dblp.uni-trier.dewww.uni-trier.de

Rebecca N. Wright

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
56EEYuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright: Private multiparty sampling and approximation of vector combinations. Theor. Comput. Sci. 410(18): 1730-1745 (2009)
2008
55EEJun Sakuma, Shigenobu Kobayashi, Rebecca N. Wright: Privacy-preserving reinforcement learning. ICML 2008: 864-871
54EESharon Goldberg, Shai Halevi, Aaron D. Jaggard, Vijay Ramachandran, Rebecca N. Wright: Rationality and traffic attraction: incentives for honest path announcements in bgp. SIGCOMM 2008: 267-278
53EERebecca N. Wright, Sabrina De Capitani di Vimercati: Guest Editorial: Special Issue on Computer and Communications Security. ACM Trans. Inf. Syst. Secur. 12(2): (2008)
52EEGeetha Jagannathan, Rebecca N. Wright: Privacy-preserving imputation of missing data. Data Knowl. Eng. 65(1): 40-56 (2008)
2007
51EEYuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright: Private Multiparty Sampling and Approximation of Vector Combinations. ICALP 2007: 243-254
50EEGeetha Jagannathan, Rebecca N. Wright: Private Inference Control for Aggregate Database Queries. ICDM Workshops 2007: 711-716
49EEZhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Towards Privacy-Preserving Model Selection. PinKDD 2007: 138-152
2006
48 Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006 ACM 2006
47EEZhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Privacy-Preserving Queries on Encrypted Data. ESORICS 2006: 479-495
46EEGeetha Jagannathan, Rebecca N. Wright: Privacy-Preserving Data Imputation. ICDM Workshops 2006: 535-540
45EEMichael de Mare, Rebecca N. Wright: Secure Set Membership Using 3Sat. ICICS 2006: 452-468
44EEGeetha Jagannathan, Krishnan Pillaipakkamnatt, Rebecca N. Wright: A New Privacy-Preserving Distributed k-Clustering Algorithm. SDM 2006
43EEJoan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright: Secure multiparty computation of approximations. ACM Transactions on Algorithms 2(3): 435-472 (2006)
42 Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subramaniam: Experimental analysis of a privacy-preserving scalar product protocol. Comput. Syst. Sci. Eng. 21(1): (2006)
41EEZhiqiang Yang, Rebecca N. Wright: Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data. IEEE Trans. Knowl. Data Eng. 18(9): 1253-1264 (2006)
2005
40EEZhiqiang Yang, Rebecca N. Wright: Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data. ICDE Workshops 2005: 1196
39EEZhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Anonymity-preserving data collection. KDD 2005: 334-343
38EEGeetha Jagannathan, Rebecca N. Wright: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. KDD 2005: 593-599
37EERebecca N. Wright, Zhiqiang Yang, Sheng Zhong: Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. MADNES 2005: 67-79
36EESheng Zhong, Zhiqiang Yang, Rebecca N. Wright: Privacy-enhancing k-anonymization of customer data. PODS 2005: 139-147
35 Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright: Privacy-Preserving Classification of Customer Data without Loss of Accuracy. SDM 2005
34EENoga Alon, Michael Merritt, Omer Reingold, Gadi Taubenfeld, Rebecca N. Wright: Tight bounds for shared memory systems accessed by Byzantine processes. Distributed Computing 18(2): 99-109 (2005)
2004
33EERebecca N. Wright, Zhiqiang Yang: Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. KDD 2004: 713-718
32EEHiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang: Experimental Analysis of Privacy-Preserving Statistics Computation. Secure Data Management 2004: 55-66
31EEMike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac: Accountable Privacy. Security Protocols Workshop 2004: 83-95
30EERebecca N. Wright: Accountable Privacy (Transcript of Discussion). Security Protocols Workshop 2004: 96-105
29EEDan Boneh, Joan Feigenbaum, Abraham Silberschatz, Rebecca N. Wright: PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. IEEE Data Eng. Bull. 27(1): 10-18 (2004)
2003
28 Rebecca N. Wright: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers Springer 2003
27EERebecca N. Wright: Fischer's cryptographic protocols. PODC 2003: 20-22
2002
26EEMichael Merritt, Omer Reingold, Gadi Taubenfeld, Rebecca N. Wright: Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes. DISC 2002: 222-236
25EERebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood: Privacy Tradeoffs: Myth or Reality? Panel. Financial Cryptography 2002: 147-151
24EERebecca N. Wright, Sara Spalding: Experimental Performance of Shared RSA Modulus Generation. Algorithmica 33(1): 89-103 (2002)
23EEStuart G. Stubblebine, Rebecca N. Wright: An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. IEEE Trans. Software Eng. 28(3): 256-285 (2002)
2001
22EEAviel D. Rubin, Rebecca N. Wright: Off-Line Generation of Limited-Use Credit Card Numbers. Financial Cryptography 2001: 187-200
21EEJoan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright: Secure Multiparty Computation of Approximations. ICALP 2001: 927-938
20EERan Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright: Selective private function evaluation with applications to private statistics. PODC 2001: 293-304
19EEDahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001)
18 Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen: Depender Graphs: A Method of Fault-Tolerant Certificate Distribution. Journal of Computer Security 9(4): 323-338 (2001)
2000
17EERebecca N. Wright, Patrick Lincoln, Jonathan K. Millen: Efficient fault-tolerant certificate revocation. ACM Conference on Computer and Communications Security 2000: 19-24
16EEJonathan K. Millen, Rebecca N. Wright: Reasoning about Trust and Insurance in a Public Key Infrastructure. CSFW 2000: 16-22
15EELorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright: Dynamic Byzantine Quorum Systems. DSN 2000: 283-
14EEMatthew K. Franklin, Rebecca N. Wright: Secure Communication in Minimal Connectivity Models. J. Cryptology 13(1): 9-30 (2000)
1999
13EERebecca N. Wright, Sara Spalding: Experimental Performance of Shared RSA Modulus Generation. SODA 1999: 983-984
1998
12EEMatthew K. Franklin, Rebecca N. Wright: Secure Communications in Minimal Connectivity Models. EUROCRYPT 1998: 346-360
11EEDahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Byzantine Quorum Systems. PODC 1998: 321
10EELorrie Faith Cranor, Rebecca N. Wright: Influencing Software Usage CoRR cs.CY/9809018: (1998)
1997
9 Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright: Probabilistic Quorum Systems. PODC 1997: 267-273
1996
8EEMichael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright: The Omega Key Management Service. ACM Conference on Computer and Communications Security 1996: 38-47
7EEStuart G. Stubblebine, Rebecca N. Wright: An Authentication Logic Supporting Synchronization, Revocation, and Recency. ACM Conference on Computer and Communications Security 1996: 95-105
6EEFernando C. N. Pereira, Rebecca N. Wright: Finite-State Approximation of Phrase-Structure Grammars CoRR cmp-lg/9603002: (1996)
5 Michael J. Fischer, Rebecca N. Wright: Bounds on Secret Key Exchange Using a Random Deal of Cards. J. Cryptology 9(2): 71-99 (1996)
4 Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright: The Omega Key Management Service. Journal of Computer Security 4(4): 267-288 (1996)
1993
3 Michael J. Fischer, Rebecca N. Wright: An Efficient Protocol for Unconditionally Secure Secret Key Exchange. SODA 1993: 475-483
1991
2 Fernando C. N. Pereira, Rebecca N. Wright: Finite-State Approximation of Phrase Structure Grammars. ACL 1991: 246-255
1EEMichael J. Fischer, Rebecca N. Wright: Multiparty Secret Key Exchange Using a Random Deal of Cards. CRYPTO 1991: 141-155

Coauthor Index

1Noga Alon [34]
2Lorenzo Alvisi [15]
3Dan Boneh [29]
4Mike Burmester [31]
5L. Jean Camp [25]
6Ran Canetti [20]
7Lorrie Faith Cranor [10]
8Yvo Desmedt [31]
9Joan Feigenbaum [21] [29] [43]
10Michael J. Fischer [1] [3] [5]
11Matthew K. Franklin [4] [8] [12] [14]
12Ian Goldberg [25]
13Sharon Goldberg [54]
14Shai Halevi [54]
15Yuval Ishai [20] [21] [43] [51] [56]
16Geetha Jagannathan [38] [44] [46] [50] [52]
17Aaron D. Jaggard [54]
18Ari Juels [48]
19Shigenobu Kobayashi [55]
20Ravi Kumar (S. Ravi Kumar) [20]
21John B. Lacy [4] [8]
22Patrick Lincoln [17] [18]
23Dahlia Malkhi (Dalia Malki) [9] [11] [15] [19]
24Tal Malkin [21] [43] [51] [56]
25Michael de Mare [45]
26Michael Merritt [26] [34]
27Jonathan K. Millen [16] [17] [18]
28Kobbi Nissim [21] [43]
29Fernando C. N. Pereira [2] [6]
30Evelyn Tumlin Pierce [15]
31Krishnan Pillaipakkamnatt [44]
32Vijay Ramachandran [54]
33Omer Reingold [26] [34]
34Michael K. Reiter [4] [8] [9] [11] [15] [19] [20]
35Ronald L. Rivest [25]
36Aviel D. Rubin [22]
37Ronitt Rubinfeld [20]
38Jun Sakuma [55]
39Abraham Silberschatz (Avi Silberschatz) [29]
40Sara Spalding [13] [24]
41Martin Strauss (Martin J. Strauss) [21] [43] [51] [56]
42Stuart G. Stubblebine [7] [23]
43Hiranmayee Subramaniam [32] [42]
44Gadi Taubenfeld [26] [34]
45Sabrina De Capitani di Vimercati [48] [53]
46Graham Wood [25]
47Avishai Wool [11] [19]
48Zhiqiang Yang [32] [33] [35] [36] [37] [39] [40] [41] [42] [47] [49]
49Alec Yasinsac [31]
50Sheng Zhong [35] [36] [37] [39] [47] [49]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)