A mobile agent-based privacy protection mechanism in solving multi-party computation problems

作者: Md. Nurul Huda

DOI:

关键词:

摘要:

参考文章(49)
Khaled Ghédira, Gérard Verfaillie, A multi-agent model for the resource allocation problem: a reactive approach european conference on artificial intelligence. pp. 252- 254 ,(1992)
Toramatsu Shintani, Takuo Tsuruta, Scheduling meetings using distributed valued constraint satisfaction algorithm european conference on artificial intelligence. pp. 383- 387 ,(2000)
Alan F. Westin, Privacy and freedom ,(1970)
Joachim Biskup, Ulrich Flegel, Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection recent advances in intrusion detection. pp. 28- 48 ,(2000) , 10.1007/3-540-39945-3_3
Richard S. Rosenberg, The Social Impact of Computers ,(1992)
Yehuda Lindell, Benny Pinkas, Privacy Preserving Data Mining international cryptology conference. pp. 36- 54 ,(2000) , 10.1007/3-540-44598-6_3
Samuel D. Warren, Louis D. Brandeis, The Right to Privacy ,(2015)
Makoto Yokoo, Koutarou Suzuki, Katsutoshi Hirayama, Secure Distributed Constraint Satisfaction: Reaching Agreement without Revealing Private Information principles and practice of constraint programming. pp. 387- 401 ,(2002) , 10.1007/3-540-46135-3_26