Rebecca N. Wright

Affiliations:
  • Rutgers University, USA


According to our database1, Rebecca N. Wright authored at least 87 papers between 1989 and 2020.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Awards

IEEE Fellow

IEEE Fellow 2018, "For contributions to applied cryptography and privacy".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Understanding Privacy-Utility Tradeoffs in Differentially Private Online Active Learning.
J. Priv. Confidentiality, 2020

Accountability in Computing: Concepts and Mechanisms.
Found. Trends Priv. Secur., 2020

2019
Living-Learning Community for Women in Computer Science at Rutgers.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

2018
Privacy-preserving Machine Learning as a Service.
Proc. Priv. Enhancing Technol., 2018

From Keys to Databases - Real-World Applications of Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2018

Computer Science Living-Learning Community for Women at Rutgers: Initial Experiences and Outcomes (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Using Noisy Binary Search for Differentially Private Anomaly Detection.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

2017
Dynamics at the Boundary of Game Theory and Distributed Computing.
ACM Trans. Economics and Comput., 2017

Differentially Private Noisy Search with Applications to Anomaly Detection (Abstract).
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

2016
Differentially Private Online Active Learning with Applications to Anomaly Detection.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016

2014
Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

Strange Bedfellows: How and When to Work with Your Enemy.
Proceedings of the Security Protocols XXII, 2014

Systematizing Secure Computation for Research and Decision Support.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Self-stabilizing Uncoupled Dynamics.
Proceedings of the Algorithmic Game Theory - 7th International Symposium, 2014

Open vs. closed systems for accountability.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Practical and Privacy-Preserving Policy Compliance for Outsourced Data.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
The design space of probing algorithms for network-performance measurement.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Efficient and Private Three-Party Publish/Subscribe.
Proceedings of the Network and System Security - 7th International Conference, 2013

Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

DP-WHERE: Differentially private modeling of human mobility.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

2012
A Practical Differentially Private Random Decision Tree Classifier.
Trans. Data Priv., 2012

Privacy-Oriented Cryptography (Dagstuhl Seminar 12381).
Dagstuhl Reports, 2012

A differentially private estimator for the stochastic Kronecker graph model.
Proceedings of the 2012 Joint EDBT/ICDT Workshops, Berlin, Germany, March 30, 2012, 2012

2011
Accountability and deterrence in online life.
Proceedings of the Web Science 2011, 2011

Pan-private algorithms via statistics on sketches.
Proceedings of the 30th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2011

Distributed computing with rules of thumb.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

Towards a formal model of accountability.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Distributed Computing with Adaptive Heuristics.
Proceedings of the Innovations in Computer Science, 2011

2010
Communication-Efficient Privacy-Preserving Clustering.
Trans. Data Priv., 2010

Pan-private Algorithms: When Memory Does Not Help
CoRR, 2010

2009
Private multiparty sampling and approximation of vector combinations.
Theor. Comput. Sci., 2009

Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond
CoRR, 2009

Interstate Voter Registration Database Matching: The Oregon-Washington 2008 Pilot Project.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

A Differentially Private Graph Estimator.
Proceedings of the ICDM Workshops 2009, 2009

The Impact of Communication Models on Routing-Algorithm Convergence.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection.
Proceedings of the Advances in Machine Learning, 2009

2008
Guest Editorial: Special Issue on Computer and Communications Security.
ACM Trans. Inf. Syst. Secur., 2008

Privacy-preserving imputation of missing data.
Data Knowl. Eng., 2008

Rationality and traffic attraction: incentives for honest path announcements in bgp.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Privacy-preserving reinforcement learning.
Proceedings of the Machine Learning, 2008

2007
Towards Privacy-Preserving Model Selection.
Proceedings of the Privacy, 2007

Private Inference Control for Aggregate Database Queries.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

2006
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data.
IEEE Trans. Knowl. Data Eng., 2006

Secure multiparty computation of approximations.
ACM Trans. Algorithms, 2006

Experimental analysis of a privacy-preserving scalar product protocol.
Comput. Syst. Sci. Eng., 2006

A New Privacy-Preserving Distributed k-Clustering Algorithm.
Proceedings of the Sixth SIAM International Conference on Data Mining, 2006

Secure Set Membership Using 3Sat.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Privacy-Preserving Data Imputation.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Privacy-Preserving Queries on Encrypted Data.
Proceedings of the Computer Security, 2006

2005
Tight bounds for shared memory systems accessed by Byzantine processes.
Distributed Comput., 2005

Privacy-Preserving Classification of Customer Data without Loss of Accuracy.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005

Privacy-enhancing <i>k</i>-anonymization of customer data.
Proceedings of the Twenty-fourth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 2005

Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Anonymity-preserving data collection.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

Privacy-preserving distributed k-means clustering over arbitrarily partitioned data.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

2004
PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment.
IEEE Data Eng. Bull., 2004

Accountable Privacy (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

Accountable Privacy.
Proceedings of the Security Protocols, 2004

Experimental Analysis of Privacy-Preserving Statistics Computation.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Privacy-preserving Bayesian network structure computation on distributed heterogeneous data.
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004

2003
Fischer's cryptographic protocols.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

2002
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency.
IEEE Trans. Software Eng., 2002

Experimental Performance of Shared RSA Modulus Generation.
Algorithmica, 2002

Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes.
Proceedings of the Distributed Computing, 16th International Conference, 2002

Privacy Tradeoffs: Myth or Reality? Panel.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
Depender Graphs: A Method of Fault-Tolerant Certificate Distribution.
J. Comput. Secur., 2001

Probabilistic Quorum Systems.
Inf. Comput., 2001

Selective private function evaluation with applications to private statistics.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Off-Line Generation of Limited-Use Credit Card Numbers.
Proceedings of the Financial Cryptography, 2001

2000
Secure Communication in Minimal Connectivity Models.
J. Cryptol., 2000

Dynamic Byzantine Quorum Systems.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

Reasoning about Trust and Insurance in a Public Key Infrastructure.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Obstacles to freedom and privacy by design.
Proceedings of the Tenth Conference on Computers, 2000

Influencing software usage.
Proceedings of the Tenth Conference on Computers, 2000

Efficient fault-tolerant certificate revocation.
Proceedings of the CCS 2000, 2000

1998
Probabilistic Byzantine Quorum Systems.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

Secure Communications in Minimal Connectivity Models.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
Probabilistic Quorum Systems.
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997

1996
Bounds on Secret Key Exchange Using a Random Deal of Cards.
J. Cryptol., 1996

The Omega Key Management Service.
J. Comput. Secur., 1996

An Authentication Logic Supporting Synchronization, Revocation, and Recency.
Proceedings of the CCS '96, 1996

1993
An Efficient Protocol for Unconditionally Secure Secret Key Exchange.
Proceedings of the Fourth Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms, 1993

1991
Multiparty Secret Key Exchange Using a Random Deal of Cards.
Proceedings of the Advances in Cryptology, 1991

Finite-State Approximation of Phrase Structure Grammars.
Proceedings of the 29th Annual Meeting of the Association for Computational Linguistics, 1991

1990
An Application of Game-Theoretic Techniques to Cryptography.
Proceedings of the Advances In Computational Complexity Theory, 1990

1989
Cryptographic Protection of Databases and Software.
Proceedings of the Distributed Computing And Cryptography, 1989


  Loading...