Jump to: 2024 | 2023 | 2020 | 2019 | 2018 | 2018 | 2017 | 2016 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 and earlier
See also: Publications by type | Publications by topic | Rebecca Wright's home page
Note: This list may be incomplete. For a complete listing, see my CV.
2024
"The Experience of Near-Peer Computing Mentors:
Strengthening and Expanding Women's Computing Identities in
Undergraduate Interdisciplinary Contexts," (with J. Rosales,
E. Melville, M. Wright, and S. Akhtar), Proceedings of the 55th
ACM Technical Symposium on Computer Science Education (SIGCSE), 2024.
2023
"Computing Fellows across Disciplines:
Preliminary Results," (with J. Rosales, E. Melville, M. Wright,
S. Akhtar, and Z. Webb-Mack), Proceedings of the 54th ACM Technical
Symposium on Computer Science Education (SIGCSE), 2023.
2020
"Accountability in Computing: Concepts and Mechanisms" (with
J. Feigenbaum and A. Jaggard), Foundations and Trends in Privacy and
Security, Vol. 2, No. 4, 2020.
"Understanding Privacy-Utility Tradeoffs in Differentially Private Online Active Learning," (with D. Bittner, A. Brito, M. Ghassemi, S. Rane, and A. Sarwate), Journal of Privacy and Confidentiality, 2020.
2019
"Living-Learning Community for Women in Computer Science at Rutgers,"
(with S. Nadler, T. Nguyen, C. Sanchez Gomez, and H. Wright),
Proceedings of the 50th ACM Technical Symposium on Computer Science
Education (SIGCSE),
2019.
2018
"From Keys to Databases – Real-World Applications of Secure
Multi-Party Computation," (with D. Archer, D. Bogdanov, Y. Lindell, L. Kamm,
K. Nielsen, J. Pagter, and N. Smart), The Computer Journal,
Vol. 61, No. 12, 2018.
"Using Noisy Binary Search for Differentially Private Anomaly Detection," (with D. Bittner and A. Sarwate), Proceedings of the 2nd International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), 2018.
"Privacy-preserving Machine Learning as a Service," (with E. Hesamifard, H. Takabi, and M. Ghasemi), Proceedings on Privacy Enhancing Technologies, 2018.
"Computer Science
Living-Learning Community for Women at Rutgers: Initial Experiences
and Outcomes (Abstract Only)," (with J. Stout, G. Cochran,
T. Nyugen, and C. Sanchez Gomez), Proceedings of the 49th ACM Technical Symposium on Computer
Science Education (SIGCSE), 2018.
2017
"Dynamics at the Boundary of Game Theory and
Distributed Computing," (with A. Jaggard, N. Lutz and
M. Schapira), ACM Transactions on Economics and Computation (TEAC),
2017.
"Keynote: Privacy in Today's World," 2017 ACM CCS Workshop on Women in Cyber Security (CyberW), 2017.
"Differentially Private Noisy Search
with Applications to Anomaly Detection (Abstract)," (with
D. Bittner and A. Sarwate), Proceedings of the 10th
ACM Workshop on Artificial Intelligence and Security (AISec), 2017.
"Differentially Private Online Active Learning
with Applications to Anomaly Detection," (with
M. Ghassemi and A. Sarwate), Proceedings of the 9th
ACM Workshop on Artificial Intelligence and Security (AISec), 2016.
"Self-stabilizing Uncoupled Dynamics," (with
A. Jaggard, N. Lutz and M. Schapira), Proceedings of the 7th
International Symposium on Algorithmic Game Theory (SAGT), 2014.
"Systematizing Secure Computation for Research and
Decision Support," (with J. Perry, D. Gupta, and J. Feigenbaum),
Proceedings of the 9th Conference for Security and Cryptography for
Networks (SCN), 2014.
"Uncovering Facebook Side Channels and User
Attitudes," (with S. Lu and J. Lindqvist), Proceedings of the
Workshop on Web 2.0 Security and Privacy (W2SP), 2014.
"Open vs. Closed Systems for Accountability,"
(with J. Feigenbaum and A. Jaggard), Proceedings of Symposium and
Bootcamp on the Science of Security (HotSoS), 2014.
"Strange Bedfellows: How and When to Work with Your
Enemy," (with A. Jaggard), Proceedings of the 22nd
International Workshop on Security Protocols, 2014.
"Practical
and Privacy-Preserving Policy Compliance on Outsourced Data,"
(with G. Di Crescenzo, J. Feigenbaum, D. Gupta, T. Panagos, and
J. Perry), Proceedings of 2nd Workshop on Applied Homomorphic
Cryptography and Encrypted Computing (WAHC), 2014.
"DP-WHERE: Differentially Private Modeling of
Human Mobility," (with D. Mir, S. Isaacman, R. Cáceres, and
M. Martonosi), Proceedings of IEEE International Conference on Big
Data, 2013.
"Privacy-Preserving Publish/Subscribe: Efficient
Protocols in a Distributed Model," (with G. Di Crescenzo, B. Coan,
J. Schultz, and S. Tsang), Proceedings of the 8th International
Workshop on Data Privacy Management (DPM), 2013.
"The Design Space of
Probing Algorithms for Network-Performance Measurement," (with
A. Jaggard, S. Kopparty, and V. Ramachandran), Proceedings of ACM
SIGMETRICS, 2013.
"Efficient and Private Three-Party
Publish/Subscribe," (with G. Di Crescenzo, J. Burns, B. Coan,
J. Schultz, J. Stanton, and S. Tsang), Proceedings of the 7th
International Conference on Network and System Security (NSS), 2013.
"A Practical
Differentially Private Random Decision Tree Classifier," (with
G. Jagannathan and K. Pillaipakkamnatt), Transactions on Data Privacy,
2012.
"A Differentially Private Estimator for the
Stochastic Kronecker Graph Model," (with D. Mir), Proceedings
of the 2012 Workshop on Privacy and Anonymity in the Information Society,
2012.
"Accountability and Deterrence in Online
Life," (with J. Feigenbaum, J. Hendler, A. Jaggard, and
D. Weitzner), Proceedings of the Third International Conference on Web
Science (WebSci), 2011.
"Distributed Computing with Rules of Thumb,"
(with A. Jaggard and M. Schapira), Proceedings of the 30th Annual
ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing
(PODC), 2011.
"Pan-private Algorithms Via Statistics on
Sketches," (with D. Mir, S. Muthukrishnan, and A. Nikolov),
Proceedings of the 30th ACM Symposium on Principles of Database
Systems (PODS), 2011.
"Distributed Computing with Adaptive
Heuristics," (with A. Jaggard and M. Schapira), Proceedings of
Innovations in Computer Science, 2011.
"Communication-Efficient Privacy-Preserving
Clustering," (with G. Jagannathan, K. Pillaipakkamnatt, and
D. Umano), Transactions on Data Privacy, 2010.
Improving
State Voter Registration Databases: Final Report, Committee on
State Voter Registration Databases, National Research Council, The
National Academies Press, 2010.
"A Differentially Private Graph Estimator,"
"Privacy-Preserving Evaluation of Generalization
Error and Its Application to Model and Attribute Selection," (with
J. Sakuma), Proceedings of the 1st Asian Conference on Machine
Learning (ACML), 2009.
"Interstate Voter Registration Database
Matching: The Oregon-Washington 2008 Pilot Project," (with
R. M. Alvarez, J. Jonas, and W. Winkler), Proceedings of the 2009
Electronic Voting Workshop / Workshop on Trustworthy Elections
(EVT/WOTE), 2009.
"Private Multiparty Sampling and Approximation of
Vector Combinations," (with Y. Ishai, T. Malkin, and M. Strauss),
Theoretical Computer Science, Vol. 410, No. 18, 2009.
"The Impact of Communication Models on
Routing-Algorithm Convergence," (with A. Jaggard and V. Ramachandran),
Proceedings of the 29th International Conference on Distributed
Computing Systems (ICDCS), 2009.
Special
Issue on Computer Communications Security, ACM Transactions on
Information and System Security (TISSEC), Vol. 12, No. 2, ACM Press,
2008. Rebecca N. Wright and Sabrina De Capitani di Vimercati, editors.
"Rationality and Traffic Attraction: Incentives
for Honest Path Announcements in BGP," (with S. Goldberg,
S. Halevi, A. Jaggard, and V. Ramachandran), Proceedings of the ACM
SIGCOMM 2008 Conference on Applications, Technologies, Architectures,
and Protocols for Computer Communication (SIGCOMM), 2008.
"Privacy-Preserving Reinforcement Learning,"
(with J. Sakuma and S. Kobayashi), Proceedings of the 25th
International Conference on Machine Learning (ICML), 2008.
"On the Lindell-Pinkas Secure Computation of
Logarithms: From Theory to Practice," (with R. Ryger and
O. Kardes), Proceedings of the International Workshop
on Practical Privacy-Preserving Data Mining, 2008. (Electronic
proceedings only.)
"Privacy-Preserving Imputation of Missing
Data," (with G. Jagannathan), Data & Knowledge
Engineering, Vol. 65, No. 1, 2008.
State Voter
Registration Databases: Immediate Actions and Future Improvements,
Interim Report, Committee on State Voter Registration Databases,
National Research Council, National Academies Press, 2008.
"Privacy in a Networked World," Frontiers of
Engineering: Reports on Leading-Edge Engineering from the 2007
Symposium, The National Academies Press, 2008.
Special Issue on Privacy and Security Aspects of Data Mining,
International Journal of Information and Computer Security, Vol. 2,
No. 1, Inderscience, 2008. Stan Matwin, LiWu Chang, Rebecca N. Wright,
and Justin Zhan, editors.
"Private Inference Control for Aggregate Database
Queries," (with G. Jagannathan), Proceedings of the ICDM
International Workshop on Privacy Aspects of Data Mining, 2007.
"Towards Privacy-Preserving Model
Selection," (with Z. Yang and S. Zhong), Proceedings of the First
ACM SIGKDD International Workshop on Privacy, Security, and Trust in
KDD (PinKDD'07), 2007.
"Private Multiparty Sampling and Approximation of
Vector Combinations," (with Y. Ishai, T. Malkin, and M. Strauss),
Proceedings of the 34th International Colloquium on Automata,
Languages and Programming (ICALP), 2007.
"Privacy-Preserving Data Imputation," (with
G. Jagannathan), Proceedings of the ICDM International Workshop on
Privacy Aspects of Data Mining, 2006.
"Secure Set Membership Using 3SAT," (with
M. de Mare), Proceedings of the Eighth International Conference on
Information and Communications Security (ICICS), 2006.
Proceedings
of the 13th ACM Conference on Computer and Communications
Security, ACM Press, 2006. Rebecca N. Wright, Sabrina De
Capitani di Vimercati, and Vitaly Shmatikov, editors.
"Privacy-Preserving Queries on Encrypted
Data," (with Z. Yang and S. Zhong), Proceedings of the 11th
European Symposium On Research In Computer Security (Esorics), 2006.
"Secure Multiparty Computation of
Approximations," (with J. Feigenbaum, Y. Ishai, T. Malkin,
K. Nissim, and M. Strauss), ACM Transactions on Algorithms, Vol. 2,
No. 3, 2006.
"Privacy-Preserving Computation of Bayesian
Networks on Vertically Partitioned Data", (with Z. Yang), IEEE
Transactions on Data Knowledge Engineering (TKDE), Vol. 18, No. 9,
2006.
"Statewide databases of registered voters,"
(with P. Hawthorn, B. Simons, C. Clifton, D. Wagner, S. Bellovin,
A. Rosenthal, R. Poore, L. Coney, R. Gellman, and H. Hochheiser),
Communications of the ACM, 2006.
"A New Privacy-Preserving Distributed
k-Clustering Algorithm," (with G. Jagannathan and K.
Pillaipakkamnatt), Proceedings of the 2006 SIAM International
Conference on Data Mining (SDM), 2006.
"Experimental Analysis of a Privacy-Preserving
Scalar Product Protocol," (with Z. Yang and H. Subramaniam),
International Journal of Computer Systems Science and Engineering,
Vol. 21, No. 1, 2006.
Statewide Databases of Registered Voters: Study Of Accuracy, Privacy,
Usability, Security, and Reliability Issues, commissioned by the
U.S. Public Policy Committee of the Association for Computing
Machinery, 2006.
"Tight Bounds for Shared Memory Systems
Accessed by Byzantine Processes," (with N. Alon, M. Merritt,
O. Reingold, and G. Taubenfeld), Distributed Computing, Vol. 18, No.
2, 2005.
"Distributed Data Mining Protocols for Privacy:
A Review of Some Recent Results," (with Z. Yang and S. Zhong),
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors Workshop
(MADNES), 2005.
"Privacy-Preserving Distributed k-Means
Clustering over Arbitrarily Partitioned Data," (with
G. Jagannathan), Proceedings of the 11th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining (KDD), 2005.
"Anonymity-Preserving Data Collection," (with
Z. Yang and S. Zhong), Proceedings of the 11th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining (KDD),
2005.
"Privacy-Enhancing k-Anonymization of
Customer Data," (with S. Zhong and Z. Yang), Proceedings of the
24th ACM Symposium on Principles of Database Systems (PODS), 2005.
"Improved Privacy-Preserving Bayesian Network
Parameter Learning on Vertically Partitioned Data," (with
Z. Yang), Proceedings of the International Workshop on Privacy Data
Management, 2005.
"Privacy-Preserving Classification of Customer Data
without Loss of Accuracy," (with Z. Yang and S. Zhong),
Proceedings of the 2005 SIAM International Conference on Data Mining
(SDM), 2005.
"Privacy-Preserving Bayesian Network Structure Computation on
Distributed Heterogeneous Data," (with Z. Yang), Proceedings of the
10th ACM SIGKDD International Conference on Knowledge Discovery and
Data Mining (KDD), 2004. This paper is corrected and superseded by
the journal version.
"Experimental Analysis of Privacy-Preserving
Statistics Computation," (with H. Subramaniam and Z. Yang),
Proceedings of the Workshop on Secure Data Management, Springer LNCS
3178, 2004.
"Accountable Privacy," (with M. Burmester,
Y. Desmedt, and A. Yasinsac), Proceedings of the Twelfth International
Workshop on Security Protocols, 2004.
"Fischer's Cryptographic Protocols," 60th
birthday celebration for Michael J. Fischer, Proceedings of
Twenty-Second ACM Symposium on Principles of Distributed Computing
(PODC), 2003.
"An Authentication Logic Supporting Synchronization,
Revocation, and Recency," (with S. Stubblebine), IEEE Transactions on
Software Engineering, Vol. 28, No. 3, 2002.
"Privacy Tradeoffs: Myth or Reality? (Panel
Summary)," (with L. J. Camp, I. Goldberg, R. Rivest, and G. Wood),
Proceedings of Financial Cryptography 2002 (FC 2002).
"Tight Bounds for Shared Memory Systems Accessed by
Byzantine Processes," (with M. Merritt, O. Reingold, and G.
Taubenfeld), Proceedings of 16th International Symposium on
Distributed Computing (DISC), 2002.
"Probabilistic Quorum Systems," (with
D. Malkhi, M. Reiter, and A. Wool), Information and Computation, Vol.
170, No. 2, 2001.
"Selective Private Function Evaluation with
Applications to Private Statistics," (with R. Canetti, Y. Ishai,
R. Kumar, M. Reiter, and R. Rubinfeld), Proceedings of Twentieth ACM
Symposium on Principles of Distributed Computing (PODC), 2001.
"Secure Multiparty Computation of
Approximations," (with J. Feigenbaum, Y. Ishai, T. Malkin,
K. Nissim, and M. Strauss), Proceedings of 28th International
Colloquium on Automata, Languages and Programming (ICALP), 2001.
"Off-line generation of limited-use credit card
numbers," (with A. Rubin), Proceedings of Financial Cryptography,
2001.
"Reasoning about Trust and Insurance in a Public Key
Infrastructure," (with J. Millen), Proceedings of 13th IEEE
Computer Security Foundations Workshop (CSFW-13), IEEE Computer
Society, July 2000.
"Dynamic Byzantine Quorum Systems," (with
L. Alvisi, D. Malkhi, E. Pierce, and M. Reiter), Proceedings of the
International Conference on Dependable Systems and Networks, IEEE
Computer Society, June 2000.
"Obstacles to Freedom and Privacy by Design,"
Workshop on Freedom and Privacy by Design, Proceedings of 10th
Conference on Computers, Freedom and Privacy, April 2000.
"Influencing Software Usage," (with L. Cranor),
Workshop on Freedom and Privacy by Design, Proceedings of 10th
Conference on Computers, Freedom and Privacy, April 2000. A preliminary version
was presented at the Telecommunications Policy Research Conference
(TPRC), October 1998.
"Efficient Fault-Tolerant Certificate
Revocation," (with P. Lincoln and J. Millen), Proceedings of the
7th ACM Conference on Computer and Communications Security (CCS),
ACM Press, November, 2000.
"Probabilistic Byzantine Quorum Systems,"
(with D. Malkhi, M. Reiter, and A. Wool), Proceedings of the
Seventeenth ACM Symposium on Principles of Distributed Computing,
1998.
"Secure Communication in Minimal Connectivity
Models," (with M. Franklin), Proceedings of Eurocrypt '98, June
1998.
"SubScribe: Secure and Efficient Data
Delivery/Access Services in a Push-Based Environment," (with
A. Datta, A. Celik, and A. Biliris), Proceedings of the First
International Conference on Telecommunications and Electronic Commerce
(ICTEC), November 1998.
Network
Threats, DIMACS Series in Discrete Mathematics and Theoretical
Computer Science, Volume 38, American Mathematical Society, 1997.
Rebecca N. Wright and Peter G. Neumann, editors.
"Probabilistic Quorum Systems," (with
D. Malkhi and M. Reiter), Proceedings of the Sixteenth ACM Symposium
on Principles of Distributed Computing (PODC), 1997.
"Bounds on Secret Key Exchange Using a Random
Deal of Cards," (with M. Fischer), Journal of Cryptology, Vol. 9,
No. 2, Spring 1996.
"The Omega Key Management Service," (with
M. Reiter, M. Franklin, and J. Lacy), Proceedings of the Third ACM
Conference on Computer and Communications Security (CCS), March 1996.
"An Authentication Logic Supporting
Synchronization, Revocation, and Recency," (with S. Stubblebine),
Proceedings of the Third ACM Conference on Computer and Communications
Security (CCS), March 1996.
"An Application of Game-Theoretic Techniques to
Cryptography," (with M. Fischer), in Advances in
Computational Complexity Theory, DIMACS Series in Discrete
Mathematics and Theoretical Computer Science, Volume 13, American
Mathematical Society, 1993, pp. 99-118. Jin-Yi Cai, editor.
"An Efficient Protocol for Unconditionally Secure
Secret Key Exchange," (with M. Fischer), Proceedings of the 4th
Annual Symposium on Discrete Algorithms, 1993, pp. 475-483.
"Multiparty Secret Key Exchange Using a Random
Deal of Cards," (with M. Fischer), Proceedings of Crypto '91,
Springer-Verlag, LNCS 576, 1992, pp. 141-155.
"Finite-State Approximation of Phrase-Structure
Grammars," (with F. Pereira), Proceedings of the 29th Annual
Conference of the Association for Computational Linguistics, 1991.
"Cryptographic Protection of Databases and
Software," (with J. Feigenbaum and M. Liberman), in
Distributed Computing and Cryptography , DIMACS Series in Discrete
Mathematics and Theoretical Computer Science, Volume 2, American
Mathematical Society, 1991, pp. 161-172. Joan Feigenbaum and
Michael Merritt, editors.
Some material that is available from this page is copyrighted; certain
conditions are imposed on its use.
IACR Copyright Notice:
Permission is granted for a user to display all material at this site, to copy
the material onto a single computer, and to make print copies of the material
for personal use only. All other rights are retained by the International
Association for Cryptologic Research. In particular, any other copying, other
redistribution, or any commercial use of the material requires the permission
of the publisher, which may be requested by contacting the International
Association for Cryptologic Research.
IEEE Copyright Notice:
This material is presented to ensure timely
dissemination of scholarly and technical work. Copyright and all rights
therein are retained by authors or by other copyright holders. All persons
copying this information are expected to adhere to the terms and constraints
invoked by each author's copyright. In most cases, these works may not be
reposted without the explicit permission of the copyright holder.
ACM Copyright Notice:
Copyright © 1999 by the Association for Computing Machinery,
Inc. Permission to make digital or hard copies of part of this work for
personal or classroom use is granted without fee provided that copies are not
made or distributed for profit or commercial advantage and that copies bear
this notice and the full citation on the first page or intial screen of the
document. Copyrights for components of this work owned by others than ACM must
be honored. Abstracting with credit is permitted. To copy otherwise, to
republish, to post on servers, or to redistribute to lists, requires prior
specific permission and/or a fee. Request permissions from Publications Dept.,
ACM Inc., fax +1 (212) 869-0481, or permissions@acm.org.
Springer-Verlag LNCS Copyright Notice:
The copyright of these contributions has been transferred to Springer-Verlag
Berlin Heidelberg New York. The copyright transfer covers the exclusive right
to reproduce and distribute the contribution, including reprints,
translations, photographic reproductions, microform, electronic form (offline,
online), or any other reproductions of similar nature. Online available from
Springer-Verlag LNCS
series.
Back to top |
Back to Rebecca
Wright's home page
2016
2014
2013
2012
2011
"Towards a Formal Model of
Accountability," (with J. Feigenbaum and A. Jaggard), Proceedings
of the 2011 New Security Paradigms Workshop (NSPW),
2011.
2010
Proceedings of Cryptology and Network Security - 9th
International Conference, CANS 2010, Springer, Lecture Notes
in Computer Science, Vol. 6467, 2010. Swee-Huay Heng, Rebecca N.
Wright, Bok-Min Goi, editors.
2009
"A Practical Differentially Private Random
Decision Tree Classifier," (with G. Jagannathan and
K. Pillaipakkamnatt), Proceedings of the ICDM International Workshop
on Privacy Aspects of Data Mining, 2009.
2008
2007
2006
2005
"Implementing Privacy-Preserving Bayesian-Net
Discovery for Vertically Partitioned Data," (with O. Kardes,
R. Ryger, and J. Feigenbaum), Proceedings of the ICDM Workshop on
Privacy and Security Aspects of Data Mining, 2005.
2004
"PORTIA: Privacy, Obligations, and Rights in
Technologies of Information Assessment," (with D. Boneh, J.
Feigenbaum, and A. Silberschatz), Bulletin of the IEEE Computer
Society Technical Committee on Data Engineering, Vol. 27, No. 1, 2004.
2003
Proceedings of Financial Cryptography 2003, Springer
Lecture Notes in Computer Science, Vol. 2742, 2003. Rebecca Wright,
editor.
2002
"Experimental Performance of Shared RSA
Modulus Generation," (with S. Spalding), Algorithmica, Vol. 33,
No. 1, 2002, pp. 89-103.
2001
"Depender Graphs: A Method of Fault-Tolerant
Certificate Distribution," (with P. Lincoln and J. Millen),
Journal of Computer Security, Vol. 9, No. 4, 2001.
2000
"Secure Communication in Minimal Connectivity
Models," (with M. Franklin), Journal of Cryptology, Volume 13,
No. 1, 2000.
1999
"Experimental Performance of Shared RSA Modulus
Generation," (with S. Spalding), Proceedings of the Tenth Annual
ACM-SIAM Symposium on Discrete Algorithms (SODA), January 1999 (short
version). A longer version was presented at
Algorithms and Experiments (ALEX), February 1998.
1998
"Certificate Revocation the Responsible Way,"
(with J. Millen), Proceedings of Computer Security, Dependability, and
Assurance: From Needs to Solutions, IEEE Computer Society, 1999.
1997
"Finite-State Approximation of Phrase-Structure Grammars," (with F.
Pereira), in
Finite-State Language Processing, MIT Press, Cambridge, MA,
1997. Emmanuel Roche and Yves Schabes, editors.
1996
"The Omega Key Management Service," (with
M. Reiter, M. Franklin, and J. Lacy), Journal of Computer Security,
Vol. 4, No. 4, 1996.
1995 and earlier
"Achieving Perfect Secrecy Using Correlated Random
Variables," Ph.D. Thesis, Department of Computer Science, Yale
University, YALEU/CSD/RR #1058, January 1995.
Copyright Notice
Copyright © 2024 Rebecca N. Wright |