[go: up one dir, main page]

Follow
Joan Feigenbaum
Joan Feigenbaum
Grace Murray Hopper Professor of Computer Science, Yale University
Verified email at yale.edu - Homepage
Title
Cited by
Cited by
Year
Decentralized trust management
M Blaze, J Feigenbaum, J Lacy
Proceedings 1996 IEEE symposium on security and privacy, 164-173, 1996
34701996
KeyNote: Trust Management for Public-Key Infrastructures: Position Paper
M Blaze, J Feigenbaum, AD Keromytis
International Workshop on Security Protocols, 59-63, 1998
9721998
The role of trust management in distributed systems security
M Blaze, J Feigenbaum, J Ioannidis, AD Keromytis
Secure Internet programming: security issues for mobile and distributed …, 1999
7851999
The KeyNote trust-management system version 2
M Blaze, J Feigenbaum, J Ioannidis, A Keromytis
7431999
Information accountability
DJ Weitzner, H Abelson, T Berners-Lee, J Feigenbaum, J Hendler, ...
Communications of the ACM 51 (6), 82-87, 2008
6232008
Sharing the cost of muliticast transmissions (preliminary version)
J Feigenbaum, C Papadimitriou, S Shenker
Proceedings of the thirty-second annual ACM symposium on Theory of computing …, 2000
6152000
Delegation logic: A logic-based approach to distributed authorization
N Li, BN Grosof, J Feigenbaum
ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003
6122003
A BGP-based mechanism for lowest-cost routing
J Feigenbaum, C Papadimitriou, R Sami, S Shenker
Proceedings of the twenty-first annual symposium on Principles of …, 2002
5502002
Distributed algorithmic mechanism design: Recent results and future directions
J Feigenbaum, S Shenker
Current Trends in Theoretical Computer Science: The Challenge of the New …, 2004
5462004
REFEREE: Trust management for Web applications
YH Chu, J Feigenbaum, B LaMacchia, P Resnick, M Strauss
Computer Networks and ISDN systems 29 (8-13), 953-964, 1997
5071997
On graph problems in a semi-streaming model
J Feigenbaum, S Kannan, A McGregor, S Suri, J Zhang
Theoretical Computer Science 348 (2-3), 207-216, 2005
5052005
On hiding information from an oracle
M Abadi, J Feigenbaum, J Kilian
Proceedings of the nineteenth annual ACM symposium on Theory of computing …, 1987
4121987
Compliance checking in the policymaker trust management system
M Blaze, J Feigenbaum, M Strauss
International Conference on Financial Cryptography, 254-274, 1998
3961998
An approximate L 1-difference algorithm for massive data streams
J Feigenbaum, S Kannan, MJ Strauss, M Viswanathan
SIAM Journal on Computing 32 (1), 131-151, 2002
3572002
Hiding instances in multioracle queries
D Beaver, J Feigenbaum
Annual symposium on theoretical aspects of computer science, 37-48, 1990
3401990
Random-self-reducibility of complete sets
J Feigenbaum, L Fortnow
SIAM Journal on Computing 22 (5), 994-1005, 1993
2681993
Secure circuit evaluation: A protocol based on hiding information from an oracle
M Abadi, J Feigenbaum
Journal of Cryptology 2 (1), 1-12, 1990
2201990
Probabilistic analysis of onion routing in a black-box model
J Feigenbaum, A Johnson, P Syverson
ACM Transactions on Information and System Security (TISSEC) 15 (3), 1-28, 2012
1942012
A model of onion routing with provable anonymity
J Feigenbaum, A Johnson, P Syverson
International Conference on Financial Cryptography and Data Security, 57-71, 2007
1742007
System/U: a database system based on the universal relation assumption
HF Korth, GM Kuper, J Feigenbaum, A Van Gelder, JD Ullman
ACM Transactions on Database Systems (TODS) 9 (3), 331-347, 1984
1691984
The system can't perform the operation now. Try again later.
Articles 1–20