[1] Kohli R, Park H A.Cooperative game theory model and quantity discounts [J].Management Sci, 1989, 35(6):693-707.
[2] Dolan R J.A normative model of industrial buyer response to quantity discounts[C]//Research Frontiers in Marketing:Dialogues and Directions.Chicago:American Marketing Association, 1978:121-125.
[3] Lal R, Staelin R.An approach for developing an optimal discounts pricing policy [J].Management Sci, 1984, 30(12):1524-1539.
[4] Dada M, Srkanth K N.Pricing policies for quantity discounts [J].Management Sci, 1987, 33(10):1247-1252.
[5] Lee H L, Whang S.Information sharing in a supply chain [J].Int J Tech Management, 2000, 20(3):373-387.
[6] Yao A.Protocols for secure computations [C]//The 23rd Annual Symp on the Foundations of Computer Science.Chicago, 1982:160-164.
[7] Goldreich O.Secure multi-party computation [EB/OL].(2006-08-06)[2008-04-30].http://www.wisdom.weizmann.ac.il/~oded/pp.html.
[8] Atallah M J.Elmongui H G, Deshpande V, et al.Secure supply chain protocols [C]//IEEE International Conference on Electronic Commerce.Newport Beach, California, USA, 2003:293-302.
[9] Harris F W.How many parts to make at once [J].Factory, the Magazine of Management, 1913, 10(2):135-136;152.
[10] Peng Zuohe, Tian Peng.Supply chain quantity discount contract design under perfect information [J].Journal of Industrial Engineering and Engineering Management, 2006, 20(2):114-116.(in Chinese)
[11] Atallah M J, Du W L.Secure multiparty computational geometry [C]//WADS2001:Seventh International Workshop on Algorithm and Data Structures.Providence, Rhode Island, USA, 2001:165-179.
[12] Du W L.A study of several specific secure two party computation problems [D].West Lafayette: Purdue University, 2001.
[13] Du W L, Atallah M J.Privacy preserving cooperative statistical analysis [C]//Annual Computer Security Applications Conference.New Orleans, Louisiana, USA, 2001:102-110.
[14] Luo Wenjun, Li Xiang.A study of secure multi-party statistical analysis [C]//Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing.Shanghai, China, 2003:377-383.
[15] Luo Wenjun, Li Xiang.A study of secure multi-patty elementary function computation protocols [C]//Proceedings of the Third International Conference on Information Security(Infosecu’04).Shanghai, China, 2004:5-12.
[16] Li Shundong, Dai Yiqi, You Qiyou.An efficient solution to Yao’s millionaires’ problem [J].Acta Electronica Sinica, 2005, 33(5):769-773.(in Chinese)