BibTeX records: Rebecca N. Wright

download as .bib file

@inproceedings{DBLP:conf/sigcse/RosalesMWAW24,
  author       = {Jennifer Rosales and
                  Elizabeth Melville and
                  Melissa A. Wright and
                  Saima Akhtar and
                  Rebecca N. Wright},
  editor       = {Ben Stephenson and
                  Jeffrey A. Stone and
                  Lina Battestilli and
                  Samuel A. Rebelsky and
                  Libby Shoop},
  title        = {The Experience of Near-Peer Computing Mentors: Strengthening and Expanding
                  Women's Computing Identities in Undergraduate Interdisciplinary Contexts},
  booktitle    = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2024, Volume 1, Portland, OR, USA, March 20-23,
                  2024},
  pages        = {1154--1160},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626252.3630946},
  doi          = {10.1145/3626252.3630946},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/RosalesMWAW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/RosalesMWAWW23,
  author       = {Jennifer Rosales and
                  Elizabeth Melville and
                  Melissa A. Wright and
                  Saima Akhtar and
                  Zo{\"{e}} Webb{-}Mack and
                  Rebecca N. Wright},
  editor       = {Maureen Doyle and
                  Ben Stephenson and
                  Brian Dorn and
                  Leen{-}Kiat Soh and
                  Lina Battestilli},
  title        = {Computing Fellows across Disciplines: Preliminary Results},
  booktitle    = {Proceedings of the 54th {ACM} Technical Symposium on Computer Science
                  Education, Volume 2, {SIGCSE} 2023, Toronto, ON, Canada, March 15-18,
                  2023},
  pages        = {1310},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3545947.3576257},
  doi          = {10.1145/3545947.3576257},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/RosalesMWAWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/FeigenbaumJW20,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Rebecca N. Wright},
  title        = {Accountability in Computing: Concepts and Mechanisms},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {247--399},
  year         = {2020},
  url          = {https://doi.org/10.1561/3300000002},
  doi          = {10.1561/3300000002},
  timestamp    = {Thu, 07 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/FeigenbaumJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/BittnerBGRSW20,
  author       = {Daniel M. Bittner and
                  Alejandro E. Brito and
                  Mohsen Ghassemi and
                  Shantanu Rane and
                  Anand D. Sarwate and
                  Rebecca N. Wright},
  title        = {Understanding Privacy-Utility Tradeoffs in Differentially Private
                  Online Active Learning},
  journal      = {J. Priv. Confidentiality},
  volume       = {10},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.29012/jpc.720},
  doi          = {10.29012/JPC.720},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/BittnerBGRSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/WrightNNGW19,
  author       = {Rebecca N. Wright and
                  Sally J. Nadler and
                  Thu D. Nguyen and
                  Cynthia N. Sanchez Gomez and
                  Heather M. Wright},
  editor       = {Elizabeth K. Hawthorne and
                  Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones and
                  Sarah Heckman and
                  Jian Zhang},
  title        = {Living-Learning Community for Women in Computer Science at Rutgers},
  booktitle    = {Proceedings of the 50th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2019, Minneapolis, MN, USA, February 27 - March
                  02, 2019},
  pages        = {286--292},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3287324.3287449},
  doi          = {10.1145/3287324.3287449},
  timestamp    = {Mon, 04 Mar 2019 15:45:23 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/WrightNNGW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ArcherBLKNPSW18,
  author       = {David W. Archer and
                  Dan Bogdanov and
                  Yehuda Lindell and
                  Liina Kamm and
                  Kurt Nielsen and
                  Jakob Illeborg Pagter and
                  Nigel P. Smart and
                  Rebecca N. Wright},
  title        = {From Keys to Databases - Real-World Applications of Secure Multi-Party
                  Computation},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {12},
  pages        = {1749--1771},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxy090},
  doi          = {10.1093/COMJNL/BXY090},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/ArcherBLKNPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HesamifardTGW18,
  author       = {Ehsan Hesamifard and
                  Hassan Takabi and
                  Mehdi Ghasemi and
                  Rebecca N. Wright},
  title        = {Privacy-preserving Machine Learning as a Service},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {3},
  pages        = {123--142},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0024},
  doi          = {10.1515/POPETS-2018-0024},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/HesamifardTGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/BittnerSW18,
  author       = {Daniel M. Bittner and
                  Anand D. Sarwate and
                  Rebecca N. Wright},
  editor       = {Itai Dinur and
                  Shlomi Dolev and
                  Sachin Lodha},
  title        = {Using Noisy Binary Search for Differentially Private Anomaly Detection},
  booktitle    = {Cyber Security Cryptography and Machine Learning - Second International
                  Symposium, {CSCML} 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10879},
  pages        = {20--37},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-94147-9\_3},
  doi          = {10.1007/978-3-319-94147-9\_3},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/BittnerSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/WrightSCNG17,
  author       = {Rebecca N. Wright and
                  Jane Stout and
                  Geraldine Cochran and
                  Thu D. Nguyen and
                  Cynthia Sanchez Gomez},
  editor       = {Tiffany Barnes and
                  Daniel D. Garcia and
                  Elizabeth K. Hawthorne and
                  Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones},
  title        = {Computer Science Living-Learning Community for Women at Rutgers: Initial
                  Experiences and Outcomes (Abstract Only)},
  booktitle    = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018},
  pages        = {1075},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3159450.3162277},
  doi          = {10.1145/3159450.3162277},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/WrightSCNG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArcherBLKNPSW18,
  author       = {David W. Archer and
                  Dan Bogdanov and
                  Yehuda Lindell and
                  Liina Kamm and
                  Kurt Nielsen and
                  Jakob Illeborg Pagter and
                  Nigel P. Smart and
                  Rebecca N. Wright},
  title        = {From Keys to Databases - Real-World Applications of Secure Multi-Party
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArcherBLKNPSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/teco/JaggardLSW17,
  author       = {Aaron D. Jaggard and
                  Neil Lutz and
                  Michael Schapira and
                  Rebecca N. Wright},
  title        = {Dynamics at the Boundary of Game Theory and Distributed Computing},
  journal      = {{ACM} Trans. Economics and Comput.},
  volume       = {5},
  number       = {3},
  pages        = {15:1--15:20},
  year         = {2017},
  url          = {https://doi.org/10.1145/3107182},
  doi          = {10.1145/3107182},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/teco/JaggardLSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BittnerSW17,
  author       = {Daniel M. Bittner and
                  Anand D. Sarwate and
                  Rebecca N. Wright},
  editor       = {Bhavani Thuraisingham and
                  Battista Biggio and
                  David Mandell Freeman and
                  Brad Miller and
                  Arunesh Sinha},
  title        = {Differentially Private Noisy Search with Applications to Anomaly Detection
                  (Abstract)},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {53},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3128572.3140456},
  doi          = {10.1145/3128572.3140456},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BittnerSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GhassemiSW16,
  author       = {Mohsen Ghassemi and
                  Anand D. Sarwate and
                  Rebecca N. Wright},
  editor       = {David Mandell Freeman and
                  Aikaterini Mitrokotsa and
                  Arunesh Sinha},
  title        = {Differentially Private Online Active Learning with Applications to
                  Anomaly Detection},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence
                  and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {117--128},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996758.2996766},
  doi          = {10.1145/2996758.2996766},
  timestamp    = {Mon, 26 Jun 2023 20:41:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GhassemiSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JaggardLSW15,
  author       = {Aaron D. Jaggard and
                  Neil Lutz and
                  Michael Schapira and
                  Rebecca N. Wright},
  title        = {Dynamics at the Boundary of Game Theory and Distributed Computing},
  journal      = {CoRR},
  volume       = {abs/1509.02955},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.02955},
  eprinttype    = {arXiv},
  eprint       = {1509.02955},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JaggardLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CrescenzoFGPPW14,
  author       = {Giovanni Di Crescenzo and
                  Joan Feigenbaum and
                  Debayan Gupta and
                  Euthimios Panagos and
                  Jason Perry and
                  Rebecca N. Wright},
  editor       = {Rainer B{\"{o}}hme and
                  Michael Brenner and
                  Tyler Moore and
                  Matthew Smith},
  title        = {Practical and Privacy-Preserving Policy Compliance for Outsourced
                  Data},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
                  and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8438},
  pages        = {181--194},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44774-1\_15},
  doi          = {10.1007/978-3-662-44774-1\_15},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CrescenzoFGPPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/FeigenbaumJW14,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Rebecca N. Wright},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {Open vs. closed systems for accountability},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600179},
  doi          = {10.1145/2600176.2600179},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/FeigenbaumJW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sagt/JaggardLSW14,
  author       = {Aaron D. Jaggard and
                  Neil Lutz and
                  Michael Schapira and
                  Rebecca N. Wright},
  editor       = {Ron Lavi},
  title        = {Self-stabilizing Uncoupled Dynamics},
  booktitle    = {Algorithmic Game Theory - 7th International Symposium, {SAGT} 2014,
                  Haifa, Israel, September 30 - October 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8768},
  pages        = {74--85},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44803-8\_7},
  doi          = {10.1007/978-3-662-44803-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sagt/JaggardLSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PerryGFW14,
  author       = {Jason Perry and
                  Debayan Gupta and
                  Joan Feigenbaum and
                  Rebecca N. Wright},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Systematizing Secure Computation for Research and Decision Support},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {380--397},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_22},
  doi          = {10.1007/978-3-319-10879-7\_22},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PerryGFW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/JaggardW14,
  author       = {Aaron D. Jaggard and
                  Rebecca N. Wright},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Strange Bedfellows: How and When to Work with Your Enemy},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {263--267},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_25},
  doi          = {10.1007/978-3-319-12400-1\_25},
  timestamp    = {Mon, 05 Feb 2024 20:35:15 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/JaggardW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wright14,
  author       = {Rebecca N. Wright},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Strange Bedfellows: How and When to Work with Your Enemy (Transcript
                  of Discussion)},
  booktitle    = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
                  UK, March 19-21, 2014 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8809},
  pages        = {268--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12400-1\_26},
  doi          = {10.1007/978-3-319-12400-1\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wright14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JaggardLSW14,
  author       = {Aaron D. Jaggard and
                  Neil Lutz and
                  Michael Schapira and
                  Rebecca N. Wright},
  title        = {Self-stabilizing uncoupled dynamics},
  journal      = {CoRR},
  volume       = {abs/1403.5791},
  year         = {2014},
  url          = {http://arxiv.org/abs/1403.5791},
  eprinttype    = {arXiv},
  eprint       = {1403.5791},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JaggardLSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/MirICMW13,
  author       = {Darakhshan J. Mir and
                  Sibren Isaacman and
                  Ram{\'{o}}n C{\'{a}}ceres and
                  Margaret Martonosi and
                  Rebecca N. Wright},
  editor       = {Xiaohua Hu and
                  Tsau Young Lin and
                  Vijay V. Raghavan and
                  Benjamin W. Wah and
                  Ricardo Baeza{-}Yates and
                  Geoffrey C. Fox and
                  Cyrus Shahabi and
                  Matthew Smith and
                  Qiang Yang and
                  Rayid Ghani and
                  Wei Fan and
                  Ronny Lempel and
                  Raghunath Nambiar},
  title        = {{DP-WHERE:} Differentially private modeling of human mobility},
  booktitle    = {2013 {IEEE} International Conference on Big Data {(IEEE} BigData 2013),
                  6-9 October 2013, Santa Clara, CA, {USA}},
  pages        = {580--588},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/BigData.2013.6691626},
  doi          = {10.1109/BIGDATA.2013.6691626},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/MirICMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CrescenzoCSTW13,
  author       = {Giovanni Di Crescenzo and
                  Brian A. Coan and
                  John L. Schultz and
                  Simon Tsang and
                  Rebecca N. Wright},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Georgios V. Lioudakis and
                  Nora Cuppens{-}Boulahia and
                  Simon N. Foley and
                  William M. Fitzgerald},
  title        = {Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed
                  Model},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 8th
                  International Workshop, {DPM} 2013, and 6th International Workshop,
                  {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8247},
  pages        = {114--132},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-54568-9\_8},
  doi          = {10.1007/978-3-642-54568-9\_8},
  timestamp    = {Sun, 25 Oct 2020 22:34:56 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CrescenzoCSTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/CrescenzoBCSSTW13,
  author       = {Giovanni Di Crescenzo and
                  Jim Burns and
                  Brian A. Coan and
                  John L. Schultz and
                  Jonathan Robert Stanton and
                  Simon Tsang and
                  Rebecca N. Wright},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {Efficient and Private Three-Party Publish/Subscribe},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_21},
  doi          = {10.1007/978-3-642-38631-2\_21},
  timestamp    = {Tue, 09 Feb 2021 08:50:29 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/CrescenzoBCSSTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/JaggardKRW13,
  author       = {Aaron D. Jaggard and
                  Swara Kopparty and
                  Vijay Ramachandran and
                  Rebecca N. Wright},
  editor       = {Mor Harchol{-}Balter and
                  John R. Douceur and
                  Jun Xu},
  title        = {The design space of probing algorithms for network-performance measurement},
  booktitle    = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling
                  of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21,
                  2013},
  pages        = {105--116},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2465529.2465765},
  doi          = {10.1145/2465529.2465765},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/JaggardKRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/JagannathanPW12,
  author       = {Geetha Jagannathan and
                  Krishnan Pillaipakkamnatt and
                  Rebecca N. Wright},
  title        = {A Practical Differentially Private Random Decision Tree Classifier},
  journal      = {Trans. Data Priv.},
  volume       = {5},
  number       = {1},
  pages        = {273--295},
  year         = {2012},
  url          = {http://www.tdp.cat/issues11/abs.a082a11.php},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdp/JagannathanPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/MirW12,
  author       = {Darakhshan J. Mir and
                  Rebecca N. Wright},
  editor       = {Divesh Srivastava and
                  Ismail Ari},
  title        = {A differentially private estimator for the stochastic Kronecker graph
                  model},
  booktitle    = {Proceedings of the 2012 Joint {EDBT/ICDT} Workshops, Berlin, Germany,
                  March 30, 2012},
  pages        = {167--176},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2320765.2320818},
  doi          = {10.1145/2320765.2320818},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/MirW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/CamenischMTW12,
  author       = {Jan Camenisch and
                  Mark Manulis and
                  Gene Tsudik and
                  Rebecca N. Wright},
  title        = {Privacy-Oriented Cryptography (Dagstuhl Seminar 12381)},
  journal      = {Dagstuhl Reports},
  volume       = {2},
  number       = {9},
  pages        = {165--183},
  year         = {2012},
  url          = {https://doi.org/10.4230/DagRep.2.9.165},
  doi          = {10.4230/DAGREP.2.9.165},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/CamenischMTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/JaggardSW11,
  author       = {Aaron D. Jaggard and
                  Michael Schapira and
                  Rebecca N. Wright},
  editor       = {Bernard Chazelle},
  title        = {Distributed Computing with Adaptive Heuristics},
  booktitle    = {Innovations in Computer Science - {ICS} 2011, Tsinghua University,
                  Beijing, China, January 7-9, 2011. Proceedings},
  pages        = {417--443},
  publisher    = {Tsinghua University Press},
  year         = {2011},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/25.html},
  timestamp    = {Mon, 23 Mar 2020 08:26:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/JaggardSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FeigenbaumJW11,
  author       = {Joan Feigenbaum and
                  Aaron D. Jaggard and
                  Rebecca N. Wright},
  editor       = {Sean Peisert and
                  Richard Ford and
                  Carrie Gates and
                  Cormac Herley},
  title        = {Towards a formal model of accountability},
  booktitle    = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
                  USA, September 12-15, 2011},
  pages        = {45--56},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2073276.2073282},
  doi          = {10.1145/2073276.2073282},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/FeigenbaumJW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/JaggardSW11,
  author       = {Aaron D. Jaggard and
                  Michael Schapira and
                  Rebecca N. Wright},
  editor       = {Cyril Gavoille and
                  Pierre Fraigniaud},
  title        = {Distributed computing with rules of thumb},
  booktitle    = {Proceedings of the 30th Annual {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2011, San Jose, CA, USA, June 6-8, 2011},
  pages        = {333--334},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993806.1993870},
  doi          = {10.1145/1993806.1993870},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/JaggardSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/MirMNW11,
  author       = {Darakhshan J. Mir and
                  S. Muthukrishnan and
                  Aleksandar Nikolov and
                  Rebecca N. Wright},
  editor       = {Maurizio Lenzerini and
                  Thomas Schwentick},
  title        = {Pan-private algorithms via statistics on sketches},
  booktitle    = {Proceedings of the 30th {ACM} {SIGMOD-SIGACT-SIGART} Symposium on
                  Principles of Database Systems, {PODS} 2011, June 12-16, 2011, Athens,
                  Greece},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1989284.1989290},
  doi          = {10.1145/1989284.1989290},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pods/MirMNW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/FeigenbaumHJWW11,
  author       = {Joan Feigenbaum and
                  James A. Hendler and
                  Aaron D. Jaggard and
                  Daniel J. Weitzner and
                  Rebecca N. Wright},
  editor       = {David De Roure and
                  Marshall Scott Poole},
  title        = {Accountability and deterrence in online life},
  booktitle    = {Web Science 2011, WebSci '11, Koblenz, Germany - June 15 - 17, 2011},
  pages        = {7:1--7:7},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2527031.2527043},
  doi          = {10.1145/2527031.2527043},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/websci/FeigenbaumHJWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/JagannathanPWU10,
  author       = {Geetha Jagannathan and
                  Krishnan Pillaipakkamnatt and
                  Rebecca N. Wright and
                  Daryl Umano},
  title        = {Communication-Efficient Privacy-Preserving Clustering},
  journal      = {Trans. Data Priv.},
  volume       = {3},
  number       = {1},
  pages        = {1--25},
  year         = {2010},
  url          = {http://www.tdp.cat/issues/abs.a028a09.php},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdp/JagannathanPWU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2010,
  editor       = {Swee{-}Huay Heng and
                  Rebecca N. Wright and
                  Bok{-}Min Goi},
  title        = {Cryptology and Network Security - 9th International Conference, {CANS}
                  2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6467},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17619-7},
  doi          = {10.1007/978-3-642-17619-7},
  isbn         = {978-3-642-17618-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1009-1544,
  author       = {Darakhshan J. Mir and
                  S. Muthukrishnan and
                  Aleksandar Nikolov and
                  Rebecca N. Wright},
  title        = {Pan-private Algorithms: When Memory Does Not Help},
  journal      = {CoRR},
  volume       = {abs/1009.1544},
  year         = {2010},
  url          = {http://arxiv.org/abs/1009.1544},
  eprinttype    = {arXiv},
  eprint       = {1009.1544},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1009-1544.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/IshaiMSW09,
  author       = {Yuval Ishai and
                  Tal Malkin and
                  Martin J. Strauss and
                  Rebecca N. Wright},
  title        = {Private multiparty sampling and approximation of vector combinations},
  journal      = {Theor. Comput. Sci.},
  volume       = {410},
  number       = {18},
  pages        = {1730--1745},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.tcs.2008.12.062},
  doi          = {10.1016/J.TCS.2008.12.062},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/IshaiMSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acml/SakumaW09,
  author       = {Jun Sakuma and
                  Rebecca N. Wright},
  editor       = {Zhi{-}Hua Zhou and
                  Takashi Washio},
  title        = {Privacy-Preserving Evaluation of Generalization Error and Its Application
                  to Model and Attribute Selection},
  booktitle    = {Advances in Machine Learning, First Asian Conference on Machine Learning,
                  {ACML} 2009, Nanjing, China, November 2-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5828},
  pages        = {338--353},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05224-8\_26},
  doi          = {10.1007/978-3-642-05224-8\_26},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acml/SakumaW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/JaggardRW09,
  author       = {Aaron D. Jaggard and
                  Vijay Ramachandran and
                  Rebecca N. Wright},
  title        = {The Impact of Communication Models on Routing-Algorithm Convergence},
  booktitle    = {29th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2009), 22-26 June 2009, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {58--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDCS.2009.61},
  doi          = {10.1109/ICDCS.2009.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/JaggardRW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/JagannathanPW09,
  author       = {Geetha Jagannathan and
                  Krishnan Pillaipakkamnatt and
                  Rebecca N. Wright},
  editor       = {Y{\"{u}}cel Saygin and
                  Jeffrey Xu Yu and
                  Hillol Kargupta and
                  Wei Wang and
                  Sanjay Ranka and
                  Philip S. Yu and
                  Xindong Wu},
  title        = {A Practical Differentially Private Random Decision Tree Classifier},
  booktitle    = {{ICDM} Workshops 2009, {IEEE} International Conference on Data Mining
                  Workshops, Miami, Florida, USA, 6 December 2009},
  pages        = {114--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDMW.2009.93},
  doi          = {10.1109/ICDMW.2009.93},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/JagannathanPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/MirW09,
  author       = {Darakhshan J. Mir and
                  Rebecca N. Wright},
  editor       = {Y{\"{u}}cel Saygin and
                  Jeffrey Xu Yu and
                  Hillol Kargupta and
                  Wei Wang and
                  Sanjay Ranka and
                  Philip S. Yu and
                  Xindong Wu},
  title        = {A Differentially Private Graph Estimator},
  booktitle    = {{ICDM} Workshops 2009, {IEEE} International Conference on Data Mining
                  Workshops, Miami, Florida, USA, 6 December 2009},
  pages        = {122--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDMW.2009.96},
  doi          = {10.1109/ICDMW.2009.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/MirW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JonasWW09,
  author       = {Jeff Jonas and
                  William E. Winkler and
                  Rebecca N. Wright},
  editor       = {David Jefferson and
                  Joseph Lorenzo Hall and
                  Tal Moran},
  title        = {Interstate Voter Registration Database Matching: The Oregon-Washington
                  2008 Pilot Project},
  booktitle    = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy
                  Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {https://www.usenix.org/conference/evtwote-09/interstate-voter-registration-database-matching-oregon-washington-2008-pilot},
  timestamp    = {Mon, 01 Feb 2021 08:43:14 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JonasWW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0910-1585,
  author       = {Aaron D. Jaggard and
                  Michael Schapira and
                  Rebecca N. Wright},
  title        = {Towards a Unified Approach to (In)Decision: Routing, Games, Circuits,
                  Consensus, and Beyond},
  journal      = {CoRR},
  volume       = {abs/0910.1585},
  year         = {2009},
  url          = {http://arxiv.org/abs/0910.1585},
  eprinttype    = {arXiv},
  eprint       = {0910.1585},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0910-1585.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/JagannathanW08,
  author       = {Geetha Jagannathan and
                  Rebecca N. Wright},
  title        = {Privacy-preserving imputation of missing data},
  journal      = {Data Knowl. Eng.},
  volume       = {65},
  number       = {1},
  pages        = {40--56},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.datak.2007.06.013},
  doi          = {10.1016/J.DATAK.2007.06.013},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/JagannathanW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WrightV08,
  author       = {Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Guest Editorial: Special Issue on Computer and Communications Security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {2},
  pages        = {7:1--7:2},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455518.1455519},
  doi          = {10.1145/1455518.1455519},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WrightV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/SakumaKW08,
  author       = {Jun Sakuma and
                  Shigenobu Kobayashi and
                  Rebecca N. Wright},
  editor       = {William W. Cohen and
                  Andrew McCallum and
                  Sam T. Roweis},
  title        = {Privacy-preserving reinforcement learning},
  booktitle    = {Machine Learning, Proceedings of the Twenty-Fifth International Conference
                  {(ICML} 2008), Helsinki, Finland, June 5-9, 2008},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {307},
  pages        = {864--871},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1390156.1390265},
  doi          = {10.1145/1390156.1390265},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/SakumaKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/GoldbergHJRW08,
  author       = {Sharon Goldberg and
                  Shai Halevi and
                  Aaron D. Jaggard and
                  Vijay Ramachandran and
                  Rebecca N. Wright},
  editor       = {Victor Bahl and
                  David Wetherall and
                  Stefan Savage and
                  Ion Stoica},
  title        = {Rationality and traffic attraction: incentives for honest path announcements
                  in bgp},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2008 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Seattle, WA, USA, August 17-22, 2008},
  pages        = {267--278},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1402958.1402989},
  doi          = {10.1145/1402958.1402989},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/GoldbergHJRW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/IshaiMSW07,
  author       = {Yuval Ishai and
                  Tal Malkin and
                  Martin J. Strauss and
                  Rebecca N. Wright},
  editor       = {Lars Arge and
                  Christian Cachin and
                  Tomasz Jurdzinski and
                  Andrzej Tarlecki},
  title        = {Private Multiparty Sampling and Approximation of Vector Combinations},
  booktitle    = {Automata, Languages and Programming, 34th International Colloquium,
                  {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4596},
  pages        = {243--254},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73420-8\_23},
  doi          = {10.1007/978-3-540-73420-8\_23},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/IshaiMSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/JagannathanW07,
  author       = {Geetha Jagannathan and
                  Rebecca N. Wright},
  title        = {Private Inference Control for Aggregate Database Queries},
  booktitle    = {Workshops Proceedings of the 7th {IEEE} International Conference on
                  Data Mining {(ICDM} 2007), October 28-31, 2007, Omaha, Nebraska, {USA}},
  pages        = {711--716},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICDMW.2007.66},
  doi          = {10.1109/ICDMW.2007.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/JagannathanW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/YangZW07,
  author       = {Zhiqiang Yang and
                  Sheng Zhong and
                  Rebecca N. Wright},
  editor       = {Francesco Bonchi and
                  Elena Ferrari and
                  Bradley A. Malin and
                  Y{\"{u}}cel Saygin},
  title        = {Towards Privacy-Preserving Model Selection},
  booktitle    = {Privacy, Security, and Trust in KDD, First {ACM} {SIGKDD} International
                  Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4890},
  pages        = {138--152},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-78478-4\_8},
  doi          = {10.1007/978-3-540-78478-4\_8},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/YangZW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/YangWS06,
  author       = {Zhiqiang Yang and
                  Rebecca N. Wright and
                  Hiranmayee Subramaniam},
  title        = {Experimental analysis of a privacy-preserving scalar product protocol},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {21},
  number       = {1},
  year         = {2006},
  timestamp    = {Tue, 20 Feb 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/YangWS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talg/FeigenbaumIMNSW06,
  author       = {Joan Feigenbaum and
                  Yuval Ishai and
                  Tal Malkin and
                  Kobbi Nissim and
                  Martin J. Strauss and
                  Rebecca N. Wright},
  title        = {Secure multiparty computation of approximations},
  journal      = {{ACM} Trans. Algorithms},
  volume       = {2},
  number       = {3},
  pages        = {435--472},
  year         = {2006},
  url          = {https://doi.org/10.1145/1159892.1159900},
  doi          = {10.1145/1159892.1159900},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/talg/FeigenbaumIMNSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/YangW06,
  author       = {Zhiqiang Yang and
                  Rebecca N. Wright},
  title        = {Privacy-Preserving Computation of Bayesian Networks on Vertically
                  Partitioned Data},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {18},
  number       = {9},
  pages        = {1253--1264},
  year         = {2006},
  url          = {https://doi.org/10.1109/TKDE.2006.147},
  doi          = {10.1109/TKDE.2006.147},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/YangW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YangZW06,
  author       = {Zhiqiang Yang and
                  Sheng Zhong and
                  Rebecca N. Wright},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Privacy-Preserving Queries on Encrypted Data},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {479--495},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_29},
  doi          = {10.1007/11863908\_29},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YangZW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/JagannathanW06,
  author       = {Geetha Jagannathan and
                  Rebecca N. Wright},
  title        = {Privacy-Preserving Data Imputation},
  booktitle    = {Workshops Proceedings of the 6th {IEEE} International Conference on
                  Data Mining {(ICDM} 2006), 18-22 December 2006, Hong Kong, China},
  pages        = {535--540},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDMW.2006.134},
  doi          = {10.1109/ICDMW.2006.134},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/JagannathanW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MareW06,
  author       = {Michael de Mare and
                  Rebecca N. Wright},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Secure Set Membership Using 3Sat},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {452--468},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_32},
  doi          = {10.1007/11935308\_32},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MareW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/JagannathanPW06,
  author       = {Geetha Jagannathan and
                  Krishnan Pillaipakkamnatt and
                  Rebecca N. Wright},
  editor       = {Joydeep Ghosh and
                  Diane Lambert and
                  David B. Skillicorn and
                  Jaideep Srivastava},
  title        = {A New Privacy-Preserving Distributed k-Clustering Algorithm},
  booktitle    = {Proceedings of the Sixth {SIAM} International Conference on Data Mining,
                  April 20-22, 2006, Bethesda, MD, {USA}},
  pages        = {494--498},
  publisher    = {{SIAM}},
  year         = {2006},
  url          = {https://doi.org/10.1137/1.9781611972764.47},
  doi          = {10.1137/1.9781611972764.47},
  timestamp    = {Wed, 17 May 2017 14:24:53 +0200},
  biburl       = {https://dblp.org/rec/conf/sdm/JagannathanPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006usa,
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405},
  doi          = {10.1145/1180405},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2006usa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/AlonMRTW05,
  author       = {Noga Alon and
                  Michael Merritt and
                  Omer Reingold and
                  Gadi Taubenfeld and
                  Rebecca N. Wright},
  title        = {Tight bounds for shared memory systems accessed by Byzantine processes},
  journal      = {Distributed Comput.},
  volume       = {18},
  number       = {2},
  pages        = {99--109},
  year         = {2005},
  url          = {https://doi.org/10.1007/s00446-005-0125-8},
  doi          = {10.1007/S00446-005-0125-8},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/AlonMRTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/YangW05,
  author       = {Zhiqiang Yang and
                  Rebecca N. Wright},
  title        = {Improved Privacy-Preserving Bayesian Network Parameter Learning on
                  Vertically Partitioned Data},
  booktitle    = {Proceedings of the 21st International Conference on Data Engineering
                  Workshops, {ICDE} 2005, 5-8 April 2005, Tokyo, Japan},
  pages        = {1196},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDE.2005.230},
  doi          = {10.1109/ICDE.2005.230},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/YangW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/YangZW05,
  author       = {Zhiqiang Yang and
                  Sheng Zhong and
                  Rebecca N. Wright},
  editor       = {Robert Grossman and
                  Roberto J. Bayardo and
                  Kristin P. Bennett},
  title        = {Anonymity-preserving data collection},
  booktitle    = {Proceedings of the Eleventh {ACM} {SIGKDD} International Conference
                  on Knowledge Discovery and Data Mining, Chicago, Illinois, USA, August
                  21-24, 2005},
  pages        = {334--343},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1081870.1081909},
  doi          = {10.1145/1081870.1081909},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/YangZW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/JagannathanW05,
  author       = {Geetha Jagannathan and
                  Rebecca N. Wright},
  editor       = {Robert Grossman and
                  Roberto J. Bayardo and
                  Kristin P. Bennett},
  title        = {Privacy-preserving distributed k-means clustering over arbitrarily
                  partitioned data},
  booktitle    = {Proceedings of the Eleventh {ACM} {SIGKDD} International Conference
                  on Knowledge Discovery and Data Mining, Chicago, Illinois, USA, August
                  21-24, 2005},
  pages        = {593--599},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1081870.1081942},
  doi          = {10.1145/1081870.1081942},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/JagannathanW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/madnes/WrightYZ05,
  author       = {Rebecca N. Wright and
                  Zhiqiang Yang and
                  Sheng Zhong},
  editor       = {Mike Burmester and
                  Alec Yasinsac},
  title        = {Distributed Data Mining Protocols for Privacy: {A} Review of Some
                  Recent Results},
  booktitle    = {Secure Mobile Ad-hoc Networks and Sensors, First International Workshop,
                  {MADNES} 2005, Singapore, September 20-22, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4074},
  pages        = {67--79},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11801412\_7},
  doi          = {10.1007/11801412\_7},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/madnes/WrightYZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/ZhongYW05,
  author       = {Sheng Zhong and
                  Zhiqiang Yang and
                  Rebecca N. Wright},
  editor       = {Chen Li},
  title        = {Privacy-enhancing \emph{k}-anonymization of customer data},
  booktitle    = {Proceedings of the Twenty-fourth {ACM} {SIGACT-SIGMOD-SIGART} Symposium
                  on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland,
                  {USA}},
  pages        = {139--147},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1065167.1065185},
  doi          = {10.1145/1065167.1065185},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pods/ZhongYW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/YangZW05,
  author       = {Zhiqiang Yang and
                  Sheng Zhong and
                  Rebecca N. Wright},
  editor       = {Hillol Kargupta and
                  Jaideep Srivastava and
                  Chandrika Kamath and
                  Arnold Goodman},
  title        = {Privacy-Preserving Classification of Customer Data without Loss of
                  Accuracy},
  booktitle    = {Proceedings of the 2005 {SIAM} International Conference on Data Mining,
                  {SDM} 2005, Newport Beach, CA, USA, April 21-23, 2005},
  pages        = {92--102},
  publisher    = {{SIAM}},
  year         = {2005},
  url          = {https://doi.org/10.1137/1.9781611972757.9},
  doi          = {10.1137/1.9781611972757.9},
  timestamp    = {Fri, 06 Oct 2023 11:45:43 +0200},
  biburl       = {https://dblp.org/rec/conf/sdm/YangZW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/BonehFSW04,
  author       = {Dan Boneh and
                  Joan Feigenbaum and
                  Abraham Silberschatz and
                  Rebecca N. Wright},
  title        = {{PORTIA:} Privacy, Obligations, and Rights in Technologies of Information
                  Assessment},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {27},
  number       = {1},
  pages        = {10--18},
  year         = {2004},
  url          = {http://sites.computer.org/debull/A04mar/avi.ps},
  timestamp    = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/debu/BonehFSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/WrightY04,
  author       = {Rebecca N. Wright and
                  Zhiqiang Yang},
  editor       = {Won Kim and
                  Ron Kohavi and
                  Johannes Gehrke and
                  William DuMouchel},
  title        = {Privacy-preserving Bayesian network structure computation on distributed
                  heterogeneous data},
  booktitle    = {Proceedings of the Tenth {ACM} {SIGKDD} International Conference on
                  Knowledge Discovery and Data Mining, Seattle, Washington, USA, August
                  22-25, 2004},
  pages        = {713--718},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1014052.1014145},
  doi          = {10.1145/1014052.1014145},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kdd/WrightY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/SubramaniamWY04,
  author       = {Hiranmayee Subramaniam and
                  Rebecca N. Wright and
                  Zhiqiang Yang},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Experimental Analysis of Privacy-Preserving Statistics Computation},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {55--66},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_5},
  doi          = {10.1007/978-3-540-30073-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/SubramaniamWY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BurmesterDWY04,
  author       = {Mike Burmester and
                  Yvo Desmedt and
                  Rebecca N. Wright and
                  Alec Yasinsac},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Accountable Privacy},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {83--95},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_10},
  doi          = {10.1007/11861386\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BurmesterDWY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Wright04,
  author       = {Rebecca N. Wright},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Accountable Privacy (Transcript of Discussion)},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {96--105},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_11},
  doi          = {10.1007/11861386\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Wright04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Wright03,
  author       = {Rebecca N. Wright},
  editor       = {Elizabeth Borowsky and
                  Sergio Rajsbaum},
  title        = {Fischer's cryptographic protocols},
  booktitle    = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
                  Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
                  13-16, 2003},
  pages        = {20--22},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/872035.872039},
  doi          = {10.1145/872035.872039},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/Wright03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2003,
  editor       = {Rebecca N. Wright},
  title        = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
                  French West Indies, January 27-30, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45126-6},
  doi          = {10.1007/978-3-540-45126-6},
  isbn         = {3-540-40663-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/WrightS02,
  author       = {Rebecca N. Wright and
                  Sara Spalding},
  title        = {Experimental Performance of Shared {RSA} Modulus Generation},
  journal      = {Algorithmica},
  volume       = {33},
  number       = {1},
  pages        = {89--103},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00453-001-0106-7},
  doi          = {10.1007/S00453-001-0106-7},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/WrightS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/StubblebineW02,
  author       = {Stuart G. Stubblebine and
                  Rebecca N. Wright},
  title        = {An Authentication Logic with Formal Semantics Supporting Synchronization,
                  Revocation, and Recency},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {28},
  number       = {3},
  pages        = {256--285},
  year         = {2002},
  url          = {https://doi.org/10.1109/32.991320},
  doi          = {10.1109/32.991320},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/StubblebineW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/WrightCGRW02,
  author       = {Rebecca N. Wright and
                  L. Jean Camp and
                  Ian Goldberg and
                  Ronald L. Rivest and
                  Graham Wood},
  editor       = {Matt Blaze},
  title        = {Privacy Tradeoffs: Myth or Reality? Panel},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {147--151},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_11},
  doi          = {10.1007/3-540-36504-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/WrightCGRW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/MerrittRTW02,
  author       = {Michael Merritt and
                  Omer Reingold and
                  Gadi Taubenfeld and
                  Rebecca N. Wright},
  editor       = {Dahlia Malkhi},
  title        = {Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes},
  booktitle    = {Distributed Computing, 16th International Conference, {DISC} 2002,
                  Toulouse, France, October 28-30, 2002 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2508},
  pages        = {222--236},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36108-1\_15},
  doi          = {10.1007/3-540-36108-1\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/MerrittRTW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/MalkhiRWW01,
  author       = {Dahlia Malkhi and
                  Michael K. Reiter and
                  Avishai Wool and
                  Rebecca N. Wright},
  title        = {Probabilistic Quorum Systems},
  journal      = {Inf. Comput.},
  volume       = {170},
  number       = {2},
  pages        = {184--206},
  year         = {2001},
  url          = {https://doi.org/10.1006/inco.2001.3054},
  doi          = {10.1006/INCO.2001.3054},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/MalkhiRWW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WrightLM01,
  author       = {Rebecca N. Wright and
                  Patrick Lincoln and
                  Jonathan K. Millen},
  title        = {Depender Graphs: {A} Method of Fault-Tolerant Certificate Distribution},
  journal      = {J. Comput. Secur.},
  volume       = {9},
  number       = {4},
  pages        = {323--338},
  year         = {2001},
  url          = {https://doi.org/10.3233/jcs-2001-9403},
  doi          = {10.3233/JCS-2001-9403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/WrightLM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RubinW01,
  author       = {Aviel D. Rubin and
                  Rebecca N. Wright},
  editor       = {Paul F. Syverson},
  title        = {Off-Line Generation of Limited-Use Credit Card Numbers},
  booktitle    = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
                  Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2339},
  pages        = {187--200},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-46088-8\_18},
  doi          = {10.1007/3-540-46088-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RubinW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FeigenbaumIMNSW01,
  author       = {Joan Feigenbaum and
                  Yuval Ishai and
                  Tal Malkin and
                  Kobbi Nissim and
                  Martin Strauss and
                  Rebecca N. Wright},
  editor       = {Fernando Orejas and
                  Paul G. Spirakis and
                  Jan van Leeuwen},
  title        = {Secure Multiparty Computation of Approximations},
  booktitle    = {Automata, Languages and Programming, 28th International Colloquium,
                  {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2076},
  pages        = {927--938},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-48224-5\_75},
  doi          = {10.1007/3-540-48224-5\_75},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FeigenbaumIMNSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/CanettiIKRRW01,
  author       = {Ran Canetti and
                  Yuval Ishai and
                  Ravi Kumar and
                  Michael K. Reiter and
                  Ronitt Rubinfeld and
                  Rebecca N. Wright},
  editor       = {Ajay D. Kshemkalyani and
                  Nir Shavit},
  title        = {Selective private function evaluation with applications to private
                  statistics},
  booktitle    = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA,
                  August 26-29, 2001},
  pages        = {293--304},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/383962.384047},
  doi          = {10.1145/383962.384047},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/CanettiIKRRW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeigenbaumIMNSW01,
  author       = {Joan Feigenbaum and
                  Yuval Ishai and
                  Tal Malkin and
                  Kobbi Nissim and
                  Martin Strauss and
                  Rebecca N. Wright},
  title        = {Secure Multiparty Computation of Approximations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {24},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/024},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeigenbaumIMNSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FranklinW00,
  author       = {Matthew K. Franklin and
                  Rebecca N. Wright},
  title        = {Secure Communication in Minimal Connectivity Models},
  journal      = {J. Cryptol.},
  volume       = {13},
  number       = {1},
  pages        = {9--30},
  year         = {2000},
  url          = {https://doi.org/10.1007/s001459910002},
  doi          = {10.1007/S001459910002},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FranklinW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WrightLM00,
  author       = {Rebecca N. Wright and
                  Patrick Lincoln and
                  Jonathan K. Millen},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Efficient fault-tolerant certificate revocation},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352605},
  doi          = {10.1145/352600.352605},
  timestamp    = {Tue, 10 Nov 2020 20:00:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WrightLM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cfp/CranorW00,
  author       = {Lorrie Faith Cranor and
                  Rebecca N. Wright},
  editor       = {Lorrie Faith Cranor},
  title        = {Influencing software usage},
  booktitle    = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy:
                  Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada,
                  April 4-7, 2000},
  pages        = {45--55},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/332186.332210},
  doi          = {10.1145/332186.332210},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cfp/CranorW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cfp/Wright00,
  author       = {Rebecca N. Wright},
  editor       = {Lorrie Faith Cranor},
  title        = {Obstacles to freedom and privacy by design},
  booktitle    = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy:
                  Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada,
                  April 4-7, 2000},
  pages        = {97--100},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/332186.332260},
  doi          = {10.1145/332186.332260},
  timestamp    = {Mon, 23 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cfp/Wright00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MillenW00,
  author       = {Jonathan K. Millen and
                  Rebecca N. Wright},
  title        = {Reasoning about Trust and Insurance in a Public Key Infrastructure},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {16--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856922},
  doi          = {10.1109/CSFW.2000.856922},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MillenW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/AlvisiPMRW00,
  author       = {Lorenzo Alvisi and
                  Evelyn Tumlin Pierce and
                  Dahlia Malkhi and
                  Michael K. Reiter and
                  Rebecca N. Wright},
  title        = {Dynamic Byzantine Quorum Systems},
  booktitle    = {2000 International Conference on Dependable Systems and Networks {(DSN}
                  2000) (formerly {FTCS-30} and DCCA-8), 25-28 June 2000, New York,
                  NY, {USA}},
  pages        = {283--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICDSN.2000.857551},
  doi          = {10.1109/ICDSN.2000.857551},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/AlvisiPMRW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/WrightS99,
  author       = {Rebecca N. Wright and
                  Sara Spalding},
  editor       = {Robert Endre Tarjan and
                  Tandy J. Warnow},
  title        = {Experimental Performance of Shared {RSA} Modulus Generation},
  booktitle    = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  17-19 January 1999, Baltimore, Maryland, {USA}},
  pages        = {983--984},
  publisher    = {{ACM/SIAM}},
  year         = {1999},
  url          = {http://dl.acm.org/citation.cfm?id=314500.314960},
  timestamp    = {Thu, 05 Jul 2018 07:29:57 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/WrightS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FranklinW98,
  author       = {Matthew K. Franklin and
                  Rebecca N. Wright},
  editor       = {Kaisa Nyberg},
  title        = {Secure Communications in Minimal Connectivity Models},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {346--360},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054138},
  doi          = {10.1007/BFB0054138},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FranklinW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/MalkhiRWW98,
  author       = {Dahlia Malkhi and
                  Michael K. Reiter and
                  Avishai Wool and
                  Rebecca N. Wright},
  editor       = {Brian A. Coan and
                  Yehuda Afek},
  title        = {Probabilistic Byzantine Quorum Systems},
  booktitle    = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June
                  28 - July 2, 1998},
  pages        = {321},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/277697.277781},
  doi          = {10.1145/277697.277781},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/MalkhiRWW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dimacs/dimacs38,
  editor       = {Rebecca N. Wright and
                  Peter G. Neumann},
  title        = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4,
                  1996},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {38},
  publisher    = {{DIMACS/AMS}},
  year         = {1998},
  url          = {https://doi.org/10.1090/dimacs/038},
  doi          = {10.1090/DIMACS/038},
  isbn         = {978-0-8218-0832-0},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/dimacs38.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CY-9809018,
  author       = {Lorrie Faith Cranor and
                  Rebecca N. Wright},
  title        = {Influencing Software Usage},
  journal      = {CoRR},
  volume       = {cs.CY/9809018},
  year         = {1998},
  url          = {https://arxiv.org/abs/cs/9809018},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-CY-9809018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/MalkhiRW97a,
  author       = {Dahlia Malkhi and
                  Michael K. Reiter and
                  Rebecca N. Wright},
  editor       = {James E. Burns and
                  Hagit Attiya},
  title        = {Probabilistic Quorum Systems},
  booktitle    = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Santa Barbara, California, USA, August 21-24,
                  1997},
  pages        = {267--273},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/259380.259458},
  doi          = {10.1145/259380.259458},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/MalkhiRW97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ReiterFLW96,
  author       = {Michael K. Reiter and
                  Matthew K. Franklin and
                  John B. Lacy and
                  Rebecca N. Wright},
  title        = {The Omega Key Management Service},
  journal      = {J. Comput. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {267--288},
  year         = {1996},
  url          = {https://doi.org/10.3233/JCS-1996-4402},
  doi          = {10.3233/JCS-1996-4402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ReiterFLW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/FischerW96,
  author       = {Michael J. Fischer and
                  Rebecca N. Wright},
  title        = {Bounds on Secret Key Exchange Using a Random Deal of Cards},
  journal      = {J. Cryptol.},
  volume       = {9},
  number       = {2},
  pages        = {71--99},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF00190803},
  doi          = {10.1007/BF00190803},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/FischerW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ReiterFLW96,
  author       = {Michael K. Reiter and
                  Matthew K. Franklin and
                  John B. Lacy and
                  Rebecca N. Wright},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {The Omega Key Management Service},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {38--47},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238184},
  doi          = {10.1145/238168.238184},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ReiterFLW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StubblebineW96,
  author       = {Stuart G. Stubblebine and
                  Rebecca N. Wright},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {An Authentication Logic Supporting Synchronization, Revocation, and
                  Recency},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {95--105},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238195},
  doi          = {10.1145/238168.238195},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StubblebineW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cmp-lg-9603002,
  author       = {Fernando C. N. Pereira and
                  Rebecca N. Wright},
  title        = {Finite-State Approximation of Phrase-Structure Grammars},
  journal      = {CoRR},
  volume       = {cmp-lg/9603002},
  year         = {1996},
  url          = {http://arxiv.org/abs/cmp-lg/9603002},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/cmp-lg-9603002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/FischerW93,
  author       = {Michael J. Fischer and
                  Rebecca N. Wright},
  editor       = {Vijaya Ramachandran},
  title        = {An Efficient Protocol for Unconditionally Secure Secret Key Exchange},
  booktitle    = {Proceedings of the Fourth Annual {ACM/SIGACT-SIAM} Symposium on Discrete
                  Algorithms, 25-27 January 1993, Austin, Texas, {USA}},
  pages        = {475--483},
  publisher    = {{ACM/SIAM}},
  year         = {1993},
  url          = {http://dl.acm.org/citation.cfm?id=313559.313862},
  timestamp    = {Thu, 05 Jul 2018 07:29:11 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/FischerW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/PereiraW91,
  author       = {Fernando C. N. Pereira and
                  Rebecca N. Wright},
  editor       = {Douglas E. Appelt},
  title        = {Finite-State Approximation of Phrase Structure Grammars},
  booktitle    = {29th Annual Meeting of the Association for Computational Linguistics,
                  18-21 June 1991, University of California, Berkeley, California, USA,
                  Proceedings},
  pages        = {246--255},
  publisher    = {{ACL}},
  year         = {1991},
  url          = {https://aclanthology.org/P91-1032/},
  doi          = {10.3115/981344.981376},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/PereiraW91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FischerW91,
  author       = {Michael J. Fischer and
                  Rebecca N. Wright},
  editor       = {Joan Feigenbaum},
  title        = {Multiparty Secret Key Exchange Using a Random Deal of Cards},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {141--155},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_10},
  doi          = {10.1007/3-540-46766-1\_10},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FischerW91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/FischerW90,
  author       = {Michael J. Fischer and
                  Rebecca N. Wright},
  editor       = {Jin{-}Yi Cai},
  title        = {An Application of Game-Theoretic Techniques to Cryptography},
  booktitle    = {Advances In Computational Complexity Theory, Proceedings of a {DIMACS}
                  Workshop, New Jersey, USA, December 3-7, 1990},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {13},
  pages        = {99--118},
  publisher    = {{DIMACS/AMS}},
  year         = {1990},
  url          = {https://doi.org/10.1090/dimacs/013/06},
  doi          = {10.1090/DIMACS/013/06},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/FischerW90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/FeigenbaumLW89,
  author       = {Joan Feigenbaum and
                  Mark Y. Liberman and
                  Rebecca N. Wright},
  editor       = {Joan Feigenbaum and
                  Michael Merritt},
  title        = {Cryptographic Protection of Databases and Software},
  booktitle    = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
                  Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {2},
  pages        = {161--172},
  publisher    = {{DIMACS/AMS}},
  year         = {1989},
  url          = {https://doi.org/10.1090/dimacs/002/10},
  doi          = {10.1090/DIMACS/002/10},
  timestamp    = {Mon, 22 May 2023 16:07:35 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/FeigenbaumLW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics