Rebecca N. Wright
Rebecca N. Wright
Barnard College
Verified email at - Homepage
Cited by
Cited by
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
G Jagannathan, RN Wright
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge …, 2005
Privacy-preserving bayesian network structure computation on distributed heterogeneous data
R Wright, Z Yang
Proceedings of the tenth ACM SIGKDD international conference on Knowledge …, 2004
Probabilistic quorum systems
D Malkhi, MK Reiter, A Wool, RN Wright
Information and Computation 170 (2), 184-206, 2001
Privacy-preserving classification of customer data without loss of accuracy
Z Yang, S Zhong, RN Wright
Proceedings of the 2005 SIAM International Conference on Data Mining, 92-102, 2005
Secure multiparty computation of approximations
J Feigenbaum, Y Ishai, T Malkin, K Nissim, MJ Strauss, RN Wright
International Colloquium on Automata, Languages, and Programming, 927-938, 2001
Privacy-enhancing k-anonymization of customer data
S Zhong, Z Yang, RN Wright
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on …, 2005
A practical differentially private random decision tree classifier
G Jagannathan, K Pillaipakkamnatt, RN Wright
2009 IEEE International Conference on Data Mining Workshops, 114-121, 2009
Privacy-preserving queries on encrypted data
Z Yang, S Zhong, RN Wright
European Symposium on Research in Computer Security, 479-495, 2006
Secure communication in minimal connectivity models
M Franklin, RN Wright
Journal of Cryptology 13 (1), 9-30, 2000
Finite-state approximation of phrase-structure grammars
FCN Pereira, RN Wright
arXiv preprint cmp-lg/9603002, 1996
A New Privacy-Preserving Distributed k-Clustering Algorithm
G Jagannathan, K Pillaipakkamnatt, RN Wright
Proceedings of the 2006 SIAM international conference on data mining, 494-498, 2006
Privacy-preserving machine learning as a service.
E Hesamifard, H Takabi, M Ghasemi, RN Wright
Proc. Priv. Enhancing Technol. 2018 (3), 123-142, 2018
Dp-where: Differentially private modeling of human mobility
DJ Mir, S Isaacman, R Cáceres, M Martonosi, RN Wright
2013 IEEE international conference on big data, 580-588, 2013
From keys to databases—real-world applications of secure multi-party computation
DW Archer, D Bogdanov, Y Lindell, L Kamm, K Nielsen, JI Pagter, ...
The Computer Journal 61 (12), 1749-1771, 2018
Selective private function evaluation with applications to private statistics
R Canetti, Y Ishai, R Kumar, MK Reiter, R Rubinfeld, RN Wright
Proceedings of the twentieth annual ACM symposium on Principles of …, 2001
Anonymity-preserving data collection
Z Yang, S Zhong, RN Wright
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge …, 2005
Towards a formal model of accountability
J Feigenbaum, AD Jaggard, RN Wright
Proceedings of the 2011 New security paradigms workshop, 45-56, 2011
Privacy-preserving computation of Bayesian networks on vertically partitioned data
Z Yang, RN Wright
IEEE Transactions on Knowledge and Data Engineering 18 (9), 1253-1264, 2006
Dynamic Byzantine quorum systems
L Alvisi, D Malkhi, E Pierce, MK Reiter, RN Wright
Proceeding International Conference on Dependable Systems and Networks. DSN …, 2000
The Ω key management service
MK Reiter, MK Franklin, JB Lacy, RN Wright
Journal of Computer Security 4 (4), 267-287, 1996
The system can't perform the operation now. Try again later.
Articles 1–20