2011
DOI: 10.1109/mc.2011.224
|View full text |Cite
|
Sign up to set email alerts
|

Secure Collaborative Supply-Chain Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 40 publications
(25 citation statements)
references
References 6 publications
0
25
0
Order By: Relevance
“…Afterwards, no party can infer anything about the other party's input except what can be inferred from her own input and the output f (x, y). Secure computation has many applications, e.g., in the financial sector, and has been successfully deployed in commercial and industrial settings [8,29,7].…”
Section: Introductionmentioning
confidence: 99%
“…Afterwards, no party can infer anything about the other party's input except what can be inferred from her own input and the output f (x, y). Secure computation has many applications, e.g., in the financial sector, and has been successfully deployed in commercial and industrial settings [8,29,7].…”
Section: Introductionmentioning
confidence: 99%
“…"SecureSCM", secure collaborative supply chain management, the European research project [48], is an example of the application of SMC algorithms in the field of SCNs. The project enabled privacy preserving online collaboration among various firms in a SCN.…”
Section: Privacy Concerns In Supply Chainmentioning
confidence: 99%
“…This fixed-point approach has been used to solve linear programming problems with applications in secure supply chain management [6,12]. However, fixed point numbers provide only a limited amount of flexibility in computations, since they can represent values only in a small interval with a predetermined precision.…”
Section: Previous Workmentioning
confidence: 99%