2008 |
7 | EE | Rachel Greenstadt,
Jacob Beal:
Cognitive security for personal devices.
AISec 2008: 27-30 |
2007 |
6 | EE | Rachel Greenstadt,
Barbara J. Grosz,
Michael D. Smith:
SSDPOP: improving the privacy of DCOP with secret sharing.
AAMAS 2007: 171 |
2006 |
5 | | Rachel Greenstadt,
Jonathan P. Pearce,
Milind Tambe:
Analysis of Privacy Loss in Distributed Constraint Optimization.
AAAI 2006 |
4 | | Rachel Greenstadt:
Privatizing Constraint Optimization.
AAAI 2006 |
3 | EE | Rachel Greenstadt,
Jonathan P. Pearce,
Emma Bowring,
Milind Tambe:
Experimental analysis of privacy loss in DCOP algorithms.
AAMAS 2006: 1424-1426 |
2003 |
2 | EE | Tony Vila,
Rachel Greenstadt,
David Molnar:
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market.
ICEC 2003: 403-407 |
2002 |
1 | EE | John Giffin,
Rachel Greenstadt,
Peter Litwack,
Richard Tibbetts:
Covert Messaging through TCP Timestamps.
Privacy Enhancing Technologies 2002: 194-208 |