


default search action
Rebecca N. Wright
Person information
- affiliation: Barnard College, NY, USA
- affiliation (former): Rutgers University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c70]Elizabeth Melville, Melissa A. Wright, Jennifer Rosales, Saima Akhtar, Rebecca N. Wright:
Improving Undergraduate Computing Engagement with Computing Fellows Across Disciplines. SIGCSE (1) 2025: 763-769 - 2024
- [c69]Jennifer Rosales
, Elizabeth Melville
, Melissa A. Wright
, Saima Akhtar
, Rebecca N. Wright
:
The Experience of Near-Peer Computing Mentors: Strengthening and Expanding Women's Computing Identities in Undergraduate Interdisciplinary Contexts. SIGCSE (1) 2024: 1154-1160 - 2023
- [c68]Jennifer Rosales
, Elizabeth Melville
, Melissa A. Wright
, Saima Akhtar
, Zoë Webb-Mack
, Rebecca N. Wright
:
Computing Fellows across Disciplines: Preliminary Results. SIGCSE (2) 2023: 1310 - 2020
- [j22]Joan Feigenbaum, Aaron D. Jaggard, Rebecca N. Wright:
Accountability in Computing: Concepts and Mechanisms. Found. Trends Priv. Secur. 2(4): 247-399 (2020) - [j21]Daniel M. Bittner, Alejandro E. Brito, Mohsen Ghassemi, Shantanu Rane, Anand D. Sarwate, Rebecca N. Wright:
Understanding Privacy-Utility Tradeoffs in Differentially Private Online Active Learning. J. Priv. Confidentiality 10(2) (2020)
2010 – 2019
- 2019
- [c67]Rebecca N. Wright, Sally J. Nadler, Thu D. Nguyen, Cynthia N. Sanchez Gomez, Heather M. Wright:
Living-Learning Community for Women in Computer Science at Rutgers. SIGCSE 2019: 286-292 - 2018
- [j20]David W. Archer, Dan Bogdanov, Yehuda Lindell
, Liina Kamm
, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright:
From Keys to Databases - Real-World Applications of Secure Multi-Party Computation. Comput. J. 61(12): 1749-1771 (2018) - [j19]Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi
, Rebecca N. Wright:
Privacy-preserving Machine Learning as a Service. Proc. Priv. Enhancing Technol. 2018(3): 123-142 (2018) - [c66]Daniel M. Bittner, Anand D. Sarwate
, Rebecca N. Wright:
Using Noisy Binary Search for Differentially Private Anomaly Detection. CSCML 2018: 20-37 - [c65]Rebecca N. Wright, Jane Stout, Geraldine Cochran
, Thu D. Nguyen, Cynthia Sanchez Gomez:
Computer Science Living-Learning Community for Women at Rutgers: Initial Experiences and Outcomes (Abstract Only). SIGCSE 2018: 1075 - [i9]David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright:
From Keys to Databases - Real-World Applications of Secure Multi-Party Computation. IACR Cryptol. ePrint Arch. 2018: 450 (2018) - 2017
- [j18]Aaron D. Jaggard
, Neil Lutz, Michael Schapira, Rebecca N. Wright:
Dynamics at the Boundary of Game Theory and Distributed Computing. ACM Trans. Economics and Comput. 5(3): 15:1-15:20 (2017) - [c64]Daniel M. Bittner, Anand D. Sarwate
, Rebecca N. Wright:
Differentially Private Noisy Search with Applications to Anomaly Detection (Abstract). AISec@CCS 2017: 53 - 2016
- [c63]Mohsen Ghassemi, Anand D. Sarwate
, Rebecca N. Wright:
Differentially Private Online Active Learning with Applications to Anomaly Detection. AISec@CCS 2016: 117-128 - 2015
- [i8]Aaron D. Jaggard, Neil Lutz, Michael Schapira, Rebecca N. Wright:
Dynamics at the Boundary of Game Theory and Distributed Computing. CoRR abs/1509.02955 (2015) - 2014
- [c62]Giovanni Di Crescenzo, Joan Feigenbaum, Debayan Gupta
, Euthimios Panagos, Jason Perry, Rebecca N. Wright:
Practical and Privacy-Preserving Policy Compliance for Outsourced Data. Financial Cryptography Workshops 2014: 181-194 - [c61]Joan Feigenbaum, Aaron D. Jaggard
, Rebecca N. Wright:
Open vs. closed systems for accountability. HotSoS 2014: 4 - [c60]Aaron D. Jaggard
, Neil Lutz, Michael Schapira, Rebecca N. Wright:
Self-stabilizing Uncoupled Dynamics. SAGT 2014: 74-85 - [c59]Jason Perry, Debayan Gupta
, Joan Feigenbaum, Rebecca N. Wright:
Systematizing Secure Computation for Research and Decision Support. SCN 2014: 380-397 - [c58]Aaron D. Jaggard
, Rebecca N. Wright:
Strange Bedfellows: How and When to Work with Your Enemy. Security Protocols Workshop 2014: 263-267 - [c57]Rebecca N. Wright:
Strange Bedfellows: How and When to Work with Your Enemy (Transcript of Discussion). Security Protocols Workshop 2014: 268-275 - [i7]Aaron D. Jaggard, Neil Lutz, Michael Schapira, Rebecca N. Wright:
Self-stabilizing uncoupled dynamics. CoRR abs/1403.5791 (2014) - 2013
- [c56]Darakhshan J. Mir, Sibren Isaacman
, Ramón Cáceres, Margaret Martonosi, Rebecca N. Wright:
DP-WHERE: Differentially private modeling of human mobility. IEEE BigData 2013: 580-588 - [c55]Giovanni Di Crescenzo, Brian A. Coan, John L. Schultz, Simon Tsang, Rebecca N. Wright:
Privacy-Preserving Publish/Subscribe: Efficient Protocols in a Distributed Model. DPM/SETOP 2013: 114-132 - [c54]Giovanni Di Crescenzo, Jim Burns, Brian A. Coan, John L. Schultz, Jonathan Robert Stanton, Simon Tsang, Rebecca N. Wright:
Efficient and Private Three-Party Publish/Subscribe. NSS 2013: 278-292 - [c53]Aaron D. Jaggard
, Swara Kopparty, Vijay Ramachandran, Rebecca N. Wright:
The design space of probing algorithms for network-performance measurement. SIGMETRICS 2013: 105-116 - 2012
- [j17]Geetha Jagannathan, Krishnan Pillaipakkamnatt, Rebecca N. Wright:
A Practical Differentially Private Random Decision Tree Classifier. Trans. Data Priv. 5(1): 273-295 (2012) - [c52]Darakhshan J. Mir, Rebecca N. Wright:
A differentially private estimator for the stochastic Kronecker graph model. EDBT/ICDT Workshops 2012: 167-176 - [i6]Jan Camenisch, Mark Manulis, Gene Tsudik, Rebecca N. Wright:
Privacy-Oriented Cryptography (Dagstuhl Seminar 12381). Dagstuhl Reports 2(9): 165-183 (2012) - 2011
- [c51]Aaron D. Jaggard, Michael Schapira, Rebecca N. Wright:
Distributed Computing with Adaptive Heuristics. ICS 2011: 417-443 - [c50]Joan Feigenbaum, Aaron D. Jaggard
, Rebecca N. Wright:
Towards a formal model of accountability. NSPW 2011: 45-56 - [c49]Aaron D. Jaggard
, Michael Schapira, Rebecca N. Wright:
Distributed computing with rules of thumb. PODC 2011: 333-334 - [c48]Darakhshan J. Mir, S. Muthukrishnan, Aleksandar Nikolov, Rebecca N. Wright:
Pan-private algorithms via statistics on sketches. PODS 2011: 37-48 - [c47]Joan Feigenbaum, James A. Hendler
, Aaron D. Jaggard
, Daniel J. Weitzner, Rebecca N. Wright:
Accountability and deterrence in online life. WebSci 2011: 7:1-7:7 - 2010
- [j16]Geetha Jagannathan, Krishnan Pillaipakkamnatt, Rebecca N. Wright, Daryl Umano:
Communication-Efficient Privacy-Preserving Clustering. Trans. Data Priv. 3(1): 1-25 (2010) - [e4]Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi:
Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6467, Springer 2010, ISBN 978-3-642-17618-0 [contents] - [i5]Darakhshan J. Mir, S. Muthukrishnan, Aleksandar Nikolov, Rebecca N. Wright:
Pan-private Algorithms: When Memory Does Not Help. CoRR abs/1009.1544 (2010)
2000 – 2009
- 2009
- [j15]Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright:
Private multiparty sampling and approximation of vector combinations. Theor. Comput. Sci. 410(18): 1730-1745 (2009) - [c46]Jun Sakuma, Rebecca N. Wright:
Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection. ACML 2009: 338-353 - [c45]Aaron D. Jaggard
, Vijay Ramachandran, Rebecca N. Wright:
The Impact of Communication Models on Routing-Algorithm Convergence. ICDCS 2009: 58-67 - [c44]Geetha Jagannathan, Krishnan Pillaipakkamnatt, Rebecca N. Wright:
A Practical Differentially Private Random Decision Tree Classifier. ICDM Workshops 2009: 114-121 - [c43]Darakhshan J. Mir, Rebecca N. Wright:
A Differentially Private Graph Estimator. ICDM Workshops 2009: 122-129 - [c42]Jeff Jonas, William E. Winkler, Rebecca N. Wright:
Interstate Voter Registration Database Matching: The Oregon-Washington 2008 Pilot Project. EVT/WOTE 2009 - [i4]Aaron D. Jaggard, Michael Schapira, Rebecca N. Wright:
Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond. CoRR abs/0910.1585 (2009) - 2008
- [j14]Geetha Jagannathan, Rebecca N. Wright:
Privacy-preserving imputation of missing data. Data Knowl. Eng. 65(1): 40-56 (2008) - [j13]Rebecca N. Wright, Sabrina De Capitani di Vimercati
:
Guest Editorial: Special Issue on Computer and Communications Security. ACM Trans. Inf. Syst. Secur. 12(2): 7:1-7:2 (2008) - [c41]Jun Sakuma, Shigenobu Kobayashi, Rebecca N. Wright:
Privacy-preserving reinforcement learning. ICML 2008: 864-871 - [c40]Sharon Goldberg, Shai Halevi, Aaron D. Jaggard
, Vijay Ramachandran, Rebecca N. Wright:
Rationality and traffic attraction: incentives for honest path announcements in bgp. SIGCOMM 2008: 267-278 - 2007
- [c39]Yuval Ishai, Tal Malkin, Martin J. Strauss, Rebecca N. Wright:
Private Multiparty Sampling and Approximation of Vector Combinations. ICALP 2007: 243-254 - [c38]Geetha Jagannathan, Rebecca N. Wright:
Private Inference Control for Aggregate Database Queries. ICDM Workshops 2007: 711-716 - [c37]Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:
Towards Privacy-Preserving Model Selection. PinKDD 2007: 138-152 - 2006
- [j12]Zhiqiang Yang, Rebecca N. Wright, Hiranmayee Subramaniam:
Experimental analysis of a privacy-preserving scalar product protocol. Comput. Syst. Sci. Eng. 21(1) (2006) - [j11]Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright:
Secure multiparty computation of approximations. ACM Trans. Algorithms 2(3): 435-472 (2006) - [j10]Zhiqiang Yang, Rebecca N. Wright:
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data. IEEE Trans. Knowl. Data Eng. 18(9): 1253-1264 (2006) - [c36]Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:
Privacy-Preserving Queries on Encrypted Data. ESORICS 2006: 479-495 - [c35]Geetha Jagannathan, Rebecca N. Wright:
Privacy-Preserving Data Imputation. ICDM Workshops 2006: 535-540 - [c34]Michael de Mare, Rebecca N. Wright:
Secure Set Membership Using 3Sat. ICICS 2006: 452-468 - [c33]Geetha Jagannathan, Krishnan Pillaipakkamnatt, Rebecca N. Wright:
A New Privacy-Preserving Distributed k-Clustering Algorithm. SDM 2006: 494-498 - [e3]Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati:
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006. ACM 2006 [contents] - 2005
- [j9]Noga Alon, Michael Merritt, Omer Reingold, Gadi Taubenfeld, Rebecca N. Wright:
Tight bounds for shared memory systems accessed by Byzantine processes. Distributed Comput. 18(2): 99-109 (2005) - [c32]Zhiqiang Yang, Rebecca N. Wright:
Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data. ICDE Workshops 2005: 1196 - [c31]Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:
Anonymity-preserving data collection. KDD 2005: 334-343 - [c30]Geetha Jagannathan, Rebecca N. Wright:
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. KDD 2005: 593-599 - [c29]Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong:
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results. MADNES 2005: 67-79 - [c28]Sheng Zhong, Zhiqiang Yang, Rebecca N. Wright:
Privacy-enhancing k-anonymization of customer data. PODS 2005: 139-147 - [c27]Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:
Privacy-Preserving Classification of Customer Data without Loss of Accuracy. SDM 2005: 92-102 - 2004
- [j8]Dan Boneh, Joan Feigenbaum, Abraham Silberschatz, Rebecca N. Wright:
PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment. IEEE Data Eng. Bull. 27(1): 10-18 (2004) - [c26]Rebecca N. Wright, Zhiqiang Yang:
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. KDD 2004: 713-718 - [c25]Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang:
Experimental Analysis of Privacy-Preserving Statistics Computation. Secure Data Management 2004: 55-66 - [c24]Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac:
Accountable Privacy. Security Protocols Workshop 2004: 83-95 - [c23]Rebecca N. Wright:
Accountable Privacy (Transcript of Discussion). Security Protocols Workshop 2004: 96-105 - 2003
- [c22]Rebecca N. Wright:
Fischer's cryptographic protocols. PODC 2003: 20-22 - [e2]Rebecca N. Wright:
Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers. Lecture Notes in Computer Science 2742, Springer 2003, ISBN 3-540-40663-8 [contents] - 2002
- [j7]Rebecca N. Wright, Sara Spalding:
Experimental Performance of Shared RSA Modulus Generation. Algorithmica 33(1): 89-103 (2002) - [j6]Stuart G. Stubblebine, Rebecca N. Wright:
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. IEEE Trans. Software Eng. 28(3): 256-285 (2002) - [c21]Rebecca N. Wright, L. Jean Camp, Ian Goldberg, Ronald L. Rivest, Graham Wood:
Privacy Tradeoffs: Myth or Reality? Panel. Financial Cryptography 2002: 147-151 - [c20]Michael Merritt, Omer Reingold, Gadi Taubenfeld, Rebecca N. Wright:
Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes. DISC 2002: 222-236 - 2001
- [j5]Dahlia Malkhi, Michael K. Reiter, Avishai Wool
, Rebecca N. Wright:
Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001) - [j4]Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen:
Depender Graphs: A Method of Fault-Tolerant Certificate Distribution. J. Comput. Secur. 9(4): 323-338 (2001) - [c19]Aviel D. Rubin, Rebecca N. Wright:
Off-Line Generation of Limited-Use Credit Card Numbers. Financial Cryptography 2001: 187-200 - [c18]Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright:
Secure Multiparty Computation of Approximations. ICALP 2001: 927-938 - [c17]Ran Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright:
Selective private function evaluation with applications to private statistics. PODC 2001: 293-304 - [i3]Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, Rebecca N. Wright:
Secure Multiparty Computation of Approximations. IACR Cryptol. ePrint Arch. 2001: 24 (2001) - 2000
- [j3]Matthew K. Franklin, Rebecca N. Wright:
Secure Communication in Minimal Connectivity Models. J. Cryptol. 13(1): 9-30 (2000) - [c16]Rebecca N. Wright, Patrick Lincoln, Jonathan K. Millen:
Efficient fault-tolerant certificate revocation. CCS 2000: 19-24 - [c15]Lorrie Faith Cranor
, Rebecca N. Wright:
Influencing software usage. CFP 2000: 45-55 - [c14]Rebecca N. Wright:
Obstacles to freedom and privacy by design. CFP 2000: 97-100 - [c13]Jonathan K. Millen, Rebecca N. Wright:
Reasoning about Trust and Insurance in a Public Key Infrastructure. CSFW 2000: 16-22 - [c12]Lorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright:
Dynamic Byzantine Quorum Systems. DSN 2000: 283-292
1990 – 1999
- 1999
- [c11]Rebecca N. Wright, Sara Spalding:
Experimental Performance of Shared RSA Modulus Generation. SODA 1999: 983-984 - 1998
- [c10]Matthew K. Franklin, Rebecca N. Wright:
Secure Communications in Minimal Connectivity Models. EUROCRYPT 1998: 346-360 - [c9]Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright:
Probabilistic Byzantine Quorum Systems. PODC 1998: 321 - [e1]Rebecca N. Wright, Peter G. Neumann:
Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996. DIMACS Series in Discrete Mathematics and Theoretical Computer Science 38, DIMACS/AMS 1998, ISBN 978-0-8218-0832-0 [contents] - [i2]Lorrie Faith Cranor, Rebecca N. Wright:
Influencing Software Usage. CoRR cs.CY/9809018 (1998) - 1997
- [c8]Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright:
Probabilistic Quorum Systems. PODC 1997: 267-273 - 1996
- [j2]Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
The Omega Key Management Service. J. Comput. Secur. 4(4): 267-288 (1996) - [j1]Michael J. Fischer, Rebecca N. Wright:
Bounds on Secret Key Exchange Using a Random Deal of Cards. J. Cryptol. 9(2): 71-99 (1996) - [c7]Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
The Omega Key Management Service. CCS 1996: 38-47 - [c6]Stuart G. Stubblebine, Rebecca N. Wright:
An Authentication Logic Supporting Synchronization, Revocation, and Recency. CCS 1996: 95-105 - [i1]Fernando C. N. Pereira, Rebecca N. Wright:
Finite-State Approximation of Phrase-Structure Grammars. CoRR cmp-lg/9603002 (1996) - 1993
- [c5]Michael J. Fischer, Rebecca N. Wright:
An Efficient Protocol for Unconditionally Secure Secret Key Exchange. SODA 1993: 475-483 - 1991
- [c4]Fernando C. N. Pereira, Rebecca N. Wright:
Finite-State Approximation of Phrase Structure Grammars. ACL 1991: 246-255 - [c3]Michael J. Fischer, Rebecca N. Wright:
Multiparty Secret Key Exchange Using a Random Deal of Cards. CRYPTO 1991: 141-155 - 1990
- [c2]Michael J. Fischer, Rebecca N. Wright:
An Application of Game-Theoretic Techniques to Cryptography. Advances In Computational Complexity Theory 1990: 99-118
1980 – 1989
- 1989
- [c1]Joan Feigenbaum, Mark Y. Liberman, Rebecca N. Wright:
Cryptographic Protection of Databases and Software. Distributed Computing And Cryptography 1989: 161-172
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-21 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint