Selected Papers on Privacy, Anonymity, and Accountability




"Reuse It or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values," to appear in Proceedings of the 2014 ACM Conference on Computer and Communication Security. (by Benjamin Mood, Debayan Gupta, Kevin Butler, and Joan Feigenbaum)

"Open vs. Closed Systems for Accountability," in HotSoS '14: Proceedings of the 2014 ACM Symposium and Bootcamp on the Science of Security, Article No. 4.
(by Joan Feigenbaum, Aaron D. Jaggard, and Rebecca N. Wright)

"Approximate Privacy: Foundations and Quantification," ACM Transaction on Algorithms, Volume 10, Issue 3, Article 11 (June 2014). Extended abtract in Proc. of ACM EC'10. See also DIMACS TRs 2009-14 and 2010-01.
(by Joan Feigenbaum, Aaron D. Jaggard, and Michael Schapira)

"Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance," in Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014.
(by Aaron Segal, Bryan Ford, and Joan Feigenbaum)

"Systematizing Secure Computation for Research and Decision Support," in Proceedings of the 9th Conference on Security and Cryptography for Networks, Springer Verlag LNCS, vol. 8642, 2014, pp. 380 - 397.
(by Jason Perry, Debayan Gupta, Joan Feigenbaum, and Rebecca N. Wright)

"Representing Network Trust and Using It to Improve Anonymous Communication," in 7th Workshop on Hot Topics in Privacy Enhancing Technologies, 2014.
(by Aaron D. Jaggard, Aaron Johnson, Paul Syverson, and Joan Feigenbaum)

"On the Feasibility of a Technological Response to the Surveillance Morass," to appear in Proceedings of the 22nd International Workshop on Security Protocols, Cambridge UK, 2014.
(by Joan Feigenbaum and Jérémie Koenig)

"Is Data Hoarding Necessary for Lawful Surveillance?," The Huffington Post, April 19, 2014.
(by Joan Feigenbaum and Bryan Ford)

"Practical and Privacy-Preserving Policy Compliance for Outsourced Data," to appear in Proceedings of the 2nd Workshop on Applied Homomorphic Cryptography, 2014.
(by Giovanni Di Crescenzo, Joan Feigenbaum, Debayan Gupta, Euthimios Panagos, Jason Perry, and Rebecca N. Wright)

"Seeking Anonymity in an Internet Panopticon," http://arxiv.org/abs/1312.5307, December 2013.
(by Joan Feigenbaum and Bryan Ford)

"Structural Cloud Audits that Protect Private Information," in Proceedings of the 2013 ACM Cloud Computing Security Workshop, pp. 101-112.
(by Hongda Xiao, Bryan Ford, and Joan Feigenbaum)

"Probabilistic Analysis of Onion Routing in a Black-Box Model," in ACM Transactions on Information and System Security, Volume 15, Issue 3, Article 14 (November 2012). An earlier version appeared in the Proceedings of the 2007 Financial Crypto Conference and can be found here.
(by Joan Feigenbaum, Aaron Johnson, and Paul Syverson)

"A New Approach to Interdomain Routing Based on Secure Multi-Party Computation," in Proceedings of the 2012 ACM Workshop on Hot Topics in Networks.
(by Debayan Gupta, Aaron Segal, Aurojit Panda, Gil Segev, Michael Schapira, Joan Feigenbaum, Jennifer Rexford, and Scott Shenker)

"An Economic Analysis of User-Privacy Options in Ad-Supported Service," in Proceedings of the 2012 Workshop on Internet and Network Economics, Springer Verlag LNCS, vol. 7695, 2012, pp. 30-43.
(by Joan Feigenbaum, Michael Mitzenmacher, and Georgios Zervas)

"Systematizing 'Accountability' in Computer Science (Version of Feb. 17, 2012)," YALEU/DCS/TR-1452, Yale University, New Haven CT, February 2012.
(by Joan Feigenbaum, Aaron D. Jaggard, Rebecca N. Wright, and Hongda Xiao)

"Defining Anonymity in Networked Communication, version 1," YALEU/DCS/TR-1448, Yale University, New Haven CT, December 2011.
(by Joan Feigenbaum)

"Towards a Formal Model of Accountability," in Proceedings of the 14th New Security Paradigms Workshop, ACM Press, New York, 2011, pp. 45-56.
(by Joan Feigenbaum, Aaron D. Jaggard, and Rebecca N. Wright)

"Accountability and Deterrence in Online Life (Extended Abstract)," in Proceedings of the 3rd International Conference on Web Science, ACM Press, New York, 2011.
(by Joan Feigenbaum, James Hendler, Aaron D. Jaggard, Daniel J. Weitzner, and Rebecca N. Wright)

"Accountability as a Driver of Innovative Privacy Solutions," in Privacy and Innovation Symposium, Yale Law School Information Society Project, October 2010.
(by Joan Feigenbaum)

"Preventing Active Timing Attacks in Low-Latency Anonymous Communication (Extended Abstract)," in Proceedings of the 10th Privacy-Enhancing Technologies Symposium, Springer Verlag LNCS, vol. 6205, 2010, pp. 166-183. See also UT Austin CS Department TR 1965.
(by Joan Feigenbaum, Aaron Johnson, and Paul Syverson)

"Usability of Browser-Based Tools for Web-Search Privacy," YALEU/DCS/TR-1424, Yale University, New Haven CT, March 2010.
(by Felipe Saint-Jean and Joan Feigenbaum)

"Information Accountability," Communications of the ACM 51 (2008), pp. 82-88.
(by Daniel J. Weitzner, Hal Abelson, Tim Berners-Lee, Joan Feigenbaum, James Hendler, and Gerald Jay Sussman)

"Private Web Search," in Proceedings of the 6th Workshop on Privacy in the Electronic Society, ACM Press, New York, 2007, pp. 84-90.
(by Felipe Saint-Jean, Aaron Johnson, Dan Boneh, and Joan Feigenbaum)

"Probabilistic Analysis of Onion Routing in a Black-box Model," in Proceedings of the 6th Workshop on Privacy in the Electronic Society, ACM Press, New York, 2007, pp. 1-10.
(by Joan Feigenbaum, Aaron Johnson, and Paul Syverson)

"Towards a Theory of Data Entanglement," Theoretical Computer Science 389 (2007), pp. 26-43. Extended abstract in Proc. of ESORICS'04.
(by James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, and Sheng Zhong)

"Information Accountability," MIT-CSAIL-TR-2007-034, June 2007.
(by Daniel J. Weitzner, Hal Abelson, Tim Berners-Lee, Joan Feigenbaum, James Hendler, and Gerald Jay Sussman)

"Report on the 2006 PORTIA/TAMI Workshop on Privacy and Accountability," June 2006.
(Edited by Joan Feigenbaum and Daniel J. Weitzner)




Back to Home Page or Selected Publications of Joan Feigenbaum