-
1
-
-
34548084042
-
A genetic algorithm for privacy preserving combinatorial optimization
-
Sakuma, J., Kobayashi, S.: A genetic algorithm for privacy preserving combinatorial optimization. In: GECCO, pp. 1372-1379 (2007)
-
(2007)
GECCO
, pp. 1372-1379
-
-
Sakuma, J.1
Kobayashi, S.2
-
2
-
-
61349161743
-
An approach to identifying beneficial collaboration securely in decentralized logistics systems
-
Clifton, C., Iyer, A., Cho, R., Jiang, W., Kantarcioglu, M., Vaidya, J.: An approach to identifying beneficial collaboration securely in decentralized logistics systems. Management & Service Operations Management 10(1) (2008)
-
(2008)
Management & Service Operations Management
, vol.10
, Issue.1
-
-
Clifton, C.1
Iyer, A.2
Cho, R.3
Jiang, W.4
Kantarcioglu, M.5
Vaidya, J.6
-
3
-
-
84872255959
-
Secure and efficient distributed linear programming
-
Hong, Y., Vaidya, J., Lu, H.: Secure and efficient distributed linear programming. Journal of Computer Security 20(5), 583-634 (2012)
-
(2012)
Journal of Computer Security
, vol.20
, Issue.5
, pp. 583-634
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
-
4
-
-
84856161025
-
Privacy-preserving tabu search for distributed graph coloring
-
Hong, Y., Vaidya, J., Lu, H., Shafiq, B.: Privacy-preserving tabu search for distributed graph coloring. In: SocialCom/PASSAT, pp. 951-958 (2011)
-
(2011)
SocialCom/PASSAT
, pp. 951-958
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
Shafiq, B.4
-
6
-
-
84995350370
-
-
http://www.math.uwaterloo.ca/tsp/
-
-
-
-
8
-
-
26444553177
-
Encryption schemes
-
Cambridge University Press
-
Goldreich, O.: Encryption Schemes. In: The Foundations of Cryptography, vol. 2. Cambridge University Press (2004)
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
9
-
-
50249162488
-
Secure and private collaborative linear programming
-
November 17-20
-
Li, J., Atallah, M.J.: Secure and private collaborative linear programming. In: Proceedings of the 2nd International Conference on Collaborative Computing: Networking, Applications and Worksharing, November 17-20, pp. 1-8 (2006)
-
(2006)
Proceedings of the 2nd International Conference on Collaborative Computing: Networking, Applications and Worksharing
, pp. 1-8
-
-
Li, J.1
Atallah, M.J.2
-
11
-
-
78049400032
-
Secure multiparty linear programming using fixed-point arithmetic
-
Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010, Springer, Heidelberg
-
Catrina, O., de Hoogh, S.: Secure multiparty linear programming using fixed-point arithmetic. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 134-150. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6345
, pp. 134-150
-
-
Catrina, O.1
De Hoogh, S.2
-
13
-
-
69249243704
-
Privacy-preserving linear programming
-
Vaidya, J.: Privacy-preserving linear programming. In: SAC, pp. 2002-2007 (2009)
-
(2009)
SAC
, pp. 2002-2007
-
-
Vaidya, J.1
-
14
-
-
74049112591
-
Hiccups on the road to privacy-preserving linear programming
-
ACM, New York
-
Bednarz, A., Bean, N., Roughan, M.: Hiccups on the road to privacy-preserving linear programming. In: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES 2009, pp. 117-120. ACM, New York (2009)
-
(2009)
Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES 2009
, pp. 117-120
-
-
Bednarz, A.1
Bean, N.2
Roughan, M.3
-
16
-
-
79960248419
-
Efficient distributed linear programming with limited disclosure
-
Li, Y. (ed.) DBSec 2011, Springer, Heidelberg
-
Hong, Y., Vaidya, J., Lu, H.: Efficient distributed linear programming with limited disclosure. In: Li, Y. (ed.) DBSec 2011. LNCS, vol. 6818, pp. 170-185. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6818
, pp. 170-185
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
-
17
-
-
84857650296
-
Privacy-preserving horizontally partitioned linear programs
-
Mangasarian, O.L.: Privacy-preserving horizontally partitioned linear programs. Optimization Letters 6(3), 431-436 (2012)
-
(2012)
Optimization Letters
, vol.6
, Issue.3
, pp. 431-436
-
-
Mangasarian, O.L.1
-
18
-
-
78650750065
-
Privacy-preserving linear programming
-
Mangasarian, O.L.: Privacy-preserving linear programming. Optimization Letters 5(1), 165-172 (2011)
-
(2011)
Optimization Letters
, vol.5
, Issue.1
, pp. 165-172
-
-
Mangasarian, O.L.1
-
19
-
-
84872266260
-
Privacy-preserving horizontally partitioned linear programs with inequality constraints
-
Li, W., Li, H., Deng, C.: Privacy-preserving horizontally partitioned linear programs with inequality constraints. Optimization Letters 7(1), 137-144 (2013)
-
(2013)
Optimization Letters
, vol.7
, Issue.1
, pp. 137-144
-
-
Li, W.1
Li, H.2
Deng, C.3
-
20
-
-
84892875548
-
An inference-proof approach to privacy-preserving horizontally partitioned linear programs
-
Hong, Y., Vaidya, J.: An inference-proof approach to privacy-preserving horizontally partitioned linear programs. Optimization Letters 8(1), 267-277 (2014)
-
(2014)
Optimization Letters
, vol.8
, Issue.1
, pp. 267-277
-
-
Hong, Y.1
Vaidya, J.2
-
21
-
-
0023545076
-
How to play any mental game-A completeness theorem for protocols with honest majority
-
ACM, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game-a completeness theorem for protocols with honest majority. In: Proceedings of the 19th ACM Symposium on the Theory of Computing, pp. 218-229. ACM, New York (1987)
-
(1987)
Proceedings of the 19th ACM Symposium on the Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp. 1-10 (1998)
-
(1998)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
24
-
-
26444479778
-
Optimization by simulated annealing
-
Kirkpatrick, S., Gelatt Jr., C.D., Vecchi, M.P.: Optimization by simulated annealing. Science 220(4598), 671-680 (1983)
-
(1983)
Science
, vol.220
, Issue.4598
, pp. 671-680
-
-
Kirkpatrick, S.1
Gelatt Jr., C.D.2
Vecchi, M.P.3
-
25
-
-
0001237146
-
A method for solving traveling salesman problems
-
Croes, G.A.: A method for solving traveling salesman problems. Operations Research 6(6), 791-812 (1958)
-
(1958)
Operations Research
, vol.6
, Issue.6
, pp. 791-812
-
-
Croes, G.A.1
-
26
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
27
-
-
5744249209
-
Equation of state calculations by fast computing machines
-
Metropolis, N., Rosenbluth, A.W., Rosenbluth, M.N., Teller, A.H., Teller, E.: Equation of state calculations by fast computing machines. The Journal of Chemical Physics 21, 1087 (1953)
-
(1953)
The Journal of Chemical Physics
, vol.21
, pp. 1087
-
-
Metropolis, N.1
Rosenbluth, A.W.2
Rosenbluth, M.N.3
Teller, A.H.4
Teller, E.5
-
28
-
-
70349266254
-
Fairplaymp: A system for secure multi-party computation
-
ACM, New York
-
Ben-David, A., Nisan, N., Pinkas, B.: Fairplaymp: a system for secure multi-party computation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 257-266. ACM, New York (2008)
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
29
-
-
84969524054
-
An efficient protocol for yao's millionaires' problem
-
Waikoloa Village, Hawaii, January 6-9
-
Ioannidis, I., Grama, A.: An efficient protocol for yao's millionaires' problem. In: Hawaii International Conference on System Sciences (HICSS-36), Waikoloa Village, Hawaii, January 6-9, pp. 205-210 (2003)
-
(2003)
Hawaii International Conference on System Sciences (HICSS-36)
, pp. 205-210
-
-
Ioannidis, I.1
Grama, A.2
-
31
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008, Springer, Heidelberg
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
32
-
-
84889039708
-
Picco: A general-purpose compiler for private distributed computation
-
Zhang, Y., Steele, A., Blanton, M.: Picco: a general-purpose compiler for private distributed computation. In: ACM Conference on Computer and Communications Security, pp. 813-826 (2013)
-
(2013)
ACM Conference on Computer and Communications Security
, pp. 813-826
-
-
Zhang, Y.1
Steele, A.2
Blanton, M.3
|