2009 | ||
---|---|---|
56 | EE | Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright: Private multiparty sampling and approximation of vector combinations. Theor. Comput. Sci. 410(18): 1730-1745 (2009) |
2008 | ||
55 | EE | Jun Sakuma, Shigenobu Kobayashi, Rebecca N. Wright: Privacy-preserving reinforcement learning. ICML 2008: 864-871 |
54 | EE | Sharon Goldberg, Shai Halevi, Aaron D. Jaggard, Vijay Ramachandran, Rebecca N. Wright: Rationality and traffic attraction: incentives for honest path announcements in bgp. SIGCOMM 2008: 267-278 |
53 | EE | Rebecca N. Wright, Sabrina De Capitani di Vimercati: Guest Editorial: Special Issue on Computer and Communications Security. ACM Trans. Inf. Syst. Secur. 12(2): (2008) |
52 | EE | Geetha Jagannathan, Rebecca N. Wright: Privacy-preserving imputation of missing data. Data Knowl. Eng. 65(1): 40-56 (2008) |
2007 | ||
51 | EE | Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright: Private Multiparty Sampling and Approximation of Vector Combinations. ICALP 2007: 243-254 |
50 | EE | Geetha Jagannathan, Rebecca N. Wright: Private Inference Control for Aggregate Database Queries. ICDM Workshops 2007: 711-716 |
49 | EE | Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Towards Privacy-Preserving Model Selection. PinKDD 2007: 138-152 |
2006 | ||
48 | Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006 ACM 2006 | |
47 | EE | Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Privacy-Preserving Queries on Encrypted Data. ESORICS 2006: 479-495 |
46 | EE | Geetha Jagannathan, Rebecca N. Wright: Privacy-Preserving Data Imputation. ICDM Workshops 2006: 535-540 |
45 | EE | Michael de Mare, Rebecca N. Wright: Secure Set Membership Using 3Sat. ICICS 2006: 452-468 |
44 | EE | Geetha Jagannathan, Krishnan Pillaipakkamnatt, Rebecca N. Wright: A New Privacy-Preserving Distributed k-Clustering Algorithm. SDM 2006 |
43 | EE | Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright: Secure multiparty computation of approximations. ACM Transactions on Algorithms 2(3): 435-472 (2006) |
42 | Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subramaniam: Experimental analysis of a privacy-preserving scalar product protocol. Comput. Syst. Sci. Eng. 21(1): (2006) | |
41 | EE | Zhiqiang Yang, Rebecca N. Wright: Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data. IEEE Trans. Knowl. Data Eng. 18(9): 1253-1264 (2006) |
2005 | ||
40 | EE | Zhiqiang Yang, Rebecca N. Wright: Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data. ICDE Workshops 2005: 1196 |
39 | EE | Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Anonymity-preserving data collection. KDD 2005: 334-343 |
38 | EE | Geetha Jagannathan, Rebecca N. Wright: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. KDD 2005: 593-599 |
37 | EE | Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong: Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. MADNES 2005: 67-79 |
36 | EE | Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright: Privacy-enhancing k-anonymization of customer data. PODS 2005: 139-147 |
35 | Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Privacy-Preserving Classification of Customer Data without Loss of Accuracy. SDM 2005 | |
34 | EE | Noga Alon, Michael Merritt, Omer Reingold, Gadi Taubenfeld, Rebecca N. Wright: Tight bounds for shared memory systems accessed by Byzantine processes. Distributed Computing 18(2): 99-109 (2005) |
2004 | ||
33 | EE | Rebecca N. Wright, Zhiqiang Yang: Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. KDD 2004: 713-718 |
32 | EE | Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang: Experimental Analysis of Privacy-Preserving Statistics Computation. Secure Data Management 2004: 55-66 |
31 | EE | Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac: Accountable Privacy. Security Protocols Workshop 2004: 83-95 |
30 | EE | Rebecca N. Wright: Accountable Privacy (Transcript of Discussion). Security Protocols Workshop 2004: 96-105 |
29 | EE | Dan Boneh, Joan Feigenbaum, Abraham Silberschatz, Rebecca N. Wright: PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. IEEE Data Eng. Bull. 27(1): 10-18 (2004) |
2003 | ||
28 | Rebecca N. Wright: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers Springer 2003 | |
27 | EE | Rebecca N. Wright: Fischer's cryptographic protocols. PODC 2003: 20-22 |
2002 | ||
26 | EE | Michael Merritt, Omer Reingold, Gadi Taubenfeld, Rebecca N. Wright: Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes. DISC 2002: 222-236 |
25 | EE | Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood: Privacy Tradeoffs: Myth or Reality? Panel. Financial Cryptography 2002: 147-151 |
24 | EE | Rebecca N. Wright, Sara Spalding: Experimental Performance of Shared RSA Modulus Generation. Algorithmica 33(1): 89-103 (2002) |
23 | EE | Stuart G. Stubblebine, Rebecca N. Wright: An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. IEEE Trans. Software Eng. 28(3): 256-285 (2002) |
2001 | ||
22 | EE | Aviel D. Rubin, Rebecca N. Wright: Off-Line Generation of Limited-Use Credit Card Numbers. Financial Cryptography 2001: 187-200 |
21 | EE | Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright: Secure Multiparty Computation of Approximations. ICALP 2001: 927-938 |
20 | EE | Ran Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright: Selective private function evaluation with applications to private statistics. PODC 2001: 293-304 |
19 | EE | Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001) |
18 | Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen: Depender Graphs: A Method of Fault-Tolerant Certificate Distribution. Journal of Computer Security 9(4): 323-338 (2001) | |
2000 | ||
17 | EE | Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen: Efficient fault-tolerant certificate revocation. ACM Conference on Computer and Communications Security 2000: 19-24 |
16 | EE | Jonathan K. Millen, Rebecca N. Wright: Reasoning about Trust and Insurance in a Public Key Infrastructure. CSFW 2000: 16-22 |
15 | EE | Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright: Dynamic Byzantine Quorum Systems. DSN 2000: 283- |
14 | EE | Matthew K. Franklin, Rebecca N. Wright: Secure Communication in Minimal Connectivity Models. J. Cryptology 13(1): 9-30 (2000) |
1999 | ||
13 | EE | Rebecca N. Wright, Sara Spalding: Experimental Performance of Shared RSA Modulus Generation. SODA 1999: 983-984 |
1998 | ||
12 | EE | Matthew K. Franklin, Rebecca N. Wright: Secure Communications in Minimal Connectivity Models. EUROCRYPT 1998: 346-360 |
11 | EE | Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Byzantine Quorum Systems. PODC 1998: 321 |
10 | EE | Lorrie Faith Cranor, Rebecca N. Wright: Influencing Software Usage CoRR cs.CY/9809018: (1998) |
1997 | ||
9 | Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright: Probabilistic Quorum Systems. PODC 1997: 267-273 | |
1996 | ||
8 | EE | Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright: The Omega Key Management Service. ACM Conference on Computer and Communications Security 1996: 38-47 |
7 | EE | Stuart G. Stubblebine, Rebecca N. Wright: An Authentication Logic Supporting Synchronization, Revocation, and Recency. ACM Conference on Computer and Communications Security 1996: 95-105 |
6 | EE | Fernando C. N. Pereira, Rebecca N. Wright: Finite-State Approximation of Phrase-Structure Grammars CoRR cmp-lg/9603002: (1996) |
5 | Michael J. Fischer, Rebecca N. Wright: Bounds on Secret Key Exchange Using a Random Deal of Cards. J. Cryptology 9(2): 71-99 (1996) | |
4 | Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright: The Omega Key Management Service. Journal of Computer Security 4(4): 267-288 (1996) | |
1993 | ||
3 | Michael J. Fischer, Rebecca N. Wright: An Efficient Protocol for Unconditionally Secure Secret Key Exchange. SODA 1993: 475-483 | |
1991 | ||
2 | Fernando C. N. Pereira, Rebecca N. Wright: Finite-State Approximation of Phrase Structure Grammars. ACL 1991: 246-255 | |
1 | EE | Michael J. Fischer, Rebecca N. Wright: Multiparty Secret Key Exchange Using a Random Deal of Cards. CRYPTO 1991: 141-155 |