The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rebecca N. Wright: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Fernando C. N. Pereira, Rebecca N. Wright
    Finite-State Approximation of Phrase Structure Grammars. [Citation Graph (0, 0)][DBLP]
    ACL, 1991, pp:246-255 [Conf]
  2. Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright
    The Omega Key Management Service. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:38-47 [Conf]
  3. Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen
    Efficient fault-tolerant certificate revocation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:19-24 [Conf]
  4. Stuart G. Stubblebine, Rebecca N. Wright
    An Authentication Logic Supporting Synchronization, Revocation, and Recency. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:95-105 [Conf]
  5. Michael J. Fischer, Rebecca N. Wright
    Multiparty Secret Key Exchange Using a Random Deal of Cards. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:141-155 [Conf]
  6. Jonathan K. Millen, Rebecca N. Wright
    Reasoning about Trust and Insurance in a Public Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:16-22 [Conf]
  7. Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright
    Dynamic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:283-0 [Conf]
  8. Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
    Privacy-Preserving Queries on Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:479-495 [Conf]
  9. Matthew K. Franklin, Rebecca N. Wright
    Secure Communications in Minimal Connectivity Models. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:346-360 [Conf]
  10. Aviel D. Rubin, Rebecca N. Wright
    Off-Line Generation of Limited-Use Credit Card Numbers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2001, pp:187-200 [Conf]
  11. Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood
    Privacy Tradeoffs: Myth or Reality? Panel. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:147-151 [Conf]
  12. Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright
    Secure Multiparty Computation of Approximations. [Citation Graph (0, 0)][DBLP]
    ICALP, 2001, pp:927-938 [Conf]
  13. Zhiqiang Yang, Rebecca N. Wright
    Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2005, pp:1196- [Conf]
  14. Geetha Jagannathan, Rebecca N. Wright
    Privacy-Preserving Data Imputation. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:535-540 [Conf]
  15. Michael de Mare, Rebecca N. Wright
    Secure Set Membership Using 3Sat. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:452-468 [Conf]
  16. Geetha Jagannathan, Rebecca N. Wright
    Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. [Citation Graph (0, 0)][DBLP]
    KDD, 2005, pp:593-599 [Conf]
  17. Rebecca N. Wright, Zhiqiang Yang
    Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. [Citation Graph (0, 0)][DBLP]
    KDD, 2004, pp:713-718 [Conf]
  18. Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
    Anonymity-preserving data collection. [Citation Graph (0, 0)][DBLP]
    KDD, 2005, pp:334-343 [Conf]
  19. Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
    Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:67-79 [Conf]
  20. Ran Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright
    Selective private function evaluation with applications to private statistics. [Citation Graph (0, 0)][DBLP]
    PODC, 2001, pp:293-304 [Conf]
  21. Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright
    Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP]
    PODC, 1997, pp:267-273 [Conf]
  22. Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright
    Probabilistic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    PODC, 1998, pp:321- [Conf]
  23. Rebecca N. Wright
    Fischer's cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:20-22 [Conf]
  24. Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright
    Privacy-enhancing k-anonymization of customer data. [Citation Graph (0, 0)][DBLP]
    PODS, 2005, pp:139-147 [Conf]
  25. Geetha Jagannathan, Krishnan Pillaipakkamnatt, Rebecca N. Wright
    A New Privacy-Preserving Distributed k-Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    SDM, 2006, pp:- [Conf]
  26. Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
    Privacy-Preserving Classification of Customer Data without Loss of Accuracy. [Citation Graph (0, 0)][DBLP]
    SDM, 2005, pp:- [Conf]
  27. Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang
    Experimental Analysis of Privacy-Preserving Statistics Computation. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:55-66 [Conf]
  28. Michael J. Fischer, Rebecca N. Wright
    An Efficient Protocol for Unconditionally Secure Secret Key Exchange. [Citation Graph (0, 0)][DBLP]
    SODA, 1993, pp:475-483 [Conf]
  29. Rebecca N. Wright, Sara Spalding
    Experimental Performance of Shared RSA Modulus Generation. [Citation Graph (0, 0)][DBLP]
    SODA, 1999, pp:983-984 [Conf]
  30. Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac
    Accountable Privacy. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:83-95 [Conf]
  31. Rebecca N. Wright
    Accountable Privacy (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:96-105 [Conf]
  32. Michael Merritt, Omer Reingold, Gadi Taubenfeld, Rebecca N. Wright
    Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes. [Citation Graph (0, 0)][DBLP]
    DISC, 2002, pp:222-236 [Conf]
  33. Rebecca N. Wright, Sara Spalding
    Experimental Performance of Shared RSA Modulus Generation. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 2002, v:33, n:1, pp:89-103 [Journal]
  34. Fernando C. N. Pereira, Rebecca N. Wright
    Finite-State Approximation of Phrase-Structure Grammars [Citation Graph (0, 0)][DBLP]
    CoRR, 1996, v:0, n:, pp:- [Journal]
  35. Lorrie Faith Cranor, Rebecca N. Wright
    Influencing Software Usage [Citation Graph (0, 0)][DBLP]
    CoRR, 1998, v:0, n:, pp:- [Journal]
  36. Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subramaniam
    Experimental analysis of a privacy-preserving scalar product protocol. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2006, v:21, n:1, pp:- [Journal]
  37. Noga Alon, Michael Merritt, Omer Reingold, Gadi Taubenfeld, Rebecca N. Wright
    Tight bounds for shared memory systems accessed by Byzantine processes. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2005, v:18, n:2, pp:99-109 [Journal]
  38. Dan Boneh, Joan Feigenbaum, Abraham Silberschatz, Rebecca N. Wright
    PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2004, v:27, n:1, pp:10-18 [Journal]
  39. Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright
    Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:170, n:2, pp:184-206 [Journal]
  40. Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright
    The Omega Key Management Service. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:4, pp:267-288 [Journal]
  41. Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen
    Depender Graphs: A Method of Fault-Tolerant Certificate Distribution. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:4, pp:323-338 [Journal]
  42. Michael J. Fischer, Rebecca N. Wright
    Bounds on Secret Key Exchange Using a Random Deal of Cards. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1996, v:9, n:2, pp:71-99 [Journal]
  43. Matthew K. Franklin, Rebecca N. Wright
    Secure Communication in Minimal Connectivity Models. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:1, pp:9-30 [Journal]
  44. Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright
    Secure multiparty computation of approximations. [Citation Graph (0, 0)][DBLP]
    ACM Transactions on Algorithms, 2006, v:2, n:3, pp:435-472 [Journal]
  45. Zhiqiang Yang, Rebecca N. Wright
    Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2006, v:18, n:9, pp:1253-1264 [Journal]
  46. Stuart G. Stubblebine, Rebecca N. Wright
    An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:3, pp:256-285 [Journal]
  47. Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright
    Private Multiparty Sampling and Approximation of Vector Combinations. [Citation Graph (0, 0)][DBLP]
    ICALP, 2007, pp:243-254 [Conf]

  48. The Impact of Communication Models on Routing-Algorithm Convergence. [Citation Graph (, )][DBLP]


  49. Private Inference Control for Aggregate Database Queries. [Citation Graph (, )][DBLP]


  50. A Differentially Private Graph Estimator. [Citation Graph (, )][DBLP]


  51. A Practical Differentially Private Random Decision Tree Classifier. [Citation Graph (, )][DBLP]


  52. Privacy-preserving reinforcement learning. [Citation Graph (, )][DBLP]


  53. Towards Privacy-Preserving Model Selection. [Citation Graph (, )][DBLP]


  54. Rationality and traffic attraction: incentives for honest path announcements in bgp. [Citation Graph (, )][DBLP]


  55. Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection. [Citation Graph (, )][DBLP]


  56. Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond [Citation Graph (, )][DBLP]


  57. Privacy-preserving imputation of missing data. [Citation Graph (, )][DBLP]


Search in 0.102secs, Finished in 0.105secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002