2009 |
56 | EE | Yuval Ishai,
Tal Malkin,
Martin J. Strauss,
Rebecca N. Wright:
Private multiparty sampling and approximation of vector combinations.
Theor. Comput. Sci. 410(18): 1730-1745 (2009) |
2008 |
55 | EE | Jun Sakuma,
Shigenobu Kobayashi,
Rebecca N. Wright:
Privacy-preserving reinforcement learning.
ICML 2008: 864-871 |
54 | EE | Sharon Goldberg,
Shai Halevi,
Aaron D. Jaggard,
Vijay Ramachandran,
Rebecca N. Wright:
Rationality and traffic attraction: incentives for honest path announcements in bgp.
SIGCOMM 2008: 267-278 |
53 | EE | Rebecca N. Wright,
Sabrina De Capitani di Vimercati:
Guest Editorial: Special Issue on Computer and Communications Security.
ACM Trans. Inf. Syst. Secur. 12(2): (2008) |
52 | EE | Geetha Jagannathan,
Rebecca N. Wright:
Privacy-preserving imputation of missing data.
Data Knowl. Eng. 65(1): 40-56 (2008) |
2007 |
51 | EE | Yuval Ishai,
Tal Malkin,
Martin J. Strauss,
Rebecca N. Wright:
Private Multiparty Sampling and Approximation of Vector Combinations.
ICALP 2007: 243-254 |
50 | EE | Geetha Jagannathan,
Rebecca N. Wright:
Private Inference Control for Aggregate Database Queries.
ICDM Workshops 2007: 711-716 |
49 | EE | Zhiqiang Yang,
Sheng Zhong,
Rebecca N. Wright:
Towards Privacy-Preserving Model Selection.
PinKDD 2007: 138-152 |
2006 |
48 | | Ari Juels,
Rebecca N. Wright,
Sabrina De Capitani di Vimercati:
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006
ACM 2006 |
47 | EE | Zhiqiang Yang,
Sheng Zhong,
Rebecca N. Wright:
Privacy-Preserving Queries on Encrypted Data.
ESORICS 2006: 479-495 |
46 | EE | Geetha Jagannathan,
Rebecca N. Wright:
Privacy-Preserving Data Imputation.
ICDM Workshops 2006: 535-540 |
45 | EE | Michael de Mare,
Rebecca N. Wright:
Secure Set Membership Using 3Sat.
ICICS 2006: 452-468 |
44 | EE | Geetha Jagannathan,
Krishnan Pillaipakkamnatt,
Rebecca N. Wright:
A New Privacy-Preserving Distributed k-Clustering Algorithm.
SDM 2006 |
43 | EE | Joan Feigenbaum,
Yuval Ishai,
Tal Malkin,
Kobbi Nissim,
Martin J. Strauss,
Rebecca N. Wright:
Secure multiparty computation of approximations.
ACM Transactions on Algorithms 2(3): 435-472 (2006) |
42 | | Zhiqiang Yang,
Rebecca N. Wright,
Hiranmayee Subramaniam:
Experimental analysis of a privacy-preserving scalar product protocol.
Comput. Syst. Sci. Eng. 21(1): (2006) |
41 | EE | Zhiqiang Yang,
Rebecca N. Wright:
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data.
IEEE Trans. Knowl. Data Eng. 18(9): 1253-1264 (2006) |
2005 |
40 | EE | Zhiqiang Yang,
Rebecca N. Wright:
Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data.
ICDE Workshops 2005: 1196 |
39 | EE | Zhiqiang Yang,
Sheng Zhong,
Rebecca N. Wright:
Anonymity-preserving data collection.
KDD 2005: 334-343 |
38 | EE | Geetha Jagannathan,
Rebecca N. Wright:
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data.
KDD 2005: 593-599 |
37 | EE | Rebecca N. Wright,
Zhiqiang Yang,
Sheng Zhong:
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.
MADNES 2005: 67-79 |
36 | EE | Sheng Zhong,
Zhiqiang Yang,
Rebecca N. Wright:
Privacy-enhancing k-anonymization of customer data.
PODS 2005: 139-147 |
35 | | Zhiqiang Yang,
Sheng Zhong,
Rebecca N. Wright:
Privacy-Preserving Classification of Customer Data without Loss of Accuracy.
SDM 2005 |
34 | EE | Noga Alon,
Michael Merritt,
Omer Reingold,
Gadi Taubenfeld,
Rebecca N. Wright:
Tight bounds for shared memory systems accessed by Byzantine processes.
Distributed Computing 18(2): 99-109 (2005) |
2004 |
33 | EE | Rebecca N. Wright,
Zhiqiang Yang:
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data.
KDD 2004: 713-718 |
32 | EE | Hiranmayee Subramaniam,
Rebecca N. Wright,
Zhiqiang Yang:
Experimental Analysis of Privacy-Preserving Statistics Computation.
Secure Data Management 2004: 55-66 |
31 | EE | Mike Burmester,
Yvo Desmedt,
Rebecca N. Wright,
Alec Yasinsac:
Accountable Privacy.
Security Protocols Workshop 2004: 83-95 |
30 | EE | Rebecca N. Wright:
Accountable Privacy (Transcript of Discussion).
Security Protocols Workshop 2004: 96-105 |
29 | EE | Dan Boneh,
Joan Feigenbaum,
Abraham Silberschatz,
Rebecca N. Wright:
PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment.
IEEE Data Eng. Bull. 27(1): 10-18 (2004) |
2003 |
28 | | Rebecca N. Wright:
Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers
Springer 2003 |
27 | EE | Rebecca N. Wright:
Fischer's cryptographic protocols.
PODC 2003: 20-22 |
2002 |
26 | EE | Michael Merritt,
Omer Reingold,
Gadi Taubenfeld,
Rebecca N. Wright:
Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes.
DISC 2002: 222-236 |
25 | EE | Rebecca N. Wright,
L. Jean Camp,
Ian Goldberg,
Ronald L. Rivest,
Graham Wood:
Privacy Tradeoffs: Myth or Reality? Panel.
Financial Cryptography 2002: 147-151 |
24 | EE | Rebecca N. Wright,
Sara Spalding:
Experimental Performance of Shared RSA Modulus Generation.
Algorithmica 33(1): 89-103 (2002) |
23 | EE | Stuart G. Stubblebine,
Rebecca N. Wright:
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency.
IEEE Trans. Software Eng. 28(3): 256-285 (2002) |
2001 |
22 | EE | Aviel D. Rubin,
Rebecca N. Wright:
Off-Line Generation of Limited-Use Credit Card Numbers.
Financial Cryptography 2001: 187-200 |
21 | EE | Joan Feigenbaum,
Yuval Ishai,
Tal Malkin,
Kobbi Nissim,
Martin Strauss,
Rebecca N. Wright:
Secure Multiparty Computation of Approximations.
ICALP 2001: 927-938 |
20 | EE | Ran Canetti,
Yuval Ishai,
Ravi Kumar,
Michael K. Reiter,
Ronitt Rubinfeld,
Rebecca N. Wright:
Selective private function evaluation with applications to private statistics.
PODC 2001: 293-304 |
19 | EE | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool,
Rebecca N. Wright:
Probabilistic Quorum Systems.
Inf. Comput. 170(2): 184-206 (2001) |
18 | | Rebecca N. Wright,
Patrick Lincoln,
Jonathan K. Millen:
Depender Graphs: A Method of Fault-Tolerant Certificate Distribution.
Journal of Computer Security 9(4): 323-338 (2001) |
2000 |
17 | EE | Rebecca N. Wright,
Patrick Lincoln,
Jonathan K. Millen:
Efficient fault-tolerant certificate revocation.
ACM Conference on Computer and Communications Security 2000: 19-24 |
16 | EE | Jonathan K. Millen,
Rebecca N. Wright:
Reasoning about Trust and Insurance in a Public Key Infrastructure.
CSFW 2000: 16-22 |
15 | EE | Lorenzo Alvisi,
Evelyn Tumlin Pierce,
Dahlia Malkhi,
Michael K. Reiter,
Rebecca N. Wright:
Dynamic Byzantine Quorum Systems.
DSN 2000: 283- |
14 | EE | Matthew K. Franklin,
Rebecca N. Wright:
Secure Communication in Minimal Connectivity Models.
J. Cryptology 13(1): 9-30 (2000) |
1999 |
13 | EE | Rebecca N. Wright,
Sara Spalding:
Experimental Performance of Shared RSA Modulus Generation.
SODA 1999: 983-984 |
1998 |
12 | EE | Matthew K. Franklin,
Rebecca N. Wright:
Secure Communications in Minimal Connectivity Models.
EUROCRYPT 1998: 346-360 |
11 | EE | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool,
Rebecca N. Wright:
Probabilistic Byzantine Quorum Systems.
PODC 1998: 321 |
10 | EE | Lorrie Faith Cranor,
Rebecca N. Wright:
Influencing Software Usage
CoRR cs.CY/9809018: (1998) |
1997 |
9 | | Dahlia Malkhi,
Michael K. Reiter,
Rebecca N. Wright:
Probabilistic Quorum Systems.
PODC 1997: 267-273 |
1996 |
8 | EE | Michael K. Reiter,
Matthew K. Franklin,
John B. Lacy,
Rebecca N. Wright:
The Omega Key Management Service.
ACM Conference on Computer and Communications Security 1996: 38-47 |
7 | EE | Stuart G. Stubblebine,
Rebecca N. Wright:
An Authentication Logic Supporting Synchronization, Revocation, and Recency.
ACM Conference on Computer and Communications Security 1996: 95-105 |
6 | EE | Fernando C. N. Pereira,
Rebecca N. Wright:
Finite-State Approximation of Phrase-Structure Grammars
CoRR cmp-lg/9603002: (1996) |
5 | | Michael J. Fischer,
Rebecca N. Wright:
Bounds on Secret Key Exchange Using a Random Deal of Cards.
J. Cryptology 9(2): 71-99 (1996) |
4 | | Michael K. Reiter,
Matthew K. Franklin,
John B. Lacy,
Rebecca N. Wright:
The Omega Key Management Service.
Journal of Computer Security 4(4): 267-288 (1996) |
1993 |
3 | | Michael J. Fischer,
Rebecca N. Wright:
An Efficient Protocol for Unconditionally Secure Secret Key Exchange.
SODA 1993: 475-483 |
1991 |
2 | | Fernando C. N. Pereira,
Rebecca N. Wright:
Finite-State Approximation of Phrase Structure Grammars.
ACL 1991: 246-255 |
1 | EE | Michael J. Fischer,
Rebecca N. Wright:
Multiparty Secret Key Exchange Using a Random Deal of Cards.
CRYPTO 1991: 141-155 |