{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T05:52:50Z","timestamp":1759989170197,"version":"3.37.3"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T00:00:00Z","timestamp":1657584000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["IIS-2034123,IIS-2024733,IIS-2034097"],"award-info":[{"award-number":["IIS-2034123,IIS-2024733,IIS-2034097"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,12]]},"DOI":"10.23919\/ecc55457.2022.9838150","type":"proceedings-article","created":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T19:33:46Z","timestamp":1659728026000},"page":"1274-1281","source":"Crossref","is-referenced-by-count":4,"title":["Privacy-Preserving Multi-Robot Task Allocation via Secure Multi-Party Computation"],"prefix":"10.23919","author":[{"given":"Murtadha","family":"Alsayegh","sequence":"first","affiliation":[{"name":"School ot Computing and Information Sciences, Florida International University,Miami,FL,USA,33199"}]},{"given":"Peter","family":"Vanegas","sequence":"additional","affiliation":[{"name":"School ot Computing and Information Sciences, Florida International University,Miami,FL,USA,33199"}]},{"given":"Abdullah","family":"Al Redwan Newaz","sequence":"additional","affiliation":[{"name":"North Carolina A&#x0026;T State University,Department of Electrical and Computer Engineering,Greensboro,NC,USA"}]},{"given":"Leonardo","family":"Bobadilla","sequence":"additional","affiliation":[{"name":"School ot Computing and Information Sciences, Florida International University,Miami,FL,USA,33199"}]},{"given":"Dylan A.","family":"Shell","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University,Department of Computer Science &#x0026; Engineering at,College Station,TX,USA"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2017.8206003"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32552-1_53"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/rob.21898"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2021.3067283"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340500"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.15607\/RSS.2013.IX.033"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2011.5979561"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2016.2588138"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2012.6419281"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2021.3057559"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-020-09461-y"},{"journal-title":"Secure Multiparty Computation for Privacy-Preserving Data Mining","year":"2012","author":"chen","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1109\/TRO.2009.2022423","article-title":"Consensus-based decentralized auctions for robust task allocation","volume":"25","author":"choi","year":"2009","journal-title":"IEEE Transactions on Robotics"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107337756"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107337756"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_10"},{"journal-title":"Convex Optimization & Euclidean Distance Geometry","year":"2011","author":"dattorro","key":"ref17"},{"key":"ref18","first-page":"179","article-title":"Practical secure decision tree learning in a teletreatment application","author":"de hoogh","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"journal-title":"The multivariate schwartz-zippel lemma","year":"2021","author":"dogan","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1177\/0278364913496484"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1287\/inte.20.4.133"},{"key":"ref27","first-page":"1359","article-title":"Sequential bundlebid single-sale auction algorithms for decentralized control","author":"koenig","year":"2007","journal-title":"IJCAI"},{"journal-title":"Network flow problems with secure multiparty computation","year":"2015","author":"aly","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8794460"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78086-9_23"},{"key":"ref8","article-title":"Secure and private auctions without auctioneers","author":"brandt","year":"2002","journal-title":"Technical report Institut fur Informatik Technische Universit at Munchen"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC42340.2020.9304149"},{"key":"ref1","article-title":"Fast secure comparison for medium-sized integers and its application in binarized neural networks","author":"abspoel","year":"2018","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2018.8594111"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IROS45743.2020.9341726"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2006.878948"},{"key":"ref48","first-page":"3016","author":"zlot","year":"0","journal-title":"IEEE International Conference on Robotics and Automation (ICRA)"},{"key":"ref22","article-title":"A pragmatic introduction to secure multi-party computation","volume":"2","author":"evans","year":"2017","journal-title":"Foundations and Trends in Privacy and Security"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2018.00046"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511761942"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TRA.2002.803462"},{"journal-title":"MPyC Secure multiparty computation in Python","year":"2018","author":"schoenmakers","key":"ref41"},{"journal-title":"Cryptographic Protocols Theory and Implementation","year":"2010","author":"geisler","key":"ref23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_6"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18299-5_2"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA48506.2021.9561474"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1177\/0278364904045564"}],"event":{"name":"2022 European Control Conference (ECC)","start":{"date-parts":[[2022,7,12]]},"location":"London, United Kingdom","end":{"date-parts":[[2022,7,15]]}},"container-title":["2022 European Control Conference (ECC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9837955\/9837961\/09838150.pdf?arnumber=9838150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T21:31:16Z","timestamp":1669066276000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9838150\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,12]]},"references-count":48,"URL":"https:\/\/doi.org\/10.23919\/ecc55457.2022.9838150","relation":{},"subject":[],"published":{"date-parts":[[2022,7,12]]}}}