1. Archer, D.W., et al.: From keys to databases - real-world applications of secure multi-party computation. Comput. J. 61(12), 1749–1771 (2018)
2. Aumann, R.J.: Game theory. In: Game Theory, pp. 1–53. Springer (1989)
3. Azar, P.D., Goldwasser, S., Park, S.: How to incentivize data-driven collaboration among competing parties. In: ITCS, pp. 213–225 (2016)
4. Lecture Notes in Computer Science;A Ben-Efraim,2017
5. Chen, Y., Nissim, K., Waggoner, B.: Fair information sharing for treasure hunting. In: AAAI, pp. 851–857 (2015)