. Zero-knowledge proofs for mixnets of secret shares and a version of ElGamal with modular homomorphism. Cryptology ePrint Archive, Report 2005/079, 2005. http://eprint.iacr.org.
-
(2005)
Cryptology EPrint Archive, Report 2005/079
-
-
Silaghi, M.-C.1
-
22
-
-
15544363599
-
A comparison of DisCSP algorithms with respect to privacy
-
M.-C. Silaghi and B. Faltings. A comparison of DisCSP algorithms with respect to privacy. In AAMAS-DCR, 2002.
-
(2002)
AAMAS-DCR
-
-
Silaghi, M.-C.1
Faltings, B.2
-
25
-
-
4544252889
-
The effect of policies for selecting the solution of a DisCSP on privacy loss
-
M.-C. Silaghi and V. Rajeshirke. The effect of policies for selecting the solution of a DisCSP on privacy loss. In AAMAS, pages 1396-1397, 2004.
-
(2004)
AAMAS
, pp. 1396-1397
-
-
Silaghi, M.-C.1
Rajeshirke, V.2
-
26
-
-
84935113569
-
Error bounds for convolutional codes and an asymtotically opti mum decoding algorithm
-
A.J. Viterbi. Error bounds for convolutional codes and an asymtotically opti mum decoding algorithm. IEEE Trans. on Information Theory, 13(2):260-267, 1967.
-
(1967)
IEEE Trans. on Information Theory
, vol.13
, Issue.2
, pp. 260-267
-
-
Viterbi, A.J.1
-
27
-
-
84864573763
-
Generalized Vickrey Auctions without Third-Party Servers
-
M. Yokoo and K. Suzuki. Generalized Vickrey Auctions without Third-Party Servers. In FC04, 2004.
-
(2004)
FC04
-
-
Yokoo, M.1
Suzuki, K.2
|