Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Rebecca N. Wright
@inproceedings{DBLP:conf/sigcse/RosalesMWAW24, author = {Jennifer Rosales and Elizabeth Melville and Melissa A. Wright and Saima Akhtar and Rebecca N. Wright}, editor = {Ben Stephenson and Jeffrey A. Stone and Lina Battestilli and Samuel A. Rebelsky and Libby Shoop}, title = {The Experience of Near-Peer Computing Mentors: Strengthening and Expanding Women's Computing Identities in Undergraduate Interdisciplinary Contexts}, booktitle = {Proceedings of the 55th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2024, Volume 1, Portland, OR, USA, March 20-23, 2024}, pages = {1154--1160}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3626252.3630946}, doi = {10.1145/3626252.3630946}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/RosalesMWAW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/RosalesMWAWW23, author = {Jennifer Rosales and Elizabeth Melville and Melissa A. Wright and Saima Akhtar and Zo{\"{e}} Webb{-}Mack and Rebecca N. Wright}, editor = {Maureen Doyle and Ben Stephenson and Brian Dorn and Leen{-}Kiat Soh and Lina Battestilli}, title = {Computing Fellows across Disciplines: Preliminary Results}, booktitle = {Proceedings of the 54th {ACM} Technical Symposium on Computer Science Education, Volume 2, {SIGCSE} 2023, Toronto, ON, Canada, March 15-18, 2023}, pages = {1310}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3545947.3576257}, doi = {10.1145/3545947.3576257}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/RosalesMWAWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/FeigenbaumJW20, author = {Joan Feigenbaum and Aaron D. Jaggard and Rebecca N. Wright}, title = {Accountability in Computing: Concepts and Mechanisms}, journal = {Found. Trends Priv. Secur.}, volume = {2}, number = {4}, pages = {247--399}, year = {2020}, url = {https://doi.org/10.1561/3300000002}, doi = {10.1561/3300000002}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/FeigenbaumJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/BittnerBGRSW20, author = {Daniel M. Bittner and Alejandro E. Brito and Mohsen Ghassemi and Shantanu Rane and Anand D. Sarwate and Rebecca N. Wright}, title = {Understanding Privacy-Utility Tradeoffs in Differentially Private Online Active Learning}, journal = {J. Priv. Confidentiality}, volume = {10}, number = {2}, year = {2020}, url = {https://doi.org/10.29012/jpc.720}, doi = {10.29012/JPC.720}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/BittnerBGRSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/WrightNNGW19, author = {Rebecca N. Wright and Sally J. Nadler and Thu D. Nguyen and Cynthia N. Sanchez Gomez and Heather M. Wright}, editor = {Elizabeth K. Hawthorne and Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones and Sarah Heckman and Jian Zhang}, title = {Living-Learning Community for Women in Computer Science at Rutgers}, booktitle = {Proceedings of the 50th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2019, Minneapolis, MN, USA, February 27 - March 02, 2019}, pages = {286--292}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3287324.3287449}, doi = {10.1145/3287324.3287449}, timestamp = {Mon, 04 Mar 2019 15:45:23 +0100}, biburl = {https://dblp.org/rec/conf/sigcse/WrightNNGW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ArcherBLKNPSW18, author = {David W. Archer and Dan Bogdanov and Yehuda Lindell and Liina Kamm and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright}, title = {From Keys to Databases - Real-World Applications of Secure Multi-Party Computation}, journal = {Comput. J.}, volume = {61}, number = {12}, pages = {1749--1771}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxy090}, doi = {10.1093/COMJNL/BXY090}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/ArcherBLKNPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/HesamifardTGW18, author = {Ehsan Hesamifard and Hassan Takabi and Mehdi Ghasemi and Rebecca N. Wright}, title = {Privacy-preserving Machine Learning as a Service}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {3}, pages = {123--142}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0024}, doi = {10.1515/POPETS-2018-0024}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/HesamifardTGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/BittnerSW18, author = {Daniel M. Bittner and Anand D. Sarwate and Rebecca N. Wright}, editor = {Itai Dinur and Shlomi Dolev and Sachin Lodha}, title = {Using Noisy Binary Search for Differentially Private Anomaly Detection}, booktitle = {Cyber Security Cryptography and Machine Learning - Second International Symposium, {CSCML} 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10879}, pages = {20--37}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94147-9\_3}, doi = {10.1007/978-3-319-94147-9\_3}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/BittnerSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/WrightSCNG17, author = {Rebecca N. Wright and Jane Stout and Geraldine Cochran and Thu D. Nguyen and Cynthia Sanchez Gomez}, editor = {Tiffany Barnes and Daniel D. Garcia and Elizabeth K. Hawthorne and Manuel A. P{\'{e}}rez{-}Qui{\~{n}}ones}, title = {Computer Science Living-Learning Community for Women at Rutgers: Initial Experiences and Outcomes (Abstract Only)}, booktitle = {Proceedings of the 49th {ACM} Technical Symposium on Computer Science Education, {SIGCSE} 2018, Baltimore, MD, USA, February 21-24, 2018}, pages = {1075}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3159450.3162277}, doi = {10.1145/3159450.3162277}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/WrightSCNG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArcherBLKNPSW18, author = {David W. Archer and Dan Bogdanov and Yehuda Lindell and Liina Kamm and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright}, title = {From Keys to Databases - Real-World Applications of Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2018}, url = {https://eprint.iacr.org/2018/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArcherBLKNPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/teco/JaggardLSW17, author = {Aaron D. Jaggard and Neil Lutz and Michael Schapira and Rebecca N. Wright}, title = {Dynamics at the Boundary of Game Theory and Distributed Computing}, journal = {{ACM} Trans. Economics and Comput.}, volume = {5}, number = {3}, pages = {15:1--15:20}, year = {2017}, url = {https://doi.org/10.1145/3107182}, doi = {10.1145/3107182}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/teco/JaggardLSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BittnerSW17, author = {Daniel M. Bittner and Anand D. Sarwate and Rebecca N. Wright}, editor = {Bhavani Thuraisingham and Battista Biggio and David Mandell Freeman and Brad Miller and Arunesh Sinha}, title = {Differentially Private Noisy Search with Applications to Anomaly Detection (Abstract)}, booktitle = {Proceedings of the 10th {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {53}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3128572.3140456}, doi = {10.1145/3128572.3140456}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BittnerSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GhassemiSW16, author = {Mohsen Ghassemi and Anand D. Sarwate and Rebecca N. Wright}, editor = {David Mandell Freeman and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Differentially Private Online Active Learning with Applications to Anomaly Detection}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Artificial Intelligence and Security, AISec@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {117--128}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996758.2996766}, doi = {10.1145/2996758.2996766}, timestamp = {Mon, 26 Jun 2023 20:41:47 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GhassemiSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JaggardLSW15, author = {Aaron D. Jaggard and Neil Lutz and Michael Schapira and Rebecca N. Wright}, title = {Dynamics at the Boundary of Game Theory and Distributed Computing}, journal = {CoRR}, volume = {abs/1509.02955}, year = {2015}, url = {http://arxiv.org/abs/1509.02955}, eprinttype = {arXiv}, eprint = {1509.02955}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JaggardLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CrescenzoFGPPW14, author = {Giovanni Di Crescenzo and Joan Feigenbaum and Debayan Gupta and Euthimios Panagos and Jason Perry and Rebecca N. Wright}, editor = {Rainer B{\"{o}}hme and Michael Brenner and Tyler Moore and Matthew Smith}, title = {Practical and Privacy-Preserving Policy Compliance for Outsourced Data}, booktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN} and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8438}, pages = {181--194}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44774-1\_15}, doi = {10.1007/978-3-662-44774-1\_15}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/CrescenzoFGPPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/FeigenbaumJW14, author = {Joan Feigenbaum and Aaron D. Jaggard and Rebecca N. Wright}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Open vs. closed systems for accountability}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {4}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600179}, doi = {10.1145/2600176.2600179}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/FeigenbaumJW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sagt/JaggardLSW14, author = {Aaron D. Jaggard and Neil Lutz and Michael Schapira and Rebecca N. Wright}, editor = {Ron Lavi}, title = {Self-stabilizing Uncoupled Dynamics}, booktitle = {Algorithmic Game Theory - 7th International Symposium, {SAGT} 2014, Haifa, Israel, September 30 - October 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8768}, pages = {74--85}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44803-8\_7}, doi = {10.1007/978-3-662-44803-8\_7}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/sagt/JaggardLSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PerryGFW14, author = {Jason Perry and Debayan Gupta and Joan Feigenbaum and Rebecca N. Wright}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Systematizing Secure Computation for Research and Decision Support}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {380--397}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_22}, doi = {10.1007/978-3-319-10879-7\_22}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/PerryGFW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/JaggardW14, author = {Aaron D. Jaggard and Rebecca N. Wright}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Strange Bedfellows: How and When to Work with Your Enemy}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {263--267}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_25}, doi = {10.1007/978-3-319-12400-1\_25}, timestamp = {Mon, 05 Feb 2024 20:35:15 +0100}, biburl = {https://dblp.org/rec/conf/spw/JaggardW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wright14, author = {Rebecca N. Wright}, editor = {Bruce Christianson and James A. Malcolm and Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Jonathan Anderson}, title = {Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion)}, booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8809}, pages = {268--275}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12400-1\_26}, doi = {10.1007/978-3-319-12400-1\_26}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wright14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JaggardLSW14, author = {Aaron D. Jaggard and Neil Lutz and Michael Schapira and Rebecca N. Wright}, title = {Self-stabilizing uncoupled dynamics}, journal = {CoRR}, volume = {abs/1403.5791}, year = {2014}, url = {http://arxiv.org/abs/1403.5791}, eprinttype = {arXiv}, eprint = {1403.5791}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JaggardLSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/MirICMW13, author = {Darakhshan J. Mir and Sibren Isaacman and Ram{\'{o}}n C{\'{a}}ceres and Margaret Martonosi and Rebecca N. Wright}, editor = {Xiaohua Hu and Tsau Young Lin and Vijay V. Raghavan and Benjamin W. Wah and Ricardo Baeza{-}Yates and Geoffrey C. Fox and Cyrus Shahabi and Matthew Smith and Qiang Yang and Rayid Ghani and Wei Fan and Ronny Lempel and Raghunath Nambiar}, title = {{DP-WHERE:} Differentially private modeling of human mobility}, booktitle = {2013 {IEEE} International Conference on Big Data {(IEEE} BigData 2013), 6-9 October 2013, Santa Clara, CA, {USA}}, pages = {580--588}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/BigData.2013.6691626}, doi = {10.1109/BIGDATA.2013.6691626}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/MirICMW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CrescenzoCSTW13, author = {Giovanni Di Crescenzo and Brian A. Coan and John L. Schultz and Simon Tsang and Rebecca N. Wright}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Georgios V. Lioudakis and Nora Cuppens{-}Boulahia and Simon N. Foley and William M. Fitzgerald}, title = {Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, {DPM} 2013, and 6th International Workshop, {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8247}, pages = {114--132}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-54568-9\_8}, doi = {10.1007/978-3-642-54568-9\_8}, timestamp = {Sun, 25 Oct 2020 22:34:56 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CrescenzoCSTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/CrescenzoBCSSTW13, author = {Giovanni Di Crescenzo and Jim Burns and Brian A. Coan and John L. Schultz and Jonathan Robert Stanton and Simon Tsang and Rebecca N. Wright}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {Efficient and Private Three-Party Publish/Subscribe}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {278--292}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_21}, doi = {10.1007/978-3-642-38631-2\_21}, timestamp = {Tue, 09 Feb 2021 08:50:29 +0100}, biburl = {https://dblp.org/rec/conf/nss/CrescenzoBCSSTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/JaggardKRW13, author = {Aaron D. Jaggard and Swara Kopparty and Vijay Ramachandran and Rebecca N. Wright}, editor = {Mor Harchol{-}Balter and John R. Douceur and Jun Xu}, title = {The design space of probing algorithms for network-performance measurement}, booktitle = {{ACM} {SIGMETRICS} / International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} '13, Pittsburgh, PA, USA, June 17-21, 2013}, pages = {105--116}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2465529.2465765}, doi = {10.1145/2465529.2465765}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/JaggardKRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/JagannathanPW12, author = {Geetha Jagannathan and Krishnan Pillaipakkamnatt and Rebecca N. Wright}, title = {A Practical Differentially Private Random Decision Tree Classifier}, journal = {Trans. Data Priv.}, volume = {5}, number = {1}, pages = {273--295}, year = {2012}, url = {http://www.tdp.cat/issues11/abs.a082a11.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/JagannathanPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/MirW12, author = {Darakhshan J. Mir and Rebecca N. Wright}, editor = {Divesh Srivastava and Ismail Ari}, title = {A differentially private estimator for the stochastic Kronecker graph model}, booktitle = {Proceedings of the 2012 Joint {EDBT/ICDT} Workshops, Berlin, Germany, March 30, 2012}, pages = {167--176}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2320765.2320818}, doi = {10.1145/2320765.2320818}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/MirW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/CamenischMTW12, author = {Jan Camenisch and Mark Manulis and Gene Tsudik and Rebecca N. Wright}, title = {Privacy-Oriented Cryptography (Dagstuhl Seminar 12381)}, journal = {Dagstuhl Reports}, volume = {2}, number = {9}, pages = {165--183}, year = {2012}, url = {https://doi.org/10.4230/DagRep.2.9.165}, doi = {10.4230/DAGREP.2.9.165}, timestamp = {Wed, 07 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/CamenischMTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/JaggardSW11, author = {Aaron D. Jaggard and Michael Schapira and Rebecca N. Wright}, editor = {Bernard Chazelle}, title = {Distributed Computing with Adaptive Heuristics}, booktitle = {Innovations in Computer Science - {ICS} 2011, Tsinghua University, Beijing, China, January 7-9, 2011. Proceedings}, pages = {417--443}, publisher = {Tsinghua University Press}, year = {2011}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2011/content/papers/25.html}, timestamp = {Mon, 23 Mar 2020 08:26:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/JaggardSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/FeigenbaumJW11, author = {Joan Feigenbaum and Aaron D. Jaggard and Rebecca N. Wright}, editor = {Sean Peisert and Richard Ford and Carrie Gates and Cormac Herley}, title = {Towards a formal model of accountability}, booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA, USA, September 12-15, 2011}, pages = {45--56}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2073276.2073282}, doi = {10.1145/2073276.2073282}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nspw/FeigenbaumJW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/JaggardSW11, author = {Aaron D. Jaggard and Michael Schapira and Rebecca N. Wright}, editor = {Cyril Gavoille and Pierre Fraigniaud}, title = {Distributed computing with rules of thumb}, booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2011, San Jose, CA, USA, June 6-8, 2011}, pages = {333--334}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1993806.1993870}, doi = {10.1145/1993806.1993870}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/JaggardSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/MirMNW11, author = {Darakhshan J. Mir and S. Muthukrishnan and Aleksandar Nikolov and Rebecca N. Wright}, editor = {Maurizio Lenzerini and Thomas Schwentick}, title = {Pan-private algorithms via statistics on sketches}, booktitle = {Proceedings of the 30th {ACM} {SIGMOD-SIGACT-SIGART} Symposium on Principles of Database Systems, {PODS} 2011, June 12-16, 2011, Athens, Greece}, pages = {37--48}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1989284.1989290}, doi = {10.1145/1989284.1989290}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pods/MirMNW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/FeigenbaumHJWW11, author = {Joan Feigenbaum and James A. Hendler and Aaron D. Jaggard and Daniel J. Weitzner and Rebecca N. Wright}, editor = {David De Roure and Marshall Scott Poole}, title = {Accountability and deterrence in online life}, booktitle = {Web Science 2011, WebSci '11, Koblenz, Germany - June 15 - 17, 2011}, pages = {7:1--7:7}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2527031.2527043}, doi = {10.1145/2527031.2527043}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/websci/FeigenbaumHJWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/JagannathanPWU10, author = {Geetha Jagannathan and Krishnan Pillaipakkamnatt and Rebecca N. Wright and Daryl Umano}, title = {Communication-Efficient Privacy-Preserving Clustering}, journal = {Trans. Data Priv.}, volume = {3}, number = {1}, pages = {1--25}, year = {2010}, url = {http://www.tdp.cat/issues/abs.a028a09.php}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdp/JagannathanPWU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cans/2010, editor = {Swee{-}Huay Heng and Rebecca N. Wright and Bok{-}Min Goi}, title = {Cryptology and Network Security - 9th International Conference, {CANS} 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6467}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17619-7}, doi = {10.1007/978-3-642-17619-7}, isbn = {978-3-642-17618-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1009-1544, author = {Darakhshan J. Mir and S. Muthukrishnan and Aleksandar Nikolov and Rebecca N. Wright}, title = {Pan-private Algorithms: When Memory Does Not Help}, journal = {CoRR}, volume = {abs/1009.1544}, year = {2010}, url = {http://arxiv.org/abs/1009.1544}, eprinttype = {arXiv}, eprint = {1009.1544}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1009-1544.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/IshaiMSW09, author = {Yuval Ishai and Tal Malkin and Martin J. Strauss and Rebecca N. Wright}, title = {Private multiparty sampling and approximation of vector combinations}, journal = {Theor. Comput. Sci.}, volume = {410}, number = {18}, pages = {1730--1745}, year = {2009}, url = {https://doi.org/10.1016/j.tcs.2008.12.062}, doi = {10.1016/J.TCS.2008.12.062}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/IshaiMSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acml/SakumaW09, author = {Jun Sakuma and Rebecca N. Wright}, editor = {Zhi{-}Hua Zhou and Takashi Washio}, title = {Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection}, booktitle = {Advances in Machine Learning, First Asian Conference on Machine Learning, {ACML} 2009, Nanjing, China, November 2-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5828}, pages = {338--353}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05224-8\_26}, doi = {10.1007/978-3-642-05224-8\_26}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acml/SakumaW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/JaggardRW09, author = {Aaron D. Jaggard and Vijay Ramachandran and Rebecca N. Wright}, title = {The Impact of Communication Models on Routing-Algorithm Convergence}, booktitle = {29th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2009), 22-26 June 2009, Montreal, Qu{\'{e}}bec, Canada}, pages = {58--67}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDCS.2009.61}, doi = {10.1109/ICDCS.2009.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/JaggardRW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/JagannathanPW09, author = {Geetha Jagannathan and Krishnan Pillaipakkamnatt and Rebecca N. Wright}, editor = {Y{\"{u}}cel Saygin and Jeffrey Xu Yu and Hillol Kargupta and Wei Wang and Sanjay Ranka and Philip S. Yu and Xindong Wu}, title = {A Practical Differentially Private Random Decision Tree Classifier}, booktitle = {{ICDM} Workshops 2009, {IEEE} International Conference on Data Mining Workshops, Miami, Florida, USA, 6 December 2009}, pages = {114--121}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDMW.2009.93}, doi = {10.1109/ICDMW.2009.93}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/JagannathanPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/MirW09, author = {Darakhshan J. Mir and Rebecca N. Wright}, editor = {Y{\"{u}}cel Saygin and Jeffrey Xu Yu and Hillol Kargupta and Wei Wang and Sanjay Ranka and Philip S. Yu and Xindong Wu}, title = {A Differentially Private Graph Estimator}, booktitle = {{ICDM} Workshops 2009, {IEEE} International Conference on Data Mining Workshops, Miami, Florida, USA, 6 December 2009}, pages = {122--129}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDMW.2009.96}, doi = {10.1109/ICDMW.2009.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/MirW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JonasWW09, author = {Jeff Jonas and William E. Winkler and Rebecca N. Wright}, editor = {David Jefferson and Joseph Lorenzo Hall and Tal Moran}, title = {Interstate Voter Registration Database Matching: The Oregon-Washington 2008 Pilot Project}, booktitle = {2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, {EVT/WOTE} '09, Montreal, Canada, August 10-11, 2009}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/conference/evtwote-09/interstate-voter-registration-database-matching-oregon-washington-2008-pilot}, timestamp = {Mon, 01 Feb 2021 08:43:14 +0100}, biburl = {https://dblp.org/rec/conf/uss/JonasWW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0910-1585, author = {Aaron D. Jaggard and Michael Schapira and Rebecca N. Wright}, title = {Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond}, journal = {CoRR}, volume = {abs/0910.1585}, year = {2009}, url = {http://arxiv.org/abs/0910.1585}, eprinttype = {arXiv}, eprint = {0910.1585}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0910-1585.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/JagannathanW08, author = {Geetha Jagannathan and Rebecca N. Wright}, title = {Privacy-preserving imputation of missing data}, journal = {Data Knowl. Eng.}, volume = {65}, number = {1}, pages = {40--56}, year = {2008}, url = {https://doi.org/10.1016/j.datak.2007.06.013}, doi = {10.1016/J.DATAK.2007.06.013}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/JagannathanW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WrightV08, author = {Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Guest Editorial: Special Issue on Computer and Communications Security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {2}, pages = {7:1--7:2}, year = {2008}, url = {https://doi.org/10.1145/1455518.1455519}, doi = {10.1145/1455518.1455519}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WrightV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/SakumaKW08, author = {Jun Sakuma and Shigenobu Kobayashi and Rebecca N. Wright}, editor = {William W. Cohen and Andrew McCallum and Sam T. Roweis}, title = {Privacy-preserving reinforcement learning}, booktitle = {Machine Learning, Proceedings of the Twenty-Fifth International Conference {(ICML} 2008), Helsinki, Finland, June 5-9, 2008}, series = {{ACM} International Conference Proceeding Series}, volume = {307}, pages = {864--871}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1390156.1390265}, doi = {10.1145/1390156.1390265}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/SakumaKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/GoldbergHJRW08, author = {Sharon Goldberg and Shai Halevi and Aaron D. Jaggard and Vijay Ramachandran and Rebecca N. Wright}, editor = {Victor Bahl and David Wetherall and Stefan Savage and Ion Stoica}, title = {Rationality and traffic attraction: incentives for honest path announcements in bgp}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008}, pages = {267--278}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1402958.1402989}, doi = {10.1145/1402958.1402989}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/GoldbergHJRW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/IshaiMSW07, author = {Yuval Ishai and Tal Malkin and Martin J. Strauss and Rebecca N. Wright}, editor = {Lars Arge and Christian Cachin and Tomasz Jurdzinski and Andrzej Tarlecki}, title = {Private Multiparty Sampling and Approximation of Vector Combinations}, booktitle = {Automata, Languages and Programming, 34th International Colloquium, {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4596}, pages = {243--254}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73420-8\_23}, doi = {10.1007/978-3-540-73420-8\_23}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/IshaiMSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/JagannathanW07, author = {Geetha Jagannathan and Rebecca N. Wright}, title = {Private Inference Control for Aggregate Database Queries}, booktitle = {Workshops Proceedings of the 7th {IEEE} International Conference on Data Mining {(ICDM} 2007), October 28-31, 2007, Omaha, Nebraska, {USA}}, pages = {711--716}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICDMW.2007.66}, doi = {10.1109/ICDMW.2007.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/JagannathanW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/YangZW07, author = {Zhiqiang Yang and Sheng Zhong and Rebecca N. Wright}, editor = {Francesco Bonchi and Elena Ferrari and Bradley A. Malin and Y{\"{u}}cel Saygin}, title = {Towards Privacy-Preserving Model Selection}, booktitle = {Privacy, Security, and Trust in KDD, First {ACM} {SIGKDD} International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4890}, pages = {138--152}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78478-4\_8}, doi = {10.1007/978-3-540-78478-4\_8}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/YangZW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/YangWS06, author = {Zhiqiang Yang and Rebecca N. Wright and Hiranmayee Subramaniam}, title = {Experimental analysis of a privacy-preserving scalar product protocol}, journal = {Comput. Syst. Sci. Eng.}, volume = {21}, number = {1}, year = {2006}, timestamp = {Tue, 20 Feb 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/YangWS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talg/FeigenbaumIMNSW06, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin J. Strauss and Rebecca N. Wright}, title = {Secure multiparty computation of approximations}, journal = {{ACM} Trans. Algorithms}, volume = {2}, number = {3}, pages = {435--472}, year = {2006}, url = {https://doi.org/10.1145/1159892.1159900}, doi = {10.1145/1159892.1159900}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/talg/FeigenbaumIMNSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/YangW06, author = {Zhiqiang Yang and Rebecca N. Wright}, title = {Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {18}, number = {9}, pages = {1253--1264}, year = {2006}, url = {https://doi.org/10.1109/TKDE.2006.147}, doi = {10.1109/TKDE.2006.147}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/YangW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YangZW06, author = {Zhiqiang Yang and Sheng Zhong and Rebecca N. Wright}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Privacy-Preserving Queries on Encrypted Data}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {479--495}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_29}, doi = {10.1007/11863908\_29}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YangZW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/JagannathanW06, author = {Geetha Jagannathan and Rebecca N. Wright}, title = {Privacy-Preserving Data Imputation}, booktitle = {Workshops Proceedings of the 6th {IEEE} International Conference on Data Mining {(ICDM} 2006), 18-22 December 2006, Hong Kong, China}, pages = {535--540}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDMW.2006.134}, doi = {10.1109/ICDMW.2006.134}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/JagannathanW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MareW06, author = {Michael de Mare and Rebecca N. Wright}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Secure Set Membership Using 3Sat}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {452--468}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_32}, doi = {10.1007/11935308\_32}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MareW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/JagannathanPW06, author = {Geetha Jagannathan and Krishnan Pillaipakkamnatt and Rebecca N. Wright}, editor = {Joydeep Ghosh and Diane Lambert and David B. Skillicorn and Jaideep Srivastava}, title = {A New Privacy-Preserving Distributed k-Clustering Algorithm}, booktitle = {Proceedings of the Sixth {SIAM} International Conference on Data Mining, April 20-22, 2006, Bethesda, MD, {USA}}, pages = {494--498}, publisher = {{SIAM}}, year = {2006}, url = {https://doi.org/10.1137/1.9781611972764.47}, doi = {10.1137/1.9781611972764.47}, timestamp = {Wed, 17 May 2017 14:24:53 +0200}, biburl = {https://dblp.org/rec/conf/sdm/JagannathanPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2006usa, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405}, doi = {10.1145/1180405}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2006usa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/AlonMRTW05, author = {Noga Alon and Michael Merritt and Omer Reingold and Gadi Taubenfeld and Rebecca N. Wright}, title = {Tight bounds for shared memory systems accessed by Byzantine processes}, journal = {Distributed Comput.}, volume = {18}, number = {2}, pages = {99--109}, year = {2005}, url = {https://doi.org/10.1007/s00446-005-0125-8}, doi = {10.1007/S00446-005-0125-8}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/AlonMRTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/YangW05, author = {Zhiqiang Yang and Rebecca N. Wright}, title = {Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data}, booktitle = {Proceedings of the 21st International Conference on Data Engineering Workshops, {ICDE} 2005, 5-8 April 2005, Tokyo, Japan}, pages = {1196}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDE.2005.230}, doi = {10.1109/ICDE.2005.230}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/YangW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/YangZW05, author = {Zhiqiang Yang and Sheng Zhong and Rebecca N. Wright}, editor = {Robert Grossman and Roberto J. Bayardo and Kristin P. Bennett}, title = {Anonymity-preserving data collection}, booktitle = {Proceedings of the Eleventh {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Chicago, Illinois, USA, August 21-24, 2005}, pages = {334--343}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1081870.1081909}, doi = {10.1145/1081870.1081909}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/YangZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/JagannathanW05, author = {Geetha Jagannathan and Rebecca N. Wright}, editor = {Robert Grossman and Roberto J. Bayardo and Kristin P. Bennett}, title = {Privacy-preserving distributed k-means clustering over arbitrarily partitioned data}, booktitle = {Proceedings of the Eleventh {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Chicago, Illinois, USA, August 21-24, 2005}, pages = {593--599}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1081870.1081942}, doi = {10.1145/1081870.1081942}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/JagannathanW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/madnes/WrightYZ05, author = {Rebecca N. Wright and Zhiqiang Yang and Sheng Zhong}, editor = {Mike Burmester and Alec Yasinsac}, title = {Distributed Data Mining Protocols for Privacy: {A} Review of Some Recent Results}, booktitle = {Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, {MADNES} 2005, Singapore, September 20-22, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4074}, pages = {67--79}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11801412\_7}, doi = {10.1007/11801412\_7}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/madnes/WrightYZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/ZhongYW05, author = {Sheng Zhong and Zhiqiang Yang and Rebecca N. Wright}, editor = {Chen Li}, title = {Privacy-enhancing \emph{k}-anonymization of customer data}, booktitle = {Proceedings of the Twenty-fourth {ACM} {SIGACT-SIGMOD-SIGART} Symposium on Principles of Database Systems, June 13-15, 2005, Baltimore, Maryland, {USA}}, pages = {139--147}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1065167.1065185}, doi = {10.1145/1065167.1065185}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pods/ZhongYW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/YangZW05, author = {Zhiqiang Yang and Sheng Zhong and Rebecca N. Wright}, editor = {Hillol Kargupta and Jaideep Srivastava and Chandrika Kamath and Arnold Goodman}, title = {Privacy-Preserving Classification of Customer Data without Loss of Accuracy}, booktitle = {Proceedings of the 2005 {SIAM} International Conference on Data Mining, {SDM} 2005, Newport Beach, CA, USA, April 21-23, 2005}, pages = {92--102}, publisher = {{SIAM}}, year = {2005}, url = {https://doi.org/10.1137/1.9781611972757.9}, doi = {10.1137/1.9781611972757.9}, timestamp = {Fri, 06 Oct 2023 11:45:43 +0200}, biburl = {https://dblp.org/rec/conf/sdm/YangZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/BonehFSW04, author = {Dan Boneh and Joan Feigenbaum and Abraham Silberschatz and Rebecca N. Wright}, title = {{PORTIA:} Privacy, Obligations, and Rights in Technologies of Information Assessment}, journal = {{IEEE} Data Eng. Bull.}, volume = {27}, number = {1}, pages = {10--18}, year = {2004}, url = {http://sites.computer.org/debull/A04mar/avi.ps}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/debu/BonehFSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/WrightY04, author = {Rebecca N. Wright and Zhiqiang Yang}, editor = {Won Kim and Ron Kohavi and Johannes Gehrke and William DuMouchel}, title = {Privacy-preserving Bayesian network structure computation on distributed heterogeneous data}, booktitle = {Proceedings of the Tenth {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004}, pages = {713--718}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1014052.1014145}, doi = {10.1145/1014052.1014145}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/WrightY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/SubramaniamWY04, author = {Hiranmayee Subramaniam and Rebecca N. Wright and Zhiqiang Yang}, editor = {Willem Jonker and Milan Petkovic}, title = {Experimental Analysis of Privacy-Preserving Statistics Computation}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {55--66}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_5}, doi = {10.1007/978-3-540-30073-1\_5}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/SubramaniamWY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BurmesterDWY04, author = {Mike Burmester and Yvo Desmedt and Rebecca N. Wright and Alec Yasinsac}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Accountable Privacy}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {83--95}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_10}, doi = {10.1007/11861386\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BurmesterDWY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Wright04, author = {Rebecca N. Wright}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Accountable Privacy (Transcript of Discussion)}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {96--105}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_11}, doi = {10.1007/11861386\_11}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Wright04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Wright03, author = {Rebecca N. Wright}, editor = {Elizabeth Borowsky and Sergio Rajsbaum}, title = {Fischer's cryptographic protocols}, booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July 13-16, 2003}, pages = {20--22}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/872035.872039}, doi = {10.1145/872035.872039}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/podc/Wright03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2003, editor = {Rebecca N. Wright}, title = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2742}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45126-6}, doi = {10.1007/978-3-540-45126-6}, isbn = {3-540-40663-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/WrightS02, author = {Rebecca N. Wright and Sara Spalding}, title = {Experimental Performance of Shared {RSA} Modulus Generation}, journal = {Algorithmica}, volume = {33}, number = {1}, pages = {89--103}, year = {2002}, url = {https://doi.org/10.1007/s00453-001-0106-7}, doi = {10.1007/S00453-001-0106-7}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/WrightS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/StubblebineW02, author = {Stuart G. Stubblebine and Rebecca N. Wright}, title = {An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency}, journal = {{IEEE} Trans. Software Eng.}, volume = {28}, number = {3}, pages = {256--285}, year = {2002}, url = {https://doi.org/10.1109/32.991320}, doi = {10.1109/32.991320}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/StubblebineW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/WrightCGRW02, author = {Rebecca N. Wright and L. Jean Camp and Ian Goldberg and Ronald L. Rivest and Graham Wood}, editor = {Matt Blaze}, title = {Privacy Tradeoffs: Myth or Reality? Panel}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {147--151}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_11}, doi = {10.1007/3-540-36504-4\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/WrightCGRW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/MerrittRTW02, author = {Michael Merritt and Omer Reingold and Gadi Taubenfeld and Rebecca N. Wright}, editor = {Dahlia Malkhi}, title = {Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes}, booktitle = {Distributed Computing, 16th International Conference, {DISC} 2002, Toulouse, France, October 28-30, 2002 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2508}, pages = {222--236}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36108-1\_15}, doi = {10.1007/3-540-36108-1\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/MerrittRTW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/MalkhiRWW01, author = {Dahlia Malkhi and Michael K. Reiter and Avishai Wool and Rebecca N. Wright}, title = {Probabilistic Quorum Systems}, journal = {Inf. Comput.}, volume = {170}, number = {2}, pages = {184--206}, year = {2001}, url = {https://doi.org/10.1006/inco.2001.3054}, doi = {10.1006/INCO.2001.3054}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/MalkhiRWW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WrightLM01, author = {Rebecca N. Wright and Patrick Lincoln and Jonathan K. Millen}, title = {Depender Graphs: {A} Method of Fault-Tolerant Certificate Distribution}, journal = {J. Comput. Secur.}, volume = {9}, number = {4}, pages = {323--338}, year = {2001}, url = {https://doi.org/10.3233/jcs-2001-9403}, doi = {10.3233/JCS-2001-9403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/WrightLM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RubinW01, author = {Aviel D. Rubin and Rebecca N. Wright}, editor = {Paul F. Syverson}, title = {Off-Line Generation of Limited-Use Credit Card Numbers}, booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2339}, pages = {187--200}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-46088-8\_18}, doi = {10.1007/3-540-46088-8\_18}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/RubinW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FeigenbaumIMNSW01, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright}, editor = {Fernando Orejas and Paul G. Spirakis and Jan van Leeuwen}, title = {Secure Multiparty Computation of Approximations}, booktitle = {Automata, Languages and Programming, 28th International Colloquium, {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2076}, pages = {927--938}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-48224-5\_75}, doi = {10.1007/3-540-48224-5\_75}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FeigenbaumIMNSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/CanettiIKRRW01, author = {Ran Canetti and Yuval Ishai and Ravi Kumar and Michael K. Reiter and Ronitt Rubinfeld and Rebecca N. Wright}, editor = {Ajay D. Kshemkalyani and Nir Shavit}, title = {Selective private function evaluation with applications to private statistics}, booktitle = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA, August 26-29, 2001}, pages = {293--304}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/383962.384047}, doi = {10.1145/383962.384047}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/CanettiIKRRW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeigenbaumIMNSW01, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright}, title = {Secure Multiparty Computation of Approximations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {24}, year = {2001}, url = {http://eprint.iacr.org/2001/024}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeigenbaumIMNSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FranklinW00, author = {Matthew K. Franklin and Rebecca N. Wright}, title = {Secure Communication in Minimal Connectivity Models}, journal = {J. Cryptol.}, volume = {13}, number = {1}, pages = {9--30}, year = {2000}, url = {https://doi.org/10.1007/s001459910002}, doi = {10.1007/S001459910002}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FranklinW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WrightLM00, author = {Rebecca N. Wright and Patrick Lincoln and Jonathan K. Millen}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Efficient fault-tolerant certificate revocation}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {19--24}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352605}, doi = {10.1145/352600.352605}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WrightLM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfp/CranorW00, author = {Lorrie Faith Cranor and Rebecca N. Wright}, editor = {Lorrie Faith Cranor}, title = {Influencing software usage}, booktitle = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada, April 4-7, 2000}, pages = {45--55}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/332186.332210}, doi = {10.1145/332186.332210}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cfp/CranorW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cfp/Wright00, author = {Rebecca N. Wright}, editor = {Lorrie Faith Cranor}, title = {Obstacles to freedom and privacy by design}, booktitle = {Proceedings of the Tenth Conference on Computers, Freedom and Privacy: Challenging the Assumptions, {CFP} 2000, Toronto, Ontario, Canada, April 4-7, 2000}, pages = {97--100}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/332186.332260}, doi = {10.1145/332186.332260}, timestamp = {Mon, 23 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cfp/Wright00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MillenW00, author = {Jonathan K. Millen and Rebecca N. Wright}, title = {Reasoning about Trust and Insurance in a Public Key Infrastructure}, booktitle = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, pages = {16--22}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CSFW.2000.856922}, doi = {10.1109/CSFW.2000.856922}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MillenW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/AlvisiPMRW00, author = {Lorenzo Alvisi and Evelyn Tumlin Pierce and Dahlia Malkhi and Michael K. Reiter and Rebecca N. Wright}, title = {Dynamic Byzantine Quorum Systems}, booktitle = {2000 International Conference on Dependable Systems and Networks {(DSN} 2000) (formerly {FTCS-30} and DCCA-8), 25-28 June 2000, New York, NY, {USA}}, pages = {283--292}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICDSN.2000.857551}, doi = {10.1109/ICDSN.2000.857551}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/AlvisiPMRW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/WrightS99, author = {Rebecca N. Wright and Sara Spalding}, editor = {Robert Endre Tarjan and Tandy J. Warnow}, title = {Experimental Performance of Shared {RSA} Modulus Generation}, booktitle = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, 17-19 January 1999, Baltimore, Maryland, {USA}}, pages = {983--984}, publisher = {{ACM/SIAM}}, year = {1999}, url = {http://dl.acm.org/citation.cfm?id=314500.314960}, timestamp = {Thu, 05 Jul 2018 07:29:57 +0200}, biburl = {https://dblp.org/rec/conf/soda/WrightS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FranklinW98, author = {Matthew K. Franklin and Rebecca N. Wright}, editor = {Kaisa Nyberg}, title = {Secure Communications in Minimal Connectivity Models}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {346--360}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054138}, doi = {10.1007/BFB0054138}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FranklinW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/MalkhiRWW98, author = {Dahlia Malkhi and Michael K. Reiter and Avishai Wool and Rebecca N. Wright}, editor = {Brian A. Coan and Yehuda Afek}, title = {Probabilistic Byzantine Quorum Systems}, booktitle = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June 28 - July 2, 1998}, pages = {321}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/277697.277781}, doi = {10.1145/277697.277781}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/MalkhiRWW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dimacs/dimacs38, editor = {Rebecca N. Wright and Peter G. Neumann}, title = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4, 1996}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {38}, publisher = {{DIMACS/AMS}}, year = {1998}, url = {https://doi.org/10.1090/dimacs/038}, doi = {10.1090/DIMACS/038}, isbn = {978-0-8218-0832-0}, timestamp = {Mon, 22 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/dimacs38.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CY-9809018, author = {Lorrie Faith Cranor and Rebecca N. Wright}, title = {Influencing Software Usage}, journal = {CoRR}, volume = {cs.CY/9809018}, year = {1998}, url = {https://arxiv.org/abs/cs/9809018}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CY-9809018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/MalkhiRW97a, author = {Dahlia Malkhi and Michael K. Reiter and Rebecca N. Wright}, editor = {James E. Burns and Hagit Attiya}, title = {Probabilistic Quorum Systems}, booktitle = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles of Distributed Computing, Santa Barbara, California, USA, August 21-24, 1997}, pages = {267--273}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/259380.259458}, doi = {10.1145/259380.259458}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/MalkhiRW97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ReiterFLW96, author = {Michael K. Reiter and Matthew K. Franklin and John B. Lacy and Rebecca N. Wright}, title = {The Omega Key Management Service}, journal = {J. Comput. Secur.}, volume = {4}, number = {4}, pages = {267--288}, year = {1996}, url = {https://doi.org/10.3233/JCS-1996-4402}, doi = {10.3233/JCS-1996-4402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ReiterFLW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FischerW96, author = {Michael J. Fischer and Rebecca N. Wright}, title = {Bounds on Secret Key Exchange Using a Random Deal of Cards}, journal = {J. Cryptol.}, volume = {9}, number = {2}, pages = {71--99}, year = {1996}, url = {https://doi.org/10.1007/BF00190803}, doi = {10.1007/BF00190803}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/FischerW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ReiterFLW96, author = {Michael K. Reiter and Matthew K. Franklin and John B. Lacy and Rebecca N. Wright}, editor = {Li Gong and Jacques Stearn}, title = {The Omega Key Management Service}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {38--47}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238184}, doi = {10.1145/238168.238184}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ReiterFLW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StubblebineW96, author = {Stuart G. Stubblebine and Rebecca N. Wright}, editor = {Li Gong and Jacques Stearn}, title = {An Authentication Logic Supporting Synchronization, Revocation, and Recency}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {95--105}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238195}, doi = {10.1145/238168.238195}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/StubblebineW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cmp-lg-9603002, author = {Fernando C. N. Pereira and Rebecca N. Wright}, title = {Finite-State Approximation of Phrase-Structure Grammars}, journal = {CoRR}, volume = {cmp-lg/9603002}, year = {1996}, url = {http://arxiv.org/abs/cmp-lg/9603002}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cmp-lg-9603002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/FischerW93, author = {Michael J. Fischer and Rebecca N. Wright}, editor = {Vijaya Ramachandran}, title = {An Efficient Protocol for Unconditionally Secure Secret Key Exchange}, booktitle = {Proceedings of the Fourth Annual {ACM/SIGACT-SIAM} Symposium on Discrete Algorithms, 25-27 January 1993, Austin, Texas, {USA}}, pages = {475--483}, publisher = {{ACM/SIAM}}, year = {1993}, url = {http://dl.acm.org/citation.cfm?id=313559.313862}, timestamp = {Thu, 05 Jul 2018 07:29:11 +0200}, biburl = {https://dblp.org/rec/conf/soda/FischerW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/PereiraW91, author = {Fernando C. N. Pereira and Rebecca N. Wright}, editor = {Douglas E. Appelt}, title = {Finite-State Approximation of Phrase Structure Grammars}, booktitle = {29th Annual Meeting of the Association for Computational Linguistics, 18-21 June 1991, University of California, Berkeley, California, USA, Proceedings}, pages = {246--255}, publisher = {{ACL}}, year = {1991}, url = {https://aclanthology.org/P91-1032/}, doi = {10.3115/981344.981376}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/PereiraW91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FischerW91, author = {Michael J. Fischer and Rebecca N. Wright}, editor = {Joan Feigenbaum}, title = {Multiparty Secret Key Exchange Using a Random Deal of Cards}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {141--155}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_10}, doi = {10.1007/3-540-46766-1\_10}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FischerW91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/FischerW90, author = {Michael J. Fischer and Rebecca N. Wright}, editor = {Jin{-}Yi Cai}, title = {An Application of Game-Theoretic Techniques to Cryptography}, booktitle = {Advances In Computational Complexity Theory, Proceedings of a {DIMACS} Workshop, New Jersey, USA, December 3-7, 1990}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {13}, pages = {99--118}, publisher = {{DIMACS/AMS}}, year = {1990}, url = {https://doi.org/10.1090/dimacs/013/06}, doi = {10.1090/DIMACS/013/06}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/FischerW90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/FeigenbaumLW89, author = {Joan Feigenbaum and Mark Y. Liberman and Rebecca N. Wright}, editor = {Joan Feigenbaum and Michael Merritt}, title = {Cryptographic Protection of Databases and Software}, booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, October 4-6, 1989}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {2}, pages = {161--172}, publisher = {{DIMACS/AMS}}, year = {1989}, url = {https://doi.org/10.1090/dimacs/002/10}, doi = {10.1090/DIMACS/002/10}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/FeigenbaumLW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.