On securely scheduling a meeting

13Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

When people want to schedule a meeting, their agendas must be compared to find a time suitable for all participants. At the same time, people want to keep their agendas private. This paper presents several approaches which intend to solve this contradiction. A custom-made protocol for secure meeting scheduling and a protocol based on secure distributed computing are discussed. The security properties and complexity of these protocols are compared. A trade-off between trust and bandwidth requirements is shown to be possible by implementing the protocols using mobile agents. © 2002 Kluwer Academic / Plenum Publishers, New York.

Cite

CITATION STYLE

APA

Herlea, T., Claessens, J., Preneel, B., Neven, G., Piessens, F., & De Decker, B. (2002). On securely scheduling a meeting. In IFIP Advances in Information and Communication Technology (Vol. 65, pp. 183–198). Springer New York LLC. https://doi.org/10.1007/0-306-46998-7_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free