Cynthia Dwork
According to our database^{1},
Cynthia Dwork
authored at least 134 papers
between 1982 and 2020.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2015, "For contributions to the science of database privacy, cryptography, and distributed computing.".
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Homepages:

at zbmath.org

at viaf.org

at id.loc.gov

at isni.org

at dl.acm.org
On csauthors.net:
Bibliography
2020
CoRR, 2020
Representation via Representations: Domain Generalization via Adversarially Learned Invariant Representations.
CoRR, 2020
Proceedings of the 1st Symposium on Foundations of Responsible Computing, 2020
Proceedings of the 1st Symposium on Foundations of Responsible Computing, 2020
2019
CoRR, 2019
Proceedings of the 38th ACM SIGMODSIGACTSIGAI Symposium on Principles of Database Systems, 2019
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019
2018
The Fienberg Problem: How to Allow Human Interactive Data Analysis in the Age of Differential Privacy.
J. Priv. Confidentiality, 2018
J. Priv. Confidentiality, 2018
J. Priv. Confidentiality, 2018
CoRR, 2018
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018
Proceedings of the Conference on Fairness, Accountability and Transparency, 2018
Proceedings of the Conference On Learning Theory, 2018
2017
CoRR, 2017
CoRR, 2017
CoRR, 2017
Commun. ACM, 2017
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017
2016
J. Priv. Confidentiality, 2016
Spooky Interaction and its Discontents: Compilers for Succinct TwoMessage Argument Systems.
Electronic Colloquium on Computational Complexity (ECCC), 2016
CoRR, 2016
2015
Discret. Comput. Geom., 2015
CoRR, 2015
Proceedings of the FortySeventh Annual ACM on Symposium on Theory of Computing, 2015
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015
Proceedings of the Advances in Cryptology  ASIACRYPT 2015  21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Foundations and Trends in Theoretical Computer Science, 2014
Analyze gauss: optimal bounds for privacypreserving principal component analysis.
Proceedings of the Symposium on Theory of Computing, 2014
Proceedings of the 30th Annual Symposium on Computational Geometry, 2014
2013
J. Am. Medical Informatics Assoc., 2013
Proceedings of the 30th International Conference on Machine Learning, 2013
2012
Differential Privacy and the Power of (Formalizing) Negative Thinking  (Extended Abstract).
Proceedings of the Principles of Security and Trust  First International Conference, 2012
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Special Section on the Fortieth Annual ACM Symposium On Theory Of Computing (STOC 2008).
SIAM J. Comput., 2011
Commun. ACM, 2011
Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography.
Commun. ACM, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
2010
J. Priv. Confidentiality, 2010
On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy.
J. Priv. Confidentiality, 2010
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010
Proceedings of the TwentyFirst Annual ACMSIAM Symposium on Discrete Algorithms, 2010
Proceedings of the Innovations in Computer Science, 2010
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
On the complexity of differentially private data release: efficient algorithms and hardness results.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
2008
Proceedings of the Theory and Applications of Models of Computation, 2008
Proceedings of the Advances in Cryptology, 2008
2007
The First and Fourth PublicKey Cryptosystems with WorstCase/AverageCase Equivalence..
Electronic Colloquium on Computational Complexity (ECCC), 2007
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007
Privacy, accuracy, and consistency too: a holistic solution to contingency table release.
Proceedings of the TwentySixth ACM SIGACTSIGMODSIGART Symposium on Principles of Database Systems, 2007
Proceedings of the Privacy, 2007
Ask a Better Question, Get a Better Answer A New Approach to Private Data Analysis.
Proceedings of the Database Theory, 2007
2006
Proceedings of the LATIN 2006: Theoretical Informatics, 2006
Proceedings of the LATIN 2006: Theoretical Informatics, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Advances in Cryptology  EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the UAI '05, 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Twentyfourth ACM SIGACTSIGMODSIGART Symposium on Principles of Database Systems, 2005
Proceedings of the Topics in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
2004
J. ACM, 2004
ListDecoding of Linear Functions and Analysis of a TwoRound ZeroKnowledge Argument.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the LATIN 2004: Theoretical Informatics, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
2003
SIAM Review, 2003
J. ACM, 2003
Internet Math., 2003
Proceedings of the Advances in Cryptology, 2003
2002
Electronic Colloquium on Computational Complexity (ECCC), 2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
2001
Proceedings of the Tenth International World Wide Web Conference, 2001
1999
SIAM J. Comput., 1999
1998
SIAM J. Comput., 1998
J. Cryptology, 1998
Proceedings of the Advances in Cryptology, 1998
1997
J. ACM, 1997
Proceedings of the Mathematical Foundations of Computer Science 1997, 1997
1996
IACR Cryptol. ePrint Arch., 1996
Electronic Colloquium on Computational Complexity (ECCC), 1996
Proceedings of the Distributed Algorithms, 10th International Workshop, 1996
Digital Signets: SelfEnforcing Protection of Digital Information (Preliminary Version).
Proceedings of the TwentyEighth Annual ACM Symposium on the Theory of Computing, 1996
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996
Proceedings of the Third Forum on Research and Technology Advances in Digital Library, 1996
1995
SIGACT News, 1995
Proceedings of the Digital Libraries, Research and Technology Advances, 1995
1994
J. ACM, 1994
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994
1993
J. ACM, 1993
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993
1992
Inf. Comput., April, 1992
J. ACM, 1992
J. ACM, 1992
Simple and Efficient Bounded Concurrent Timestamping or Bounded Concurrent Timestamp Systems are Comprehensible!
Proceedings of the 24th Annual ACM Symposium on Theory of Computing, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Inf. Comput., April, 1991
Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Inf. Comput., October, 1990
SIGACT News, 1990
SIAM J. Comput., 1990
SIAM J. Comput., 1990
Proceedings of the Distributed Algorithms, 4th International Workshop, 1990
1989
SIAM J. Comput., 1989
Randomization in Byzantine Agreement.
Advances in Computing Research, 1989
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989
1988
SIAM J. Comput., 1988
SIAM J. Comput., 1988
J. ACM, 1988
Proceedings of the Advances in Cryptology, 1988
1987
J. ACM, 1987
1986
Upper and Lower Time Bounds for Parallel Random Access Machines without Simultaneous Writes.
SIAM J. Comput., 1986
Knowledge and Common Knowledge in a Byzantine Environment I: Crash Failures.
Proceedings of the 1st Conference on Theoretical Aspects of Reasoning about Knowledge, 1986
Proceedings of the 18th Annual ACM Symposium on Theory of Computing, 1986
Proceedings of the 27th Annual Symposium on Foundations of Computer Science, 1986
1985
Proceedings of the 17th Annual ACM Symposium on Theory of Computing, 1985
1984
J. Log. Program., 1984
Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, 1984
Proceedings of the Third Annual ACM Symposium on Principles of Distributed Computing, 1984
1983
Superconcentrators, Generalizers and Generalized Connectors with Limited Depth (Preliminary Version)
Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 1983
Proceedings of the Second Annual ACM SIGACTSIGOPS Symposium on Principles of Distributed Computing, 1983
1982
Proceedings of the 14th Annual ACM Symposium on Theory of Computing, 1982