Rebecca N. Wright's publications by topic


Jump to:
Privacy and Secure Multiparty Computation
Algorithmic Foundations of the Internet
Accountability
Computer Science Education
Distributed Computing
Voter Registration Databases
Public Key Infrastructures and Authentication
Secret Key Exchange
Edited Collections
Other

See also: Publications by year | Publications by type | Rebecca Wright's home page


Notes:

Privacy, Privacy-Preserving Data Mining, and Secure Multiparty Computation

"Understanding Privacy-Utility Tradeoffs in Differentially Private Online Active Learning," (with D. Bittner, A. Brito, M. Ghassemi, S. Rane, and A. Sarwate), Journal of Privacy and Confidentiality, 2020.

"From Keys to Databases – Real-World Applications of Secure Multi-Party Computation," (with D. Archer, D. Bogdanov, Y. Lindell, L. Kamm, K. Nielsen, J. Pagter, and N. Smart), The Computer Journal, Vol. 61, No. 12, 2018.

"Using Noisy Binary Search for Differentially Private Anomaly Detection," (with D. Bittner and A. Sarwate), Proceedings of the 2nd International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2018.

"Privacy-preserving Machine Learning as a Service," (with E. Hesamifard, H. Takabi, and M. Ghasemi), Proceedings on Privacy Enhancing Technologies, 2018.

"Keynote: Privacy in Today's World," 2017 ACM CCS Workshop on Women in Cyber Security (CyberW), 2017.

"Differentially Private Noisy Search with Applications to Anomaly Detection (Abstract)," (with D. Bittner and A. Sarwate), Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security (AISec), 2017.

"Differentially Private Online Active Learning with Applications to Anomaly Detection," (with M. Ghassemi and A. Sarwate), Proceedings of the 9th ACM Workshop on Artificial Intelligence and Security (AISec), 2016.

"Systematizing Secure Computation for Research and Decision Support," (with J. Perry, D. Gupta, and J. Feigenbaum), Proceedings of the 9th Conference for Security and Cryptography for Networks (SCN), 2014.

"Uncovering Facebook Side Channels and User Attitudes," (with S. Lu and J. Lindqvist), Proceedings of the Workshop on Web 2.0 Security and Privacy (W2SP), 2014.

"Practical and Privacy-Preserving Policy Compliance on Outsourced Data," (with G. Di Crescenzo, J. Feigenbaum, D. Gupta, T. Panagos, and J. Perry), Proceedings of 2nd Workshop on Applied Homomorphic Cryptography and Encrypted Computing (WAHC), 2014.

"DP-WHERE: Differentially Private Modeling of Human Mobility," (with D. Mir, S. Isaacman, R. Cáceres, and M. Martonosi), Proceedings of IEEE International Conference on Big Data, 2013.

"Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model," (with G. Di Crescenzo, B. Coan, J. Schultz, and S. Tsang), Proceedings of the 8th International Workshop on Data Privacy Management (DPM), 2013.

"Efficient and Private Three-Party Publish/Subscribe," (with G. Di Crescenzo, J. Burns, B. Coan, J. Schultz, J. Stanton, and S. Tsang), Proceedings of the 7th International Conference on Network and System Security (NSS), 2013.

"A Practical Differentially Private Random Decision Tree Classifier," (with G. Jagannathan and K. Pillaipakkamnatt), Transactions on Data Privacy, 2012.

"A Differentially Private Estimator for the Stochastic Kronecker Graph Model," (with D. Mir), Proceedings of the 2012 Workshop on Privacy and Anonymity in the Information Society, 2012.

"Pan-private Algorithms Via Statistics on Sketches," (with D. Mir, S. Muthukrishnan, and A. Nikolov), Proceedings of the 30th ACM Symposium on Principles of Database Systems (PODS), 2011.

"Communication-Efficient Privacy-Preserving Clustering," (with G. Jagannathan, K. Pillaipakkamnatt, and D. Umano), Transactions on Data Privacy, 2010.

"A Practical Differentially Private Random Decision Tree Classifier," (with G. Jagannathan and K. Pillaipakkamnatt), Proceedings of the ICDM International Workshop on Privacy Aspects of Data Mining, 2009.

"A Differentially Private Graph Estimator," (with D. Mir), Proceedings of the ICDM International Workshop on Privacy Aspects of Data Mining, 2009. [Note: Some of the results in this paper are incorrect. Please see our later paper instead.]

"Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection," (with J. Sakuma), Proceedings of the 1st Asian Conference on Machine Learning (ACML), 2009.

"Private Multiparty Sampling and Approximation of Vector Combinations," (with Y. Ishai, T. Malkin, and M. Strauss), Theoretical Computer Science, Vol. 410, No. 18, 2009.

"Privacy-Preserving Reinforcement Learning," (with J. Sakuma and S. Kobayashi), Proceedings of the 25th International Conference on Machine Learning (ICML), 2008.

"On the Lindell-Pinkas Secure Computation of Logarithms: From Theory to Practice," (with R. Ryger and O. Kardes), Proceedings of the International Workshop on Practical Privacy-Preserving Data Mining, 2008. (Electronic proceedings only.)

"Privacy-Preserving Imputation of Missing Data," (with G. Jagannathan), Data & Knowledge Engineering, Vol. 65, No. 1, 2008.

"Privacy in a Networked World," Frontiers of Engineering: Reports on Leading-Edge Engineering from the 2007 Symposium, The National Academies Press, 2008.

"Private Inference Control for Aggregate Database Queries," (with G. Jagannathan), Proceedings of the ICDM International Workshop on Privacy Aspects of Data Mining, 2007.

"Towards Privacy-Preserving Model Selection," (with Z. Yang and S. Zhong), Proceedings of the First ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD (PinKDD), 2007.

"Private Multiparty Sampling and Approximation of Vector Combinations," (with Y. Ishai, T. Malkin, and M. Strauss), Proceedings of the 34th International Colloquium on Automata, Languages and Programming (ICALP), 2007.

"Privacy-Preserving Data Imputation," (with G. Jagannathan), Proceedings of the ICDM International Workshop on Privacy Aspects of Data Mining, 2006.

"Privacy-Preserving Queries on Encrypted Data," (with Z. Yang and S. Zhong), Proceedings of the 11th European Symposium On Research In Computer Security (Esorics), 2006.

"Secure Multiparty Computation of Approximations," (with J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, and M. Strauss), ACM Transactions on Algorithms, Vol. 2, No. 3, 2006.

"Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data", (with Z. Yang), IEEE Transactions on Data Knowledge Engineering (TKDE), Vol. 18, No. 9, 2006.

"A New Privacy-Preserving Distributed k-Clustering Algorithm," (with G. Jagannathan and K. Pillaipakkamnatt), Proceedings of the 2006 SIAM International Conference on Data Mining (SDM), 2006.

"Experimental Analysis of a Privacy-Preserving Scalar Product Protocol," (with Z. Yang and H. Subramaniam), International Journal of Computer Systems Science and Engineering, Vol. 21, No. 1, 2006.

"Implementing Privacy-Preserving Bayesian-Net Discovery for Vertically Partitioned Data," (with O. Kardes, R. Ryger, and J. Feigenbaum), Proceedings of the ICDM Workshop on Privacy and Security Aspects of Data Mining, 2005.

"Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results," (with Z. Yang and S. Zhong), Proceedings of the Secure Mobile Ad-hoc Networks and Sensors Workshop (MADNES), 2005.

"Privacy-Preserving Distributed k-Means Clustering over Arbitrarily Partitioned Data," (with G. Jagannathan), Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2005.

"Anonymity-Preserving Data Collection," (with Z. Yang and S. Zhong), Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2005.

"Privacy-Enhancing k-Anonymization of Customer Data," (with S. Zhong and Z. Yang), Proceedings of the 24th ACM Symposium on Principles of Database Systems (PODS), 2005.

"Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data," (with Z. Yang), Proceedings of the International Workshop on Privacy Data Management, 2005.

"Privacy-Preserving Classification of Customer Data without Loss of Accuracy," (with Z. Yang and S. Zhong), Proceedings of the 2005 SIAM International Conference on Data Mining (SDM), 2005.

"PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment," (with D. Boneh, J. Feigenbaum, and A. Silberschatz), Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, Vol. 27, No. 1, 2004.

"Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data," (with Z. Yang), Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2004. This paper is corrected and superseded by the journal version.

"Experimental Analysis of Privacy-Preserving Statistics Computation," (with H. Subramaniam and Z. Yang), Proceedings of the Workshop on Secure Data Management, Springer LNCS 3178, 2004.

"Privacy Tradeoffs: Myth or Reality? (Panel Summary)," (with L. J. Camp, I. Goldberg, R. Rivest, and G. Wood), Proceedings of Financial Cryptography, 2002.

"Selective Private Function Evaluation with Applications to Private Statistics," (with R. Canetti, Y. Ishai, R. Kumar, M. Reiter, and R. Rubinfeld), Proceedings of Twentieth ACM Symposium on Principles of Distributed Computing (PODC), 2001.

"Secure Multiparty Computation of Approximations," (with J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, and M. Strauss), Proceedings of 28th International Colloquium on Automata, Languages and Programming (ICALP), 2001.

"Secure Communication in Minimal Connectivity Models," (with M. Franklin), Journal of Cryptology, Volume 13, No. 1, 2000.

"Obstacles to Freedom and Privacy by Design," Workshop on Freedom and Privacy by Design, Proceedings of 10th Conference on Computers, Freedom and Privacy, 2000.

"Secure Communication in Minimal Connectivity Models," (with M. Franklin), Proceedings of Eurocrypt '98, 1998.

"SubScribe: Secure and Efficient Data Delivery/Access Services in a Push-Based Environment," (with A. Datta, A. Celik, and A. Biliris), Proceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC), 1998.

"Cryptographic Protection of Databases and Software," (with J. Feigenbaum and M. Liberman), in Distributed Computing and Cryptography , DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Volume 2, American Mathematical Society, 1991, pp. 161-172. Joan Feigenbaum and Michael Merritt, editors.

[back to top]

Algorithmic Foundations of the Internet

"The Design Space of Probing Algorithms for Network-Performance Measurement," (with A. Jaggard, S. Kopparty, and V. Ramachandran), Proceedings of ACM SIGMETRICS, 2013.

"The Impact of Communication Models on Routing-Algorithm Convergence," (with A. Jaggard and V. Ramachandran), Proceedings of the 29th International Conference on Distributed Computing Systems (ICDCS), 2009.

"Rationality and Traffic Attraction: Incentives for Honest Path Announcements in BGP," (with S. Goldberg, S. Halevi, A. Jaggard, and V. Ramachandran), Proceedings of the ACM SIGCOMM 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), 2008.

[back to top]

Accountability

"Accountability in Computing: Concepts and Mechanisms" (with J. Feigenbaum and A. Jaggard), Foundations and Trends in Privacy and Security, Vol. 2, No. 4, 2020.

"Open vs. Closed Systems for Accountability," (with J. Feigenbaum and A. Jaggard), Proceedings of Symposium and Bootcamp on the Science of Security (HotSoS), 2014.

"Towards a Formal Model of Accountability," (with J. Feigenbaum and A. Jaggard), Proceedings of the 2011 New Security Paradigms Workshop (NSPW), 2011.

"Accountability and Deterrence in Online Life," (with J. Feigenbaum, J. Hendler, A. Jaggard, and D. Weitzner), Proceedings of the Third International Conference on Web Science (WebSci), 2011.

"Accountable Privacy," (with M. Burmester, Y. Desmedt, and A. Yasinsac), Proceedings of the Twelfth International Workshop on Security Protocols, 2004.

[back to top]

Computer Science Education

"The Experience of Near-Peer Computing Mentors: Strengthening and Expanding Women's Computing Identities in Undergraduate Interdisciplinary Contexts," (with J. Rosales, E. Melville, M. Wright, and S. Akhtar), Proceedings of the 55th ACM Technical Symposium on Computer Science Education (SIGCSE), 2024.

"Computing Fellows across Disciplines: Preliminary Results," (with J. Rosales, E. Melville, M. Wright, S. Akhtar, and Z. Webb-Mack), Proceedings of the 54th ACM Technical Symposium on Computer Science Education (SIGCSE), 2023.

"Living-Learning Community for Women in Computer Science at Rutgers," (with S. Nadler, T. Nguyen, C. Sanchez Gomez, and H. Wright), Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE), 2019.

"Computer Science Living-Learning Community for Women at Rutgers: Initial Experiences and Outcomes (Abstract Only)," (with J. Stout, G. Cochran, T. Nyugen, and C. Sanchez Gomez), Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE), 2018.

[back to top]

Distributed Computing

"Dynamics at the Boundary of Game Theory and Distributed Computing," (with A. Jaggard, N. Lutz and M. Schapira), ACM Transactions on Economics and Computation (TEAC), 2017.

"Self-stabilizing Uncoupled Dynamics," (with A. Jaggard, N. Lutz and M. Schapira), Proceedings of the 7th International Symposium on Algorithmic Game Theory (SAGT), 2014.

"Distributed Computing with Rules of Thumb," (with A. Jaggard and M. Schapira), Proceedings of the 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), 2011.

"Distributed Computing with Adaptive Heuristics," (with A. Jaggard and M. Schapira), Proceedings of Innovations in Computer Science, 2011.

"Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes," (with N. Alon, M. Merritt, O. Reingold, and G. Taubenfeld), Distributed Computing, Vol. 18, No. 2, 2005.

"Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes," (with M. Merritt, O. Reingold, and G. Taubenfeld), Proceedings of 16th International Symposium on Distributed Computing (DISC), 2002.

"Probabilistic Quorum Systems," (with D. Malkhi, M. Reiter, and A. Wool), Information and Computation, Vol. 170, No. 2, 2001.

"Dynamic Byzantine Quorum Systems," (with L. Alvisi, D. Malkhi, E. Pierce, and M. Reiter), Proceedings of the International Conference on Dependable Systems and Networks, IEEE Computer Society, 2000.

"Probabilistic Byzantine Quorum Systems," (with D. Malkhi, M. Reiter, and A. Wool), Proceedings of the Seventeenth ACM Symposium on Principles of Distributed Computing (PODC), 1998.

"Probabilistic Quorum Systems," (with D. Malkhi and M. Reiter), Proceedings of the Sixteenth ACM Symposium on Principles of Distributed Computing (PODC), 1997.

[back to top]

Voter Registration Databases

Improving State Voter Registration Databases: Final Report, Committee on State Voter Registration Databases, National Research Council, The National Academies Press, 2010.

"Interstate Voter Registration Database Matching: The Oregon-Washington 2008 Pilot Project," (with R. M. Alvarez, J. Jonas, and W. Winkler), Proceedings of the 2009 Electronic Voting Workshop / Workshop on Trustworthy Elections (EVT/WOTE), 2009.

State Voter Registration Databases: Immediate Actions and Future Improvements, Interim Report, Committee on State Voter Registration Databases, National Research Council, The National Academies Press, 2008.

"Statewide databases of registered voters," (with P. Hawthorn, B. Simons, C. Clifton, D. Wagner, S. Bellovin, A. Rosenthal, R. Poore, L. Coney, R. Gellman, and H. Hochheiser), Communications of the ACM, 2006.

Statewide Databases of Registered Voters: Study Of Accuracy, Privacy, Usability, Security, and Reliability Issues, commissioned by the U.S. Public Policy Committee of the Association for Computing Machinery, 2006.

[back to top]

Public Key Infrastructures and Authentication

"An Authentication Logic Supporting Synchronization, Revocation, and Recency," (with S. Stubblebine), IEEE Transactions on Software Engineering, Vol. 28, No. 3, 2002.

"Depender Graphs: A Method of Fault-Tolerant Certificate Distribution," (with P. Lincoln and J. Millen), Journal of Computer Security, Vol. 9, No. 4, 2001.

"Off-line generation of limited-use credit card numbers," (with A. Rubin), Proceedings of Financial Cryptography, 2001.

"Reasoning about Trust and Insurance in a Public Key Infrastructure," (with J. Millen), Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW-13), 2000.

"Efficient Fault-Tolerant Certificate Revocation," (with P. Lincoln and J. Millen), Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS), 2000.

"Certificate Revocation the Responsible Way," (with J. Millen), Proceedings of Computer Security, Dependability, and Assurance: From Needs to Solutions, 1999.

"The Omega Key Management Service," (with M. Reiter, M. Franklin, and J. Lacy), Journal of Computer Security, Vol. 4, No. 4, 1996.

"The Omega Key Management Service," (with M. Reiter, M. Franklin, and J. Lacy), Proceedings of the Third ACM Conference on Computer and Communications Security (CCS), 1996.

"An Authentication Logic Supporting Synchronization, Revocation, and Recency," (with S. Stubblebine), Proceedings of the Third ACM Conference on Computer and Communications Security (CCS), 1996.

[back to top]

Key Exchange Protocols

"Experimental Performance of Shared RSA Modulus Generation," (with S. Spalding), Algorithmica, Vol. 33, No. 1, 2002.

"Experimental Performance of Shared RSA Modulus Generation," (with S. Spalding), Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), 1999 (short version). A longer version was presented at Algorithms and Experiments (ALEX), 1998.

"Bounds on Secret Key Exchange Using a Random Deal of Cards," (with M. Fischer), Journal of Cryptology, Vol. 9, No. 2, 1996.

"Achieving Perfect Secrecy Using Correlated Random Variables," Ph.D. Thesis, Department of Computer Science, Yale University, YALEU/CSD/RR #1058, 1995.

"An Application of Game-Theoretic Techniques to Cryptography," (with M. Fischer), in Advances in Computational Complexity Theory, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Volume 13, American Mathematical Society, 1993. Jin-Yi Cai, editor.

"An Efficient Protocol for Unconditionally Secure Secret Key Exchange," (with M. Fischer), Proceedings of the 4th Annual Symposium on Discrete Algorithms (SODA), 1993.

"Multiparty Secret Key Exchange Using a Random Deal of Cards," (with M. Fischer), Proceedings of Crypto '91, Springer LNCS 576, 1992.

[back to top]

Edited books, conference proceedings, and journal special issues

Proceedings of Cryptology and Network Security - 9th International Conference, CANS 2010, Springer, Lecture Notes in Computer Science, Vol. 6467, 2010. Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi, editors.

Special Issue on Computer Communications Security, ACM Transactions on Information and System Security (TISSEC), Vol. 12, No. 2, ACM Press, 2008. Rebecca N. Wright and Sabrina De Capitani di Vimercati, editors.

Special Issue on Privacy and Security Aspects of Data Mining, International Journal of Information and Computer Security, Vol. 2, No. 1, Inderscience, 2008. Stan Matwin, LiWu Chang, Rebecca N. Wright, and Justin Zhan, editors.

Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM Press, 2006. Rebecca N. Wright, Sabrina De Capitani di Vimercati, and Vitaly Shmatikov, editors.

Proceedings of Financial Cryptography 2003, Springer Lecture Notes in Computer Science, Vol. 2742, 2003. Rebecca Wright, editor.

Network Threats, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, Volume 38, American Mathematical Society, 1997. Rebecca N. Wright and Peter G. Neumann, editors.

[back to top]

Other topics

"Strange Bedfellows: How and When to Work with Your Enemy," (with A. Jaggard), Proceedings of the 22nd International Workshop on Security Protocols, 2014.

"Secure Set Membership Using 3SAT," (with M. de Mare), Proceedings of the Eighth International Conference on Information and Communications Security (ICICS), 2006.

"Fischer's Cryptographic Protocols," 60th birthday celebration for Michael J. Fischer, Proceedings of Twenty-Second ACM Symposium on Principles of Distributed Computing (PODC), 2003.

"Influencing Software Usage," (with L. Cranor), Workshop on Freedom and Privacy by Design, Proceedings of 10th Conference on Computers, Freedom and Privacy, 2000. A preliminary version was presented at the Telecommunications Policy Research Conference (TPRC), 1998.

"Finite-State Approximation of Phrase-Structure Grammars," (with F. Pereira), in Finite-State Language Processing, MIT Press, Cambridge, MA, 1997. Emmanuel Roche and Yves Schabes, editors.

"Finite-State Approximation of Phrase-Structure Grammars," (with F. Pereira), Proceedings of the 29th Annual Conference of the Association for Computational Linguistics, 1991.


Copyright Notice

Some material that is available from this page is copyrighted; certain conditions are imposed on its use.

IACR Copyright Notice:

Permission is granted for a user to display all material at this site, to copy the material onto a single computer, and to make print copies of the material for personal use only. All other rights are retained by the International Association for Cryptologic Research. In particular, any other copying, other redistribution, or any commercial use of the material requires the permission of the publisher, which may be requested by contacting the International Association for Cryptologic Research.

IEEE Copyright Notice:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

ACM Copyright Notice:

Copyright © 1999 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page or intial screen of the document. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Publications Dept., ACM Inc., fax +1 (212) 869-0481, or permissions@acm.org.

Springer-Verlag LNCS Copyright Notice:

The copyright of these contributions has been transferred to Springer-Verlag Berlin Heidelberg New York. The copyright transfer covers the exclusive right to reproduce and distribute the contribution, including reprints, translations, photographic reproductions, microform, electronic form (offline, online), or any other reproductions of similar nature. Online available from Springer-Verlag LNCS series.


Back to top | Back to Rebecca Wright's home page

Copyright © 2024 Rebecca N. Wright