Selected Papers on Privacy, Anonymity, and Accountability




Accountability in Computing: Concepts and Mechanisms, Foundations and Trends in Privacy and Security 2(4), 2020, pp. 247 - 399.
(by Joan Feigenbaum, Aaron D. Jaggard, and Rebecca N. Wright)

"PRShare: A Framework for Privacy-Preserving, Interorganizational Data Sharing," to appear in ACM Transactions on Privacy and Security. An earlier version appeared in the Proceedings of the 2020 ACM Workshop on Privacy in the Electronic Society and can be found here.
(by Lihi Idan and Joan Feigenbaum)

"Encryption and Surveillance: Why the law-enforcement access question will not just go away," Communications of the ACM 62:5 (May 2019), pp. 27 - 29.
(by Joan Feigenbaum)

"On the incommensurability of laws and technical mechanisms: Or, what cryptography can't do," in Proceedings of the 26th International Workshop on Security Protocols, Lecture Notes in Computer Science, volume 11286, Springer, 2018, pp. 266 - 279.
(by Joan Feigenbaum and Daniel J. Weitzner)

"Multiple Objectives of Lawful-Surveillance Protocols," in Proceedings of the 25th International Workshop on Security Protocols, Lecture Notes in Computer Science, volume 10476, Springer, 2017, pp. 1 - 8.
(by Joan Feigenbaum and Bryan Ford)

"Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection," in Proceedings of the 24th Network and Distributed System Security Symposium, 2017.
(by Aaron Johnson, Rob Jansen, Aaron D. Jaggard, Joan Feigenbaum, and Paul Syverson.)

"PriFi: Low-Latency Anonymity for Organizational Networks," Proceedings on Privacy-Enhancing Technologies 2020(4) : 24 - 47. An earlier version appeared in the Proceedings of the 2016 ACM Workshop on Privacy in the Electronic Society and can be found here.
(by Ludovic Barman, Mahdi Zamani, Italo Dacosta, Joan Feigenbaum, Bryan Ford, Jean-Pierre Hubaux, and David Wolinsky.)

"Privacy-Preserving Lawful Contact Chaining (Preliminary Report)," in Proceedings of the 15th ACM Workshop on Privacy in the Electronic Society, 2016, pp. 185 - 188.
(by Aaron Segal, Joan Feigenbaum, and Bryan Ford.)

"Open, privacy-preserving protocols for lawful surveillance," http://arxiv.org/abs/1607.03659. Also available as YALEU/DCS/TR1526.
(by Aaron Segal, Joan Feigenbaum, and Bryan Ford.)

"Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation," in Proceedings of the 2016 FC Workshop on Encrypted Computing and Applied Homomorphic Cryptography, Springer Verlag LNCS, vol. 9604, 2016, pp. 302 - 318.
(by Debayan Gupta, Benjamin Mood, Joan Feigenbaum, Kevin Butler, and Patrick Traynor)

"On the use of security and privacy technology as a plot device," in Proceedings of the 23rd International Workshop on Security Protocols, Springer Verlag LNCS, vol. 9379, 2015, pp. 261 - 275.
(by Joan Feigenbaum and Brad Rosen)

"20,000 in League Under the Sea: Anonymous Communication, Trust, MLATs, and Undersea Cables," Proceedings on Privacy Enhancing Technologies, Volume 1, Issue 1, pp. 4-24 (April 2015).
(by Aaron D. Jaggard, Aaron Johnson, Sarah Cortes, Paul Syverson, and Joan Feigenbaum)

"Seeking Anonymity in an Internet Panopticon," Communications of the ACM 58:10 (Oct 2015), pp. 58-69.
(by Joan Feigenbaum and Bryan Ford)

"Reuse It or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values," in Proceedings of the 2014 ACM Conference on Computer and Communication Security, pp. 582 - 596.
(by Benjamin Mood, Debayan Gupta, Kevin Butler, and Joan Feigenbaum)

"Open vs. Closed Systems for Accountability," in HotSoS '14: Proceedings of the 2014 ACM Symposium and Bootcamp on the Science of Security, Article No. 4.
(by Joan Feigenbaum, Aaron D. Jaggard, and Rebecca N. Wright)

"Approximate Privacy: Foundations and Quantification," ACM Transaction on Algorithms, Volume 10, Issue 3, Article 11 (June 2014). Extended abtract in Proc. of ACM EC'10. See also DIMACS TRs 2009-14 and 2010-01.
(by Joan Feigenbaum, Aaron D. Jaggard, and Michael Schapira)

"Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance," in Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014.
(by Aaron Segal, Bryan Ford, and Joan Feigenbaum)

"Systematizing Secure Computation for Research and Decision Support," in Proceedings of the 9th Conference on Security and Cryptography for Networks, Springer Verlag LNCS, vol. 8642, 2014, pp. 380 - 397.
(by Jason Perry, Debayan Gupta, Joan Feigenbaum, and Rebecca N. Wright)

"Representing Network Trust and Using It to Improve Anonymous Communication," in 7th Workshop on Hot Topics in Privacy Enhancing Technologies, 2014.
(by Aaron D. Jaggard, Aaron Johnson, Paul Syverson, and Joan Feigenbaum)

"On the Feasibility of a Technological Response to the Surveillance Morass," in Proceedings of the 22nd International Workshop on Security Protocols, Springer Verlag LNCS, vol. 8809, 2014, pp. 239 - 252.
(by Joan Feigenbaum and Jérémie Koenig)

"Is Data Hoarding Necessary for Lawful Surveillance?," The Huffington Post, April 19, 2014.
(by Joan Feigenbaum and Bryan Ford)

"Practical and Privacy-Preserving Policy Compliance for Outsourced Data," in Proceedings of the 2nd Workshop on Applied Homomorphic Cryptography, FC 2014 Workshops, Springer Verlag LNCS, vol. 8438, 2014, pp. 181-194.
(by Giovanni Di Crescenzo, Joan Feigenbaum, Debayan Gupta, Euthimios Panagos, Jason Perry, and Rebecca N. Wright)

"Structural Cloud Audits that Protect Private Information," in Proceedings of the 2013 ACM Cloud Computing Security Workshop, pp. 101-112.
(by Hongda Xiao, Bryan Ford, and Joan Feigenbaum)

"Probabilistic Analysis of Onion Routing in a Black-Box Model," in ACM Transactions on Information and System Security, Volume 15, Issue 3, Article 14 (November 2012). An earlier version appeared in the Proceedings of the 2007 Financial Crypto Conference and can be found here.
(by Joan Feigenbaum, Aaron Johnson, and Paul Syverson)

"A New Approach to Interdomain Routing Based on Secure Multi-Party Computation," in Proceedings of the 2012 ACM Workshop on Hot Topics in Networks.
(by Debayan Gupta, Aaron Segal, Aurojit Panda, Gil Segev, Michael Schapira, Joan Feigenbaum, Jennifer Rexford, and Scott Shenker)

"An Economic Analysis of User-Privacy Options in Ad-Supported Service," in Proceedings of the 2012 Workshop on Internet and Network Economics, Springer Verlag LNCS, vol. 7695, 2012, pp. 30-43.
(by Joan Feigenbaum, Michael Mitzenmacher, and Georgios Zervas)

"Systematizing 'Accountability' in Computer Science (Version of Feb. 17, 2012)," YALEU/DCS/TR-1452, Yale University, New Haven CT, February 2012.
(by Joan Feigenbaum, Aaron D. Jaggard, Rebecca N. Wright, and Hongda Xiao)

"Defining Anonymity in Networked Communication, version 1," YALEU/DCS/TR-1448, Yale University, New Haven CT, December 2011.
(by Joan Feigenbaum)

"Towards a Formal Model of Accountability," in Proceedings of the 14th New Security Paradigms Workshop, ACM Press, New York, 2011, pp. 45-56.
(by Joan Feigenbaum, Aaron D. Jaggard, and Rebecca N. Wright)

"Accountability and Deterrence in Online Life (Extended Abstract)," in Proceedings of the 3rd International Conference on Web Science, ACM Press, New York, 2011.
(by Joan Feigenbaum, James Hendler, Aaron D. Jaggard, Daniel J. Weitzner, and Rebecca N. Wright)

"Accountability as a Driver of Innovative Privacy Solutions," in Privacy and Innovation Symposium, Yale Law School Information Society Project, October 2010.
(by Joan Feigenbaum)

"Preventing Active Timing Attacks in Low-Latency Anonymous Communication (Extended Abstract)," in Proceedings of the 10th Privacy-Enhancing Technologies Symposium, Springer Verlag LNCS, vol. 6205, 2010, pp. 166-183. See also UT Austin CS Department TR 1965.
(by Joan Feigenbaum, Aaron Johnson, and Paul Syverson)

"Usability of Browser-Based Tools for Web-Search Privacy," YALEU/DCS/TR-1424, Yale University, New Haven CT, March 2010.
(by Felipe Saint-Jean and Joan Feigenbaum)

"Information Accountability," Communications of the ACM 51:6 (June 2008), pp. 82-88.
(by Daniel J. Weitzner, Hal Abelson, Tim Berners-Lee, Joan Feigenbaum, James Hendler, and Gerald Jay Sussman)

"Private Web Search," in Proceedings of the 6th Workshop on Privacy in the Electronic Society, ACM Press, New York, 2007, pp. 84-90.
(by Felipe Saint-Jean, Aaron Johnson, Dan Boneh, and Joan Feigenbaum)

"Probabilistic Analysis of Onion Routing in a Black-box Model," in Proceedings of the 6th Workshop on Privacy in the Electronic Society, ACM Press, New York, 2007, pp. 1-10.
(by Joan Feigenbaum, Aaron Johnson, and Paul Syverson)

"Towards a Theory of Data Entanglement," Theoretical Computer Science 389 (2007), pp. 26-43. Extended abstract in Proc. of ESORICS'04.
(by James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, and Sheng Zhong)

"Information Accountability," MIT-CSAIL-TR-2007-034, June 2007.
(by Daniel J. Weitzner, Hal Abelson, Tim Berners-Lee, Joan Feigenbaum, James Hendler, and Gerald Jay Sussman)

"Report on the 2006 PORTIA/TAMI Workshop on Privacy and Accountability," June 2006.
(Edited by Joan Feigenbaum and Daniel J. Weitzner)




Back to Home Page or Selected Publications of Joan Feigenbaum