2009 |
100 | EE | Joan Feigenbaum,
David C. Parkes,
David M. Pennock:
Computational challenges in e-commerce.
Commun. ACM 52(1): 70-74 (2009) |
2008 |
99 | | Joan Feigenbaum,
Yang Richard Yang:
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, NetEcon 2008, Seattle, WA, USA, August 22, 2008
ACM 2008 |
98 | EE | Daniel J. Weitzner,
Harold Abelson,
Tim Berners-Lee,
Joan Feigenbaum,
James A. Hendler,
Gerald J. Sussman:
Information accountability.
Commun. ACM 51(6): 82-87 (2008) |
97 | EE | Joan Feigenbaum,
Sampath Kannan,
Andrew McGregor,
Siddharth Suri,
Jian Zhang:
Graph Distances in the Data-Stream Model.
SIAM J. Comput. 38(5): 1709-1727 (2008) |
2007 |
96 | EE | Joan Feigenbaum,
Aaron Johnson,
Paul F. Syverson:
A Model of Onion Routing with Provable Anonymity.
Financial Cryptography 2007: 57-71 |
95 | EE | Joan Feigenbaum,
Aaron Johnson,
Paul F. Syverson:
Probabilistic analysis of onion routing in a black-box model.
WPES 2007: 1-10 |
94 | EE | Felipe Saint-Jean,
Aaron Johnson,
Dan Boneh,
Joan Feigenbaum:
Private web search.
WPES 2007: 84-90 |
93 | EE | Joan Feigenbaum,
David R. Karger,
Vahab S. Mirrokni,
Rahul Sami:
Subjective-cost policy routing.
Theor. Comput. Sci. 378(2): 175-189 (2007) |
92 | EE | James Aspnes,
Joan Feigenbaum,
Aleksandr Yampolskiy,
Sheng Zhong:
Towards a theory of data entanglement.
Theor. Comput. Sci. 389(1-2): 26-43 (2007) |
2006 |
91 | | Joan Feigenbaum,
John C.-I. Chuang,
David M. Pennock:
Proceedings 7th ACM Conference on Electronic Commerce (EC-2006), Ann Arbor, Michigan, USA, June 11-15, 2006
ACM 2006 |
90 | EE | Joan Feigenbaum,
Vijay Ramachandran,
Michael Schapira:
Incentive-compatible interdomain routing.
ACM Conference on Electronic Commerce 2006: 130-139 |
89 | EE | Jian Zhang,
Joan Feigenbaum:
Finding highly correlated pairs efficiently with powerful pruning.
CIKM 2006: 152-161 |
88 | EE | Joan Feigenbaum,
Yuval Ishai,
Tal Malkin,
Kobbi Nissim,
Martin J. Strauss,
Rebecca N. Wright:
Secure multiparty computation of approximations.
ACM Transactions on Algorithms 2(3): 435-472 (2006) |
87 | EE | Joan Feigenbaum,
Rahul Sami,
Scott Shenker:
Mechanism design for policy routing.
Distributed Computing 18(4): 293-305 (2006) |
86 | EE | Joan Feigenbaum,
Michael Mitzenmacher:
Towards a theory of networked computation.
SIGACT News 37(4): 22-26 (2006) |
2005 |
85 | EE | Jian Zhang,
Jennifer Rexford,
Joan Feigenbaum:
Learning-based anomaly detection in BGP updates.
MineNet 2005: 219-220 |
84 | EE | Joan Feigenbaum,
Sampath Kannan,
Andrew McGregor,
Siddharth Suri,
Jian Zhang:
Graph distances in the streaming model: the value of space.
SODA 2005: 745-754 |
83 | EE | Joan Feigenbaum,
David R. Karger,
Vahab S. Mirrokni,
Rahul Sami:
Subjective-Cost Policy Routing.
WINE 2005: 174-183 |
82 | EE | Joan Feigenbaum,
Christos H. Papadimitriou,
Rahul Sami,
Scott Shenker:
A BGP-based mechanism for lowest-cost routing.
Distributed Computing 18(1): 61-72 (2005) |
81 | EE | Joan Feigenbaum,
Lance Fortnow,
David M. Pennock,
Rahul Sami:
Computation in a distributed information market.
Theor. Comput. Sci. 343(1-2): 114-132 (2005) |
80 | EE | Joan Feigenbaum,
Sampath Kannan,
Andrew McGregor,
Siddharth Suri,
Jian Zhang:
On graph problems in a semi-streaming model.
Theor. Comput. Sci. 348(2-3): 207-216 (2005) |
2004 |
79 | | Jack S. Breese,
Joan Feigenbaum,
Margo I. Seltzer:
Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), New York, NY, USA, May 17-20, 2004
ACM 2004 |
78 | EE | James Aspnes,
Joan Feigenbaum,
Aleksandr Yampolskiy,
Sheng Zhong:
Towards a Theory of Data Entanglement: (Extended Abstract).
ESORICS 2004: 177-192 |
77 | EE | Joan Feigenbaum,
Sampath Kannan,
Andrew McGregor,
Siddharth Suri,
Jian Zhang:
On Graph Problems in a Semi-streaming Model.
ICALP 2004: 531-543 |
76 | EE | Joan Feigenbaum,
Rahul Sami,
Scott Shenker:
Mechanism design for policy routing.
PODC 2004: 11-20 |
75 | EE | Joan Feigenbaum,
Sampath Kannan,
Jian Zhang:
Computing Diameter in the Streaming and Sliding-Window Models.
Algorithmica 41(1): 25-41 (2004) |
74 | EE | Dan Boneh,
Joan Feigenbaum,
Abraham Silberschatz,
Rebecca N. Wright:
PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment.
IEEE Data Eng. Bull. 27(1): 10-18 (2004) |
2003 |
73 | | Joan Feigenbaum:
Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
Springer 2003 |
72 | EE | Joan Feigenbaum,
Lance Fortnow,
David M. Pennock,
Rahul Sami:
Computation in a distributed information market.
ACM Conference on Electronic Commerce 2003: 156-165 |
71 | EE | Joan Feigenbaum,
Arvind Krishnamurthy,
Rahul Sami,
Scott Shenker:
Approximation and collusion in multicast cost sharing.
ACM Conference on Electronic Commerce 2003: 280 |
70 | EE | Ninghui Li,
Benjamin N. Grosof,
Joan Feigenbaum:
Delegation logic: A logic-based approach to distributed authorization.
ACM Trans. Inf. Syst. Secur. 6(1): 128-171 (2003) |
69 | | Joan Feigenbaum,
Scott Shenker:
Distributed algorithmic mechanism design: recent results and future directions, Distributed Computing Column.
Bulletin of the EATCS 79: 101-121 (2003) |
68 | EE | Joan Feigenbaum,
Arvind Krishnamurthy,
Rahul Sami,
Scott Shenker:
Hardness results for multicast cost sharing.
Theor. Comput. Sci. 1-3(304): 215-236 (2003) |
2002 |
67 | EE | Joan Feigenbaum,
Scott Shenker:
Distributed algorithmic mechanism design: recent results and future directions.
DIAL-M 2002: 1-13 |
66 | EE | Joan Feigenbaum,
Arvind Krishnamurthy,
Rahul Sami,
Scott Shenker:
Hardness Results for Multicast Cost Sharing.
FSTTCS 2002: 133-144 |
65 | EE | Joan Feigenbaum,
Christos H. Papadimitriou,
Rahul Sami,
Scott Shenker:
A BGP-based mechanism for lowest-cost routing.
PODC 2002: 173-182 |
64 | EE | Joan Feigenbaum,
Sampath Kannan,
Martin Strauss,
Mahesh Viswanathan:
Testing and Spot-Checking of Data Streams.
Algorithmica 34(1): 67-80 (2002) |
63 | EE | Joan Feigenbaum,
Sampath Kannan,
Martin Strauss,
Mahesh Viswanathan:
An Approximate L1-Difference Algorithm for Massive Data Streams.
SIAM J. Comput. 32(1): 131-151 (2002) |
2001 |
62 | EE | Joan Feigenbaum,
Arvind Krishnamurthy,
Rahul Sami,
Scott Shenker:
Approximation and collusion in multicast cost sharing (extended abstract).
ACM Conference on Electronic Commerce 2001: 253-255 |
61 | EE | Ernest Miller,
Joan Feigenbaum:
Taking the Copy Out of Copyright.
Digital Rights Management Workshop 2001: 233-244 |
60 | EE | Joan Feigenbaum,
Michael J. Freedman,
Tomas Sander,
Adam Shostack:
Privacy Engineering for Digital Rights Management Systems.
Digital Rights Management Workshop 2001: 76-105 |
59 | EE | Ninghui Li,
Joan Feigenbaum:
Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation.
Financial Cryptography 2001: 157-168 |
58 | EE | Joan Feigenbaum,
Yuval Ishai,
Tal Malkin,
Kobbi Nissim,
Martin Strauss,
Rebecca N. Wright:
Secure Multiparty Computation of Approximations.
ICALP 2001: 927-938 |
57 | | Joan Feigenbaum,
Christos H. Papadimitriou,
Scott Shenker:
Sharing the Cost of Multicast Transmissions.
J. Comput. Syst. Sci. 63(1): 21-41 (2001) |
2000 |
56 | EE | Ninghui Li,
Benjamin N. Grosof,
Joan Feigenbaum:
A Practically Implementable and Tractable Delegation Logic.
IEEE Symposium on Security and Privacy 2000: 27-42 |
55 | EE | Joan Feigenbaum,
Sampath Kannan,
Martin Strauss,
Mahesh Viswanathan:
Testing and spot-checking of data streams (extended abstract).
SODA 2000: 165-174 |
54 | EE | Joan Feigenbaum,
Christos H. Papadimitriou,
Scott Shenker:
Sharing the cost of muliticast transmissions (preliminary version).
STOC 2000: 218-227 |
1999 |
53 | EE | Ninghui Li,
Joan Feigenbaum,
Benjamin N. Grosof:
A Logic-based Knowledge Representation for Authorization with Delegation.
CSFW 1999: 162-174 |
52 | EE | Joan Feigenbaum,
Sampath Kannan,
Martin Strauss,
Mahesh Viswanathan:
An Approximate L1-Difference Algorithm for Massive Data Streams.
FOCS 1999: 501-511 |
51 | EE | Jon Callas,
Joan Feigenbaum,
David M. Goldschlag,
Erin Sawyer:
Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary).
Financial Cryptography 1999: 173-183 |
50 | EE | Matt Blaze,
Joan Feigenbaum,
Moni Naor:
A Formal Treatment of Remotely Keyed Encryption.
SODA 1999: 868-869 |
49 | | Matt Blaze,
Joan Feigenbaum,
Angelos D. Keromytis:
The Role of Trust Management in Distributed Systems Security.
Secure Internet Programming 1999: 185-210 |
48 | EE | Joan Feigenbaum,
Sampath Kannan,
Moshe Y. Vardi,
Mahesh Viswanathan:
The Complexity of Problems on Graphs Represented as OBDDs.
Chicago J. Theor. Comput. Sci. 1999: (1999) |
1998 |
47 | EE | Matt Blaze,
Joan Feigenbaum,
Moni Naor:
A Formal Treatment of Remotely Keyed Encryption.
EUROCRYPT 1998: 251-265 |
46 | EE | Matt Blaze,
Joan Feigenbaum,
Martin Strauss:
Compliance Checking in the PolicyMaker Trust Management System.
Financial Cryptography 1998: 254-274 |
45 | | Joan Feigenbaum,
Sampath Kannan,
Moshe Y. Vardi,
Mahesh Viswanathan:
Complexity of Problems on Graphs Represented as OBDDs (Extended Abstract).
STACS 1998: 216-226 |
44 | EE | Roger M. Needham,
E. Stewart Lee,
Joan Feigenbaum,
Virgil D. Gligor,
Bruce Christianson:
Panel Session - Future Directions.
Security Protocols Workshop 1998: 227-239 |
43 | EE | Joan Feigenbaum:
Overview of the AT&T Labs Trust-Management Project (Position Paper).
Security Protocols Workshop 1998: 45-50 |
42 | EE | Joan Feigenbaum:
Overview of the AT&T Labs Trust-Management Project (Transcript of Discussion).
Security Protocols Workshop 1998: 51-58 |
41 | EE | Matt Blaze,
Joan Feigenbaum,
Angelos D. Keromytis:
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper).
Security Protocols Workshop 1998: 59-63 |
40 | | Lenore Cowen,
Joan Feigenbaum,
Sampath Kannan:
A Formal Framework for Evaluating Heuristic Programs.
Ann. Math. Artif. Intell. 22(3-4): 193-206 (1998) |
39 | | Joan Feigenbaum,
Lance Fortnow,
Sophie Laplante,
Ashish V. Naik:
On Coherence, Random-Self-Reducibility, and Self-Correction.
Computational Complexity 7(2): 174-191 (1998) |
1997 |
38 | | Joan Feigenbaum,
Martin Strauss:
An Information-Theoretic Treatment of Random-Self-Reducibility (Extended Abstract).
STACS 1997: 523-534 |
37 | EE | Yang-Hua Chu,
Joan Feigenbaum,
Brian A. LaMacchia,
Paul Resnick,
Martin Strauss:
REFEREE: Trust Management for Web Applications.
Computer Networks 29(8-13): 953-964 (1997) |
36 | | Donald Beaver,
Joan Feigenbaum,
Joe Kilian,
Phillip Rogaway:
Locally Random Reductions: Improvements and Applications.
J. Cryptology 10(1): 17-36 (1997) |
35 | | Anne Condon,
Joan Feigenbaum,
Carsten Lund,
Peter W. Shor:
Random Debaters and the Hardness of Approximating Stochastic Functions.
SIAM J. Comput. 26(2): 369-400 (1997) |
1996 |
34 | | Lenore Cowen,
Joan Feigenbaum,
Sampath Kannan:
A Formal Framework for Evaluating Heuristic Programs.
ICALP 1996: 634-645 |
33 | EE | Joan Feigenbaum,
Lance Fortnow,
Sophie Laplante,
Ashish V. Naik:
On Coherence, Random-self-reducibility, and Self-correction.
IEEE Conference on Computational Complexity 1996: 59-67 |
32 | EE | Matt Blaze,
Joan Feigenbaum,
Jack Lacy:
Decentralized Trust Management.
IEEE Symposium on Security and Privacy 1996: 164-173 |
31 | | Joan Feigenbaum,
G. David Forney Jr.,
Brian H. Marcus,
Robert J. McEliece,
Alexander Vardy:
Introduction to the special issue on codes and complexity.
IEEE Transactions on Information Theory 42(6): 1649-1659 (1996) |
1995 |
30 | | Joan Feigenbaum,
Daphne Koller,
Peter W. Shor:
A Game-Theoretic Classification of Interactive Complexity Classes.
Structure in Complexity Theory Conference 1995: 227-237 |
29 | EE | Anne Condon,
Joan Feigenbaum,
Carsten Lund,
Peter W. Shor:
Probabilistically Checkable Debate Systems and Nonapproximability of PSPACE-Hard Functions.
Chicago J. Theor. Comput. Sci. 1995: (1995) |
1994 |
28 | | Anne Condon,
Joan Feigenbaum,
Carsten Lund,
Peter W. Shor:
Random Debaters and the Hardness of Approximating Stochastic Functions.
Structure in Complexity Theory Conference 1994: 280-293 |
27 | | Joan Feigenbaum,
Lance Fortnow,
Carsten Lund,
Daniel A. Spielman:
The Power of Adaptiveness and Additional Queries in Random-Self-Reductions.
Computational Complexity 4: 158-174 (1994) |
1993 |
26 | EE | Anne Condon,
Joan Feigenbaum,
Carsten Lund,
Peter W. Shor:
Probabilistically checkable debate systems and approximation algorithms for PSPACE-hard functions.
STOC 1993: 305-314 |
25 | | Joan Feigenbaum,
Lance Fortnow:
Random-Self-Reducibility of Complete Sets.
SIAM J. Comput. 22(5): 994-1005 (1993) |
24 | | Joan Feigenbaum,
Jeremy A. Kahn,
Carsten Lund:
Complexity Results for Pomset Languages.
SIAM J. Discrete Math. 6(3): 432-442 (1993) |
1992 |
23 | | Joan Feigenbaum:
Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings
Springer 1992 |
22 | | Joan Feigenbaum,
Lance Fortnow,
Carsten Lund,
Daniel A. Spielman:
The Power of Adaptiveness and Additional Queries in Random-Self-Reductions.
Structure in Complexity Theory Conference 1992: 338-346 |
21 | | Richard Beigel,
Joan Feigenbaum:
On Being Incoherent Without Being Very Hard.
Computational Complexity 2: 1-17 (1992) |
20 | EE | Joan Feigenbaum,
Alejandro A. Schäffer:
Finding the prime factors of strong direct product graphs in polynomial time.
Discrete Mathematics 109(1-3): 77-102 (1992) |
1991 |
19 | | Joan Feigenbaum,
Rafail Ostrovsky:
A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems.
ASIACRYPT 1991: 352-359 |
18 | | Joan Feigenbaum,
Jeremy A. Kahn,
Carsten Lund:
Complexity Results for POMSET Languages.
CAV 1991: 343-353 |
17 | | Richard Beigel,
Mihir Bellare,
Joan Feigenbaum,
Shafi Goldwasser:
Languages that Are Easier than their Proofs
FOCS 1991: 19-28 |
16 | | Joan Feigenbaum,
Lance Fortnow:
On the Random-Self-Reducibility of Complete Sets.
Structure in Complexity Theory Conference 1991: 124-132 |
1990 |
15 | EE | Donald Beaver,
Joan Feigenbaum,
Victor Shoup:
Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract).
CRYPTO 1990: 326-338 |
14 | EE | Donald Beaver,
Joan Feigenbaum,
Joe Kilian,
Phillip Rogaway:
Security with Low Communication Overhead.
CRYPTO 1990: 62-76 |
13 | | Donald Beaver,
Joan Feigenbaum:
Hiding Instances in Multioracle Queries.
STACS 1990: 37-48 |
12 | | Joan Feigenbaum,
Sampath Kannan,
Noam Nisan:
Lower Bounds on Random-Self-Reducibility.
Structure in Complexity Theory Conference 1990: 100-109 |
11 | EE | David Eppstein,
Joan Feigenbaum,
Chung-Lun Li:
Equipartitions of graphs.
Discrete Mathematics 91(3): 239-248 (1990) |
10 | | Martín Abadi,
Joan Feigenbaum:
Secure Circuit Evaluation.
J. Cryptology 2(1): 1-12 (1990) |
1989 |
9 | | Martín Abadi,
Joan Feigenbaum,
Joe Kilian:
On Hiding Information from an Oracle.
J. Comput. Syst. Sci. 39(1): 21-50 (1989) |
8 | | Joan Feigenbaum,
Ramsey W. Haddad:
On Factorable Extensions and Subgraphs of Prime Graphs.
SIAM J. Discrete Math. 2(2): 197-218 (1989) |
1988 |
7 | EE | Martín Abadi,
Eric Allender,
Andrei Z. Broder,
Joan Feigenbaum,
Lane A. Hemachandra:
On Generating Solved Instances of Computational Problems.
CRYPTO 1988: 297-310 |
6 | | Martín Abadi,
Joan Feigenbaum:
A Simple Protocol for Secure Circuit Evaluation.
STACS 1988: 264-272 |
1987 |
5 | | Martín Abadi,
Joan Feigenbaum,
Joe Kilian:
On Hiding Information from an Oracle (Extended Abstract)
STOC 1987: 195-203 |
1986 |
4 | | Devika Subramanian,
Joan Feigenbaum:
Factorization in Experiment Generation.
AAAI 1986: 518-522 |
3 | | Joan Feigenbaum,
Alejandro A. Schäffer:
Recognizing Composite Graphs is Equivalent to Testing Graph Isomorphism.
SIAM J. Comput. 15(2): 619-627 (1986) |
1985 |
2 | EE | Joan Feigenbaum:
Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him?
CRYPTO 1985: 477-488 |
1984 |
1 | EE | Henry F. Korth,
Gabriel M. Kuper,
Joan Feigenbaum,
Allen Van Gelder,
Jeffrey D. Ullman:
System/U: A Database System Based on the Universal Relation Assumption.
ACM Trans. Database Syst. 9(3): 331-347 (1984) |