BibTeX records: Joan Feigenbaum

download as .bib file

@inproceedings{DBLP:conf/fc/GuptaMFBT16,
  author    = {Debayan Gupta and
               Benjamin Mood and
               Joan Feigenbaum and
               Kevin R. B. Butler and
               Patrick Traynor},
  title     = {Using Intel Software Guard Extensions for Efficient Two-Party Secure
               Function Evaluation},
  booktitle = {Financial Cryptography and Data Security - {FC} 2016 International
               Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
               26, 2016, Revised Selected Papers},
  pages     = {302--318},
  year      = {2016},
  crossref  = {DBLP:conf/fc/2016w},
  url       = {https://doi.org/10.1007/978-3-662-53357-4_20},
  doi       = {10.1007/978-3-662-53357-4_20},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/GuptaMFBT16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BarmanZDFFHW16,
  author    = {Ludovic Barman and
               Mahdi Zamani and
               Italo Dacosta and
               Joan Feigenbaum and
               Bryan Ford and
               Jean{-}Pierre Hubaux and
               David Wolinsky},
  title     = {PriFi: {A} Low-Latency and Tracking-Resistant Protocol for Local-Area
               Anonymous Communication},
  booktitle = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
               Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  pages     = {181--184},
  year      = {2016},
  crossref  = {DBLP:conf/wpes/2016},
  url       = {http://dl.acm.org/citation.cfm?id=2994623},
  timestamp = {Mon, 06 Mar 2017 08:12:38 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wpes/BarmanZDFFHW16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wpes/SegalFF16,
  author    = {Aaron Segal and
               Joan Feigenbaum and
               Bryan Ford},
  title     = {Privacy-Preserving Lawful Contact Chaining: [Preliminary Report]},
  booktitle = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
               Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  pages     = {185--188},
  year      = {2016},
  crossref  = {DBLP:conf/wpes/2016},
  url       = {http://dl.acm.org/citation.cfm?id=2994628},
  timestamp = {Mon, 06 Mar 2017 08:12:38 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wpes/SegalFF16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/SegalFF16,
  author    = {Aaron Segal and
               Joan Feigenbaum and
               Bryan Ford},
  title     = {Open, privacy-preserving protocols for lawful surveillance},
  journal   = {CoRR},
  volume    = {abs/1607.03659},
  year      = {2016},
  url       = {http://arxiv.org/abs/1607.03659},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/SegalFF16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/FeigenbaumF15,
  author    = {Joan Feigenbaum and
               Bryan Ford},
  title     = {Seeking anonymity in an internet panopticon},
  journal   = {Commun. {ACM}},
  volume    = {58},
  number    = {10},
  pages     = {58--69},
  year      = {2015},
  url       = {http://doi.acm.org/10.1145/2714561},
  doi       = {10.1145/2714561},
  timestamp = {Wed, 28 Oct 2015 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cacm/FeigenbaumF15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/popets/JaggardJCSF15,
  author    = {Aaron D. Jaggard and
               Aaron Johnson and
               Sarah Cortes and
               Paul Syverson and
               Joan Feigenbaum},
  title     = {20, 000 In League Under the Sea: Anonymous Communication, Trust, MLATs,
               and Undersea Cables},
  journal   = {PoPETs},
  volume    = {2015},
  number    = {1},
  pages     = {4--24},
  year      = {2015},
  url       = {http://www.degruyter.com/view/j/popets.2015.1.issue-1/popets-2015-0002/popets-2015-0002.xml},
  timestamp = {Fri, 30 Oct 2015 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/popets/JaggardJCSF15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/FeigenbaumR15,
  author    = {Joan Feigenbaum and
               Brad Rosen},
  title     = {On the Use of Security and Privacy Technology as a Plot Device},
  booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
               UK, March 31 - April 2, 2015, Revised Selected Papers},
  pages     = {261--275},
  year      = {2015},
  crossref  = {DBLP:conf/spw/2015},
  url       = {https://doi.org/10.1007/978-3-319-26096-9_27},
  doi       = {10.1007/978-3-319-26096-9_27},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/FeigenbaumR15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/Feigenbaum15,
  author    = {Joan Feigenbaum},
  title     = {On the Use of Security and Privacy Technology as a Plot Device (Transcript
               of Discussion)},
  booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
               UK, March 31 - April 2, 2015, Revised Selected Papers},
  pages     = {276--282},
  year      = {2015},
  crossref  = {DBLP:conf/spw/2015},
  url       = {https://doi.org/10.1007/978-3-319-26096-9_28},
  doi       = {10.1007/978-3-319-26096-9_28},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/Feigenbaum15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/MoodGBF15,
  author    = {Benjamin Mood and
               Debayan Gupta and
               Kevin R. B. Butler and
               Joan Feigenbaum},
  title     = {Reuse It Or Lose It: More Efficient Secure Computation Through Reuse
               of Encrypted Values},
  journal   = {CoRR},
  volume    = {abs/1506.02954},
  year      = {2015},
  url       = {http://arxiv.org/abs/1506.02954},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/MoodGBF15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/JohnsonJJFS15,
  author    = {Aaron Johnson and
               Rob Jansen and
               Aaron D. Jaggard and
               Joan Feigenbaum and
               Paul F. Syverson},
  title     = {Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware
               Path Selection},
  journal   = {CoRR},
  volume    = {abs/1511.05453},
  year      = {2015},
  url       = {http://arxiv.org/abs/1511.05453},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/JohnsonJJFS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/talg/FeigenbaumJS14,
  author    = {Joan Feigenbaum and
               Aaron D. Jaggard and
               Michael Schapira},
  title     = {Approximate Privacy: Foundations and Quantification},
  journal   = {{ACM} Trans. Algorithms},
  volume    = {10},
  number    = {3},
  pages     = {11:1--11:38},
  year      = {2014},
  url       = {http://doi.acm.org/10.1145/2601067},
  doi       = {10.1145/2601067},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/talg/FeigenbaumJS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MoodGBF14,
  author    = {Benjamin Mood and
               Debayan Gupta and
               Kevin R. B. Butler and
               Joan Feigenbaum},
  title     = {Reuse It Or Lose It: More Efficient Secure Computation Through Reuse
               of Encrypted Values},
  booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages     = {582--596},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014},
  url       = {http://doi.acm.org/10.1145/2660267.2660285},
  doi       = {10.1145/2660267.2660285},
  timestamp = {Thu, 01 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/MoodGBF14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/CrescenzoFGPPW14,
  author    = {Giovanni Di Crescenzo and
               Joan Feigenbaum and
               Debayan Gupta and
               Euthimios Panagos and
               Jason Perry and
               Rebecca N. Wright},
  title     = {Practical and Privacy-Preserving Policy Compliance for Outsourced
               Data},
  booktitle = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
               and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
               Papers},
  pages     = {181--194},
  year      = {2014},
  crossref  = {DBLP:conf/fc/2014w},
  url       = {https://doi.org/10.1007/978-3-662-44774-1_15},
  doi       = {10.1007/978-3-662-44774-1_15},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/CrescenzoFGPPW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/FeigenbaumJW14,
  author    = {Joan Feigenbaum and
               Aaron D. Jaggard and
               Rebecca N. Wright},
  title     = {Open vs. closed systems for accountability},
  booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
               HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages     = {4},
  year      = {2014},
  crossref  = {DBLP:conf/hotsos/2014},
  url       = {http://doi.acm.org/10.1145/2600176.2600179},
  doi       = {10.1145/2600176.2600179},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/hotsos/FeigenbaumJW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/scn/PerryGFW14,
  author    = {Jason Perry and
               Debayan Gupta and
               Joan Feigenbaum and
               Rebecca N. Wright},
  title     = {Systematizing Secure Computation for Research and Decision Support},
  booktitle = {Security and Cryptography for Networks - 9th International Conference,
               {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  pages     = {380--397},
  year      = {2014},
  crossref  = {DBLP:conf/scn/2014},
  url       = {https://doi.org/10.1007/978-3-319-10879-7_22},
  doi       = {10.1007/978-3-319-10879-7_22},
  timestamp = {Sat, 16 Sep 2017 12:10:18 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/scn/PerryGFW14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/FeigenbaumK14,
  author    = {Joan Feigenbaum and
               J{\'{e}}r{\'{e}}mie Koenig},
  title     = {On the Feasibility of a Technological Response to the Surveillance
               Morass},
  booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
               UK, March 19-21, 2014 Revised Selected Papers},
  pages     = {239--252},
  year      = {2014},
  crossref  = {DBLP:conf/spw/2014},
  url       = {https://doi.org/10.1007/978-3-319-12400-1_23},
  doi       = {10.1007/978-3-319-12400-1_23},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/FeigenbaumK14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/FeigenbaumK14a,
  author    = {Joan Feigenbaum and
               J{\'{e}}r{\'{e}}mie Koenig},
  title     = {On the Feasibility of a Technological Response to the Surveillance
               Morass (Transcript of Discussion)},
  booktitle = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
               UK, March 19-21, 2014 Revised Selected Papers},
  pages     = {253--262},
  year      = {2014},
  crossref  = {DBLP:conf/spw/2014},
  url       = {https://doi.org/10.1007/978-3-319-12400-1_24},
  doi       = {10.1007/978-3-319-12400-1_24},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/FeigenbaumK14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/SegalFF14,
  author    = {Aaron Segal and
               Bryan Ford and
               Joan Feigenbaum},
  title     = {Catching Bandits and Only Bandits: Privacy-Preserving Intersection
               Warrants for Lawful Surveillance},
  booktitle = {4th {USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '14, San Diego, CA, USA, August 18, 2014.},
  year      = {2014},
  crossref  = {DBLP:conf/uss/2014foci},
  url       = {https://www.usenix.org/conference/foci14/workshop-program/presentation/segal},
  timestamp = {Wed, 10 Sep 2014 16:41:03 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/SegalFF14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/JaggardJSF14,
  author    = {Aaron D. Jaggard and
               Aaron Johnson and
               Paul F. Syverson and
               Joan Feigenbaum},
  title     = {Representing Network Trust and Using It to Improve Anonymous Communication},
  journal   = {CoRR},
  volume    = {abs/1406.3583},
  year      = {2014},
  url       = {http://arxiv.org/abs/1406.3583},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/JaggardJSF14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XiaoFF13,
  author    = {Hongda Xiao and
               Bryan Ford and
               Joan Feigenbaum},
  title     = {Structural cloud audits that protect private information},
  booktitle = {CCSW'13, Proceedings of the 2013 {ACM} Cloud Computing Security Workshop,
               Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013},
  pages     = {101--112},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013ccsw},
  url       = {http://doi.acm.org/10.1145/2517488.2517493},
  doi       = {10.1145/2517488.2517493},
  timestamp = {Mon, 13 Jan 2014 21:21:49 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/XiaoFF13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2013,
  editor    = {Dan Boneh and
               Tim Roughgarden and
               Joan Feigenbaum},
  title     = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
               USA, June 1-4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2488608},
  isbn      = {978-1-4503-2029-0},
  timestamp = {Sun, 26 May 2013 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/FeigenbaumF13,
  author    = {Joan Feigenbaum and
               Bryan Ford},
  title     = {Seeking Anonymity in an Internet Panopticon},
  journal   = {CoRR},
  volume    = {abs/1312.5307},
  year      = {2013},
  url       = {http://arxiv.org/abs/1312.5307},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/FeigenbaumF13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tissec/FeigenbaumJS12,
  author    = {Joan Feigenbaum and
               Aaron Johnson and
               Paul F. Syverson},
  title     = {Probabilistic analysis of onion routing in a black-box model},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {15},
  number    = {3},
  pages     = {14:1--14:28},
  year      = {2012},
  url       = {http://doi.acm.org/10.1145/2382448.2382452},
  doi       = {10.1145/2382448.2382452},
  timestamp = {Fri, 06 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tissec/FeigenbaumJS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/GuptaSPSSFRS12,
  author    = {Debayan Gupta and
               Aaron Segal and
               Aurojit Panda and
               Gil Segev and
               Michael Schapira and
               Joan Feigenbaum and
               Jennifer Rexford and
               Scott Shenker},
  title     = {A new approach to interdomain routing based on secure multi-party
               computation},
  booktitle = {11th {ACM} Workshop on Hot Topics in Networks, HotNets-XI, Redmond,
               WA, {USA} - October 29 - 30, 2012},
  pages     = {37--42},
  year      = {2012},
  crossref  = {DBLP:conf/hotnets/2012},
  url       = {http://doi.acm.org/10.1145/2390231.2390238},
  doi       = {10.1145/2390231.2390238},
  timestamp = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/hotnets/GuptaSPSSFRS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/lics/Feigenbaum12,
  author    = {Joan Feigenbaum},
  title     = {Privacy, Anonymity, and Accountability in Ad-Supported Services},
  booktitle = {Proceedings of the 27th Annual {IEEE} Symposium on Logic in Computer
               Science, {LICS} 2012, Dubrovnik, Croatia, June 25-28, 2012},
  pages     = {9--10},
  year      = {2012},
  crossref  = {DBLP:conf/lics/2012},
  url       = {https://doi.org/10.1109/LICS.2012.10},
  doi       = {10.1109/LICS.2012.10},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/lics/Feigenbaum12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/podc/FeigenbaumGPSSS12,
  author    = {Joan Feigenbaum and
               Brighten Godfrey and
               Aurojit Panda and
               Michael Schapira and
               Scott Shenker and
               Ankit Singla},
  title     = {Brief announcement: on the resilience of routing tables},
  booktitle = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '12,
               Funchal, Madeira, Portugal, July 16-18, 2012},
  pages     = {237--238},
  year      = {2012},
  crossref  = {DBLP:conf/podc/2012},
  url       = {http://doi.acm.org/10.1145/2332432.2332478},
  doi       = {10.1145/2332432.2332478},
  timestamp = {Sun, 15 Jul 2012 18:41:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/podc/FeigenbaumGPSSS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wine/FeigenbaumMZ12,
  author    = {Joan Feigenbaum and
               Michael Mitzenmacher and
               Georgios Zervas},
  title     = {An Economic Analysis of User-Privacy Options in Ad-Supported Services},
  booktitle = {Internet and Network Economics - 8th International Workshop, {WINE}
               2012, Liverpool, UK, December 10-12, 2012. Proceedings},
  pages     = {30--43},
  year      = {2012},
  crossref  = {DBLP:conf/wine/2012},
  url       = {https://doi.org/10.1007/978-3-642-35311-6_3},
  doi       = {10.1007/978-3-642-35311-6_3},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wine/FeigenbaumMZ12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1207-3732,
  author    = {Joan Feigenbaum and
               Brighten Godfrey and
               Aurojit Panda and
               Michael Schapira and
               Scott Shenker and
               Ankit Singla},
  title     = {On the Resilience of Routing Tables},
  journal   = {CoRR},
  volume    = {abs/1207.3732},
  year      = {2012},
  url       = {http://arxiv.org/abs/1207.3732},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1207-3732},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-0383,
  author    = {Joan Feigenbaum and
               Michael Mitzenmacher and
               Georgios Zervas},
  title     = {An Economic Analysis of User-Privacy Options in Ad-Supported Services},
  journal   = {CoRR},
  volume    = {abs/1208.0383},
  year      = {2012},
  url       = {http://arxiv.org/abs/1208.0383},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1208-0383},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dc/FeigenbaumRS11,
  author    = {Joan Feigenbaum and
               Vijay Ramachandran and
               Michael Schapira},
  title     = {Incentive-compatible interdomain routing},
  journal   = {Distributed Computing},
  volume    = {23},
  number    = {5-6},
  pages     = {301--319},
  year      = {2011},
  url       = {https://doi.org/10.1007/s00446-011-0126-8},
  doi       = {10.1007/s00446-011-0126-8},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dc/FeigenbaumRS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/nspw/FeigenbaumJW11,
  author    = {Joan Feigenbaum and
               Aaron D. Jaggard and
               Rebecca N. Wright},
  title     = {Towards a formal model of accountability},
  booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
               USA, September 12-15, 2011},
  pages     = {45--56},
  year      = {2011},
  crossref  = {DBLP:conf/nspw/2011},
  url       = {http://doi.acm.org/10.1145/2073276.2073282},
  doi       = {10.1145/2073276.2073282},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/nspw/FeigenbaumJW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/websci/FeigenbaumHJWW11,
  author    = {Joan Feigenbaum and
               James A. Hendler and
               Aaron D. Jaggard and
               Daniel J. Weitzner and
               Rebecca N. Wright},
  title     = {Accountability and deterrence in online life},
  booktitle = {Web Science 2011, WebSci '11, Koblenz, Germany - June 15 - 17, 2011},
  pages     = {7:1--7:7},
  year      = {2011},
  crossref  = {DBLP:conf/websci/2011},
  url       = {http://doi.acm.org/10.1145/2527031.2527043},
  doi       = {10.1145/2527031.2527043},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/websci/FeigenbaumHJWW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-2520,
  author    = {Joan Feigenbaum and
               Aaron Johnson and
               Paul F. Syverson},
  title     = {Probabilistic Analysis of Onion Routing in a Black-box Model},
  journal   = {CoRR},
  volume    = {abs/1111.2520},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.2520},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1111-2520},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pet/FeigenbaumJS10,
  author    = {Joan Feigenbaum and
               Aaron Johnson and
               Paul F. Syverson},
  title     = {Preventing Active Timing Attacks in Low-Latency Anonymous Communication},
  booktitle = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
               2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  pages     = {166--183},
  year      = {2010},
  crossref  = {DBLP:conf/pet/2010},
  url       = {https://doi.org/10.1007/978-3-642-14527-8_10},
  doi       = {10.1007/978-3-642-14527-8_10},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pet/FeigenbaumJS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/FeigenbaumJS10,
  author    = {Joan Feigenbaum and
               Aaron D. Jaggard and
               Michael Schapira},
  title     = {Approximate privacy: foundations and quantification (extended abstract)},
  booktitle = {Proceedings 11th {ACM} Conference on Electronic Commerce (EC-2010),
               Cambridge, Massachusetts, USA, June 7-11, 2010},
  pages     = {167--178},
  year      = {2010},
  crossref  = {DBLP:conf/sigecom/2010},
  url       = {http://doi.acm.org/10.1145/1807342.1807369},
  doi       = {10.1145/1807342.1807369},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/FeigenbaumJS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-3388,
  author    = {Joan Feigenbaum and
               Aaron D. Jaggard and
               Michael Schapira},
  title     = {Approximate Privacy: PARs for Set Problems},
  journal   = {CoRR},
  volume    = {abs/1001.3388},
  year      = {2010},
  url       = {http://arxiv.org/abs/1001.3388},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1001-3388},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/FeigenbaumPP09,
  author    = {Joan Feigenbaum and
               David C. Parkes and
               David M. Pennock},
  title     = {Computational challenges in e-commerce},
  journal   = {Commun. {ACM}},
  volume    = {52},
  number    = {1},
  pages     = {70--74},
  year      = {2009},
  url       = {http://doi.acm.org/10.1145/1435417.1435435},
  doi       = {10.1145/1435417.1435435},
  timestamp = {Thu, 08 Jan 2009 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cacm/FeigenbaumPP09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-0910-5714,
  author    = {Joan Feigenbaum and
               Aaron D. Jaggard and
               Michael Schapira},
  title     = {Approximate Privacy: Foundations and Quantification},
  journal   = {CoRR},
  volume    = {abs/0910.5714},
  year      = {2009},
  url       = {http://arxiv.org/abs/0910.5714},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-0910-5714},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/WeitznerABFHS08,
  author    = {Daniel J. Weitzner and
               Harold Abelson and
               Tim Berners{-}Lee and
               Joan Feigenbaum and
               James A. Hendler and
               Gerald J. Sussman},
  title     = {Information accountability},
  journal   = {Commun. {ACM}},
  volume    = {51},
  number    = {6},
  pages     = {82--87},
  year      = {2008},
  url       = {http://doi.acm.org/10.1145/1349026.1349043},
  doi       = {10.1145/1349026.1349043},
  timestamp = {Tue, 10 Jun 2008 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cacm/WeitznerABFHS08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/FeigenbaumKMSZ08,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Andrew McGregor and
               Siddharth Suri and
               Jian Zhang},
  title     = {Graph Distances in the Data-Stream Model},
  journal   = {{SIAM} J. Comput.},
  volume    = {38},
  number    = {5},
  pages     = {1709--1727},
  year      = {2008},
  url       = {https://doi.org/10.1137/070683155},
  doi       = {10.1137/070683155},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/siamcomp/FeigenbaumKMSZ08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sigecom/Feigenbaum08,
  author    = {Joan Feigenbaum},
  title     = {Workshop report: NetEcon'08},
  journal   = {SIGecom Exchanges},
  volume    = {7},
  number    = {3},
  year      = {2008},
  url       = {http://doi.acm.org/10.1145/1486877.1486880},
  doi       = {10.1145/1486877.1486880},
  timestamp = {Tue, 19 Jan 2010 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/sigecom/Feigenbaum08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2008netecon,
  editor    = {Joan Feigenbaum and
               Yang Richard Yang},
  title     = {Proceedings of the {ACM} {SIGCOMM} 2008 Workshop on Economics of Networked
               Systems, NetEcon 2008, Seattle, WA, USA, August 22, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-179-8},
  timestamp = {Thu, 04 Sep 2008 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigcomm/2008netecon},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcs/FeigenbaumKMS07,
  author    = {Joan Feigenbaum and
               David R. Karger and
               Vahab S. Mirrokni and
               Rahul Sami},
  title     = {Subjective-cost policy routing},
  journal   = {Theor. Comput. Sci.},
  volume    = {378},
  number    = {2},
  pages     = {175--189},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.tcs.2007.02.020},
  doi       = {10.1016/j.tcs.2007.02.020},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tcs/FeigenbaumKMS07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcs/AspnesFYZ07,
  author    = {James Aspnes and
               Joan Feigenbaum and
               Aleksandr Yampolskiy and
               Sheng Zhong},
  title     = {Towards a theory of data entanglement},
  journal   = {Theor. Comput. Sci.},
  volume    = {389},
  number    = {1-2},
  pages     = {26--43},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.tcs.2007.07.021},
  doi       = {10.1016/j.tcs.2007.07.021},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tcs/AspnesFYZ07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/FeigenbaumJS07,
  author    = {Joan Feigenbaum and
               Aaron Johnson and
               Paul F. Syverson},
  title     = {A Model of Onion Routing with Provable Anonymity},
  booktitle = {Financial Cryptography and Data Security, 11th International Conference,
               {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
               2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
               Selected Papers},
  pages     = {57--71},
  year      = {2007},
  crossref  = {DBLP:conf/fc/2007},
  url       = {https://doi.org/10.1007/978-3-540-77366-5_9},
  doi       = {10.1007/978-3-540-77366-5_9},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/FeigenbaumJS07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wpes/FeigenbaumJS07,
  author    = {Joan Feigenbaum and
               Aaron Johnson and
               Paul F. Syverson},
  title     = {Probabilistic analysis of onion routing in a black-box model},
  booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages     = {1--10},
  year      = {2007},
  crossref  = {DBLP:conf/wpes/2007},
  url       = {http://doi.acm.org/10.1145/1314333.1314335},
  doi       = {10.1145/1314333.1314335},
  timestamp = {Mon, 07 Apr 2008 08:32:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wpes/FeigenbaumJS07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wpes/Saint-JeanJBF07,
  author    = {Felipe Saint{-}Jean and
               Aaron Johnson and
               Dan Boneh and
               Joan Feigenbaum},
  title     = {Private web search},
  booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages     = {84--90},
  year      = {2007},
  crossref  = {DBLP:conf/wpes/2007},
  url       = {http://doi.acm.org/10.1145/1314333.1314351},
  doi       = {10.1145/1314333.1314351},
  timestamp = {Mon, 07 Apr 2008 08:32:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wpes/Saint-JeanJBF07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dc/FeigenbaumSS06,
  author    = {Joan Feigenbaum and
               Rahul Sami and
               Scott Shenker},
  title     = {Mechanism design for policy routing},
  journal   = {Distributed Computing},
  volume    = {18},
  number    = {4},
  pages     = {293--305},
  year      = {2006},
  url       = {https://doi.org/10.1007/s00446-005-0134-7},
  doi       = {10.1007/s00446-005-0134-7},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dc/FeigenbaumSS06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sigact/FeigenbaumM06,
  author    = {Joan Feigenbaum and
               Michael Mitzenmacher},
  title     = {Towards a theory of networked computation},
  journal   = {{SIGACT} News},
  volume    = {37},
  number    = {4},
  pages     = {22--26},
  year      = {2006},
  url       = {http://doi.acm.org/10.1145/1189056.1189059},
  doi       = {10.1145/1189056.1189059},
  timestamp = {Thu, 08 May 2008 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/sigact/FeigenbaumM06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/talg/FeigenbaumIMNSW06,
  author    = {Joan Feigenbaum and
               Yuval Ishai and
               Tal Malkin and
               Kobbi Nissim and
               Martin J. Strauss and
               Rebecca N. Wright},
  title     = {Secure multiparty computation of approximations},
  journal   = {{ACM} Trans. Algorithms},
  volume    = {2},
  number    = {3},
  pages     = {435--472},
  year      = {2006},
  url       = {http://doi.acm.org/10.1145/1159892.1159900},
  doi       = {10.1145/1159892.1159900},
  timestamp = {Wed, 09 Mar 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/talg/FeigenbaumIMNSW06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cikm/ZhangF06,
  author    = {Jian Zhang and
               Joan Feigenbaum},
  title     = {Finding highly correlated pairs efficiently with powerful pruning},
  booktitle = {Proceedings of the 2006 {ACM} {CIKM} International Conference on Information
               and Knowledge Management, Arlington, Virginia, USA, November 6-11,
               2006},
  pages     = {152--161},
  year      = {2006},
  crossref  = {DBLP:conf/cikm/2006},
  url       = {http://doi.acm.org/10.1145/1183614.1183640},
  doi       = {10.1145/1183614.1183640},
  timestamp = {Mon, 14 May 2012 09:20:40 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cikm/ZhangF06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/FeigenbaumRS06,
  author    = {Joan Feigenbaum and
               Vijay Ramachandran and
               Michael Schapira},
  title     = {Incentive-compatible interdomain routing},
  booktitle = {Proceedings 7th {ACM} Conference on Electronic Commerce (EC-2006),
               Ann Arbor, Michigan, USA, June 11-15, 2006},
  pages     = {130--139},
  year      = {2006},
  crossref  = {DBLP:conf/sigecom/2006},
  url       = {http://doi.acm.org/10.1145/1134707.1134722},
  doi       = {10.1145/1134707.1134722},
  timestamp = {Mon, 24 Feb 2014 16:09:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/FeigenbaumRS06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2006,
  editor    = {Joan Feigenbaum and
               John C.{-}I. Chuang and
               David M. Pennock},
  title     = {Proceedings 7th {ACM} Conference on Electronic Commerce (EC-2006),
               Ann Arbor, Michigan, USA, June 11-15, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-236-4},
  timestamp = {Mon, 24 Feb 2014 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/algorithmica/FeigenbaumKZ04,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Jian Zhang},
  title     = {Computing Diameter in the Streaming and Sliding-Window Models},
  journal   = {Algorithmica},
  volume    = {41},
  number    = {1},
  pages     = {25--41},
  year      = {2005},
  url       = {https://doi.org/10.1007/s00453-004-1105-2},
  doi       = {10.1007/s00453-004-1105-2},
  timestamp = {Tue, 13 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/algorithmica/FeigenbaumKZ04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dc/FeigenbaumPSS05,
  author    = {Joan Feigenbaum and
               Christos H. Papadimitriou and
               Rahul Sami and
               Scott Shenker},
  title     = {A BGP-based mechanism for lowest-cost routing},
  journal   = {Distributed Computing},
  volume    = {18},
  number    = {1},
  pages     = {61--72},
  year      = {2005},
  url       = {https://doi.org/10.1007/s00446-005-0122-y},
  doi       = {10.1007/s00446-005-0122-y},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dc/FeigenbaumPSS05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcs/FeigenbaumFPS05,
  author    = {Joan Feigenbaum and
               Lance Fortnow and
               David M. Pennock and
               Rahul Sami},
  title     = {Computation in a distributed information market},
  journal   = {Theor. Comput. Sci.},
  volume    = {343},
  number    = {1-2},
  pages     = {114--132},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.tcs.2005.05.010},
  doi       = {10.1016/j.tcs.2005.05.010},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tcs/FeigenbaumFPS05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcs/FeigenbaumKMSZ05,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Andrew McGregor and
               Siddharth Suri and
               Jian Zhang},
  title     = {On graph problems in a semi-streaming model},
  journal   = {Theor. Comput. Sci.},
  volume    = {348},
  number    = {2-3},
  pages     = {207--216},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.tcs.2005.09.013},
  doi       = {10.1016/j.tcs.2005.09.013},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tcs/FeigenbaumKMSZ05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/minenet/ZhangRF05,
  author    = {Jian Zhang and
               Jennifer Rexford and
               Joan Feigenbaum},
  title     = {Learning-based anomaly detection in {BGP} updates},
  booktitle = {Proceedings of the 1st Annual {ACM} Workshop on Mining Network Data,
               MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005},
  pages     = {219--220},
  year      = {2005},
  crossref  = {DBLP:conf/minenet/2005},
  url       = {http://doi.acm.org/10.1145/1080173.1080189},
  doi       = {10.1145/1080173.1080189},
  timestamp = {Thu, 19 Aug 2010 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/minenet/ZhangRF05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/soda/FeigenbaumKMSZ05,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Andrew McGregor and
               Siddharth Suri and
               Jian Zhang},
  title     = {Graph distances in the streaming model: the value of space},
  booktitle = {Proceedings of the Sixteenth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2005, Vancouver, British Columbia, Canada, January
               23-25, 2005},
  pages     = {745--754},
  year      = {2005},
  crossref  = {DBLP:conf/soda/2005},
  url       = {http://dl.acm.org/citation.cfm?id=1070432.1070537},
  timestamp = {Mon, 26 Sep 2016 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soda/FeigenbaumKMSZ05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/weis/BergemannEFS05,
  author    = {Dirk Bergemann and
               Thomas Eisenbach and
               Joan Feigenbaum and
               Scott Shenker},
  title     = {Flexibility as an Instrument in Digital Rights Management},
  booktitle = {4th Annual Workshop on the Economics of Information Security, {WEIS}
               2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005},
  year      = {2005},
  crossref  = {DBLP:conf/weis/2005},
  url       = {http://infosecon.net/workshop/pdf/50.pdf},
  timestamp = {Fri, 13 Jan 2017 12:13:07 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/weis/BergemannEFS05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wine/FeigenbaumKMS05,
  author    = {Joan Feigenbaum and
               David R. Karger and
               Vahab S. Mirrokni and
               Rahul Sami},
  title     = {Subjective-Cost Policy Routing},
  booktitle = {Internet and Network Economics, First International Workshop, {WINE}
               2005, Hong Kong, China, December 15-17, 2005, Proceedings},
  pages     = {174--183},
  year      = {2005},
  crossref  = {DBLP:conf/wine/2005},
  url       = {https://doi.org/10.1007/11600930_18},
  doi       = {10.1007/11600930_18},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wine/FeigenbaumKMS05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/debu/BonehFSW04,
  author    = {Dan Boneh and
               Joan Feigenbaum and
               Abraham Silberschatz and
               Rebecca N. Wright},
  title     = {{PORTIA:} Privacy, Obligations, and Rights in Technologies of Information
               Assessment},
  journal   = {{IEEE} Data Eng. Bull.},
  volume    = {27},
  number    = {1},
  pages     = {10--18},
  year      = {2004},
  url       = {ftp://ftp.research.microsoft.com/pub/debull/A04mar/avi.ps},
  timestamp = {Thu, 25 Aug 2005 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/debu/BonehFSW04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/geb/ArcherFKSS04,
  author    = {Aaron Archer and
               Joan Feigenbaum and
               Arvind Krishnamurthy and
               Rahul Sami and
               Scott Shenker},
  title     = {Approximation and collusion in multicast cost sharing},
  journal   = {Games and Economic Behavior},
  volume    = {47},
  number    = {1},
  pages     = {36--71},
  year      = {2004},
  url       = {https://doi.org/10.1016/S0899-8256(03)00176-3},
  doi       = {10.1016/S0899-8256(03)00176-3},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/geb/ArcherFKSS04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AspnesFYZ04,
  author    = {James Aspnes and
               Joan Feigenbaum and
               Aleksandr Yampolskiy and
               Sheng Zhong},
  title     = {Towards a Theory of Data Entanglement: (Extended Abstract)},
  booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
               Computer Security, Sophia Antipolis, France, September 13-15, 2004,
               Proceedings},
  pages     = {177--192},
  year      = {2004},
  crossref  = {DBLP:conf/esorics/2004},
  url       = {https://doi.org/10.1007/978-3-540-30108-0_11},
  doi       = {10.1007/978-3-540-30108-0_11},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/esorics/AspnesFYZ04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FeigenbaumKMSZ04,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Andrew McGregor and
               Siddharth Suri and
               Jian Zhang},
  title     = {On Graph Problems in a Semi-streaming Model},
  booktitle = {Automata, Languages and Programming: 31st International Colloquium,
               {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings},
  pages     = {531--543},
  year      = {2004},
  crossref  = {DBLP:conf/icalp/2004},
  url       = {https://doi.org/10.1007/978-3-540-27836-8_46},
  doi       = {10.1007/978-3-540-27836-8_46},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icalp/FeigenbaumKMSZ04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/podc/FeigenbaumSS04,
  author    = {Joan Feigenbaum and
               Rahul Sami and
               Scott Shenker},
  title     = {Mechanism design for policy routing},
  booktitle = {Proceedings of the Twenty-Third Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2004, St. John's, Newfoundland, Canada,
               July 25-28, 2004},
  pages     = {11--20},
  year      = {2004},
  crossref  = {DBLP:conf/podc/2004},
  url       = {http://doi.acm.org/10.1145/1011767.1011770},
  doi       = {10.1145/1011767.1011770},
  timestamp = {Wed, 23 May 2012 14:26:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/podc/FeigenbaumSS04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2004,
  editor    = {Jack S. Breese and
               Joan Feigenbaum and
               Margo I. Seltzer},
  title     = {Proceedings 5th {ACM} Conference on Electronic Commerce (EC-2004),
               New York, NY, USA, May 17-20, 2004},
  publisher = {{ACM}},
  year      = {2004},
  timestamp = {Mon, 24 Feb 2014 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eatcs/FeigenbaumS03,
  author    = {Joan Feigenbaum and
               Scott Shenker},
  title     = {Distributed algorithmic mechanism design: recent results and future
               directions, Distributed Computing Column},
  journal   = {Bulletin of the {EATCS}},
  volume    = {79},
  pages     = {101--121},
  year      = {2003},
  timestamp = {Wed, 17 Dec 2003 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/eatcs/FeigenbaumS03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tcs/FeigenbaumKSS03,
  author    = {Joan Feigenbaum and
               Arvind Krishnamurthy and
               Rahul Sami and
               Scott Shenker},
  title     = {Hardness results for multicast cost sharing},
  journal   = {Theor. Comput. Sci.},
  volume    = {1-3},
  number    = {304},
  pages     = {215--236},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0304-3975(03)00085-9},
  doi       = {10.1016/S0304-3975(03)00085-9},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tcs/FeigenbaumKSS03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tissec/LiGF03,
  author    = {Ninghui Li and
               Benjamin N. Grosof and
               Joan Feigenbaum},
  title     = {Delegation logic: {A} logic-based approach to distributed authorization},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {6},
  number    = {1},
  pages     = {128--171},
  year      = {2003},
  url       = {http://doi.acm.org/10.1145/605434.605438},
  doi       = {10.1145/605434.605438},
  timestamp = {Fri, 28 Nov 2003 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tissec/LiGF03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/FeigenbaumFPS03,
  author    = {Joan Feigenbaum and
               Lance Fortnow and
               David M. Pennock and
               Rahul Sami},
  title     = {Computation in a distributed information market},
  booktitle = {Proceedings 4th {ACM} Conference on Electronic Commerce (EC-2003),
               San Diego, California, USA, June 9-12, 2003},
  pages     = {156--165},
  year      = {2003},
  crossref  = {DBLP:conf/sigecom/2003},
  url       = {http://doi.acm.org/10.1145/779928.779947},
  doi       = {10.1145/779928.779947},
  timestamp = {Mon, 24 Feb 2014 16:09:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/FeigenbaumFPS03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/FeigenbaumKSS03,
  author    = {Joan Feigenbaum and
               Arvind Krishnamurthy and
               Rahul Sami and
               Scott Shenker},
  title     = {Approximation and collusion in multicast cost sharing},
  booktitle = {Proceedings 4th {ACM} Conference on Electronic Commerce (EC-2003),
               San Diego, California, USA, June 9-12, 2003},
  pages     = {280},
  year      = {2003},
  crossref  = {DBLP:conf/sigecom/2003},
  url       = {http://doi.acm.org/10.1145/779928.779999},
  doi       = {10.1145/779928.779999},
  timestamp = {Mon, 24 Feb 2014 16:09:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/FeigenbaumKSS03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2002drm,
  editor    = {Joan Feigenbaum},
  title     = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
               {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2696},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b11725},
  doi       = {10.1007/b11725},
  isbn      = {3-540-40410-4},
  timestamp = {Mon, 29 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2002drm},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/algorithmica/FeigenbaumKSV02,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Martin Strauss and
               Mahesh Viswanathan},
  title     = {Testing and Spot-Checking of Data Streams},
  journal   = {Algorithmica},
  volume    = {34},
  number    = {1},
  pages     = {67--80},
  year      = {2002},
  url       = {https://doi.org/10.1007/s00453-002-0959-4},
  doi       = {10.1007/s00453-002-0959-4},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/algorithmica/FeigenbaumKSV02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/FeigenbaumKSV02,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Martin Strauss and
               Mahesh Viswanathan},
  title     = {An Approximate L1-Difference Algorithm for Massive Data Streams},
  journal   = {{SIAM} J. Comput.},
  volume    = {32},
  number    = {1},
  pages     = {131--151},
  year      = {2002},
  url       = {https://doi.org/10.1137/S0097539799361701},
  doi       = {10.1137/S0097539799361701},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/siamcomp/FeigenbaumKSV02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dialm/FeigenbaumS02,
  author    = {Joan Feigenbaum and
               Scott Shenker},
  title     = {Distributed algorithmic mechanism design: recent results and future
               directions},
  booktitle = {Proceedings of the 6th International Workshop on Discrete Algorithms
               and Methods for Mobile Computing and Communications {(DIAL-M} 2002),
               Atlanta, Georgia, USA, September 28-28, 2002},
  pages     = {1--13},
  year      = {2002},
  crossref  = {DBLP:conf/dialm/2002},
  url       = {http://doi.acm.org/10.1145/570810.570812},
  doi       = {10.1145/570810.570812},
  timestamp = {Thu, 23 Jun 2016 15:53:27 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dialm/FeigenbaumS02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/FeigenbaumKSS02,
  author    = {Joan Feigenbaum and
               Arvind Krishnamurthy and
               Rahul Sami and
               Scott Shenker},
  title     = {Hardness Results for Multicast Cost Sharing},
  booktitle = {{FST} {TCS} 2002: Foundations of Software Technology and Theoretical
               Computer Science, 22nd Conference Kanpur, India, December 12-14, 2002,
               Proceedings},
  pages     = {133--144},
  year      = {2002},
  crossref  = {DBLP:conf/fsttcs/2002},
  url       = {https://doi.org/10.1007/3-540-36206-1_13},
  doi       = {10.1007/3-540-36206-1_13},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fsttcs/FeigenbaumKSS02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/podc/FeigenbaumPSS02,
  author    = {Joan Feigenbaum and
               Christos H. Papadimitriou and
               Rahul Sami and
               Scott Shenker},
  title     = {A BGP-based mechanism for lowest-cost routing},
  booktitle = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2002, Monterey, California, USA,
               July 21-24, 2002},
  pages     = {173--182},
  year      = {2002},
  crossref  = {DBLP:conf/podc/2002},
  url       = {http://doi.acm.org/10.1145/571825.571856},
  doi       = {10.1145/571825.571856},
  timestamp = {Wed, 23 May 2012 14:26:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/podc/FeigenbaumPSS02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/FeigenbaumPS01,
  author    = {Joan Feigenbaum and
               Christos H. Papadimitriou and
               Scott Shenker},
  title     = {Sharing the Cost of Multicast Transmissions},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {63},
  number    = {1},
  pages     = {21--41},
  year      = {2001},
  url       = {https://doi.org/10.1006/jcss.2001.1754},
  doi       = {10.1006/jcss.2001.1754},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jcss/FeigenbaumPS01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FeigenbaumFSS01,
  author    = {Joan Feigenbaum and
               Michael J. Freedman and
               Tomas Sander and
               Adam Shostack},
  title     = {Privacy Engineering for Digital Rights Management Systems},
  booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
               {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  pages     = {76--105},
  year      = {2001},
  crossref  = {DBLP:conf/ccs/2001drm},
  url       = {https://doi.org/10.1007/3-540-47870-1_6},
  doi       = {10.1007/3-540-47870-1_6},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/FeigenbaumFSS01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MillerF01,
  author    = {Ernest Miller and
               Joan Feigenbaum},
  title     = {Taking the Copy Out of Copyright},
  booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
               {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  pages     = {233--244},
  year      = {2001},
  crossref  = {DBLP:conf/ccs/2001drm},
  url       = {https://doi.org/10.1007/3-540-47870-1_15},
  doi       = {10.1007/3-540-47870-1_15},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/MillerF01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/LiF01,
  author    = {Ninghui Li and
               Joan Feigenbaum},
  title     = {Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate
               Revocation},
  booktitle = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
               Cayman, British West Indies, February 19-22, 2002, Proceedings},
  pages     = {157--168},
  year      = {2001},
  crossref  = {DBLP:conf/fc/2001},
  url       = {https://doi.org/10.1007/3-540-46088-8_16},
  doi       = {10.1007/3-540-46088-8_16},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/LiF01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FeigenbaumIMNSW01,
  author    = {Joan Feigenbaum and
               Yuval Ishai and
               Tal Malkin and
               Kobbi Nissim and
               Martin Strauss and
               Rebecca N. Wright},
  title     = {Secure Multiparty Computation of Approximations},
  booktitle = {Automata, Languages and Programming, 28th International Colloquium,
               {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  pages     = {927--938},
  year      = {2001},
  crossref  = {DBLP:conf/icalp/2001},
  url       = {https://doi.org/10.1007/3-540-48224-5_75},
  doi       = {10.1007/3-540-48224-5_75},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icalp/FeigenbaumIMNSW01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sigecom/FeigenbaumKSS01,
  author    = {Joan Feigenbaum and
               Arvind Krishnamurthy and
               Rahul Sami and
               Scott Shenker},
  title     = {Approximation and collusion in multicast cost sharing (extended abstract)},
  booktitle = {Proceedings 3rd {ACM} Conference on Electronic Commerce (EC-2001),
               Tampa, Florida, USA, October 14-17, 2001},
  pages     = {253--255},
  year      = {2001},
  crossref  = {DBLP:conf/sigecom/2001},
  url       = {http://doi.acm.org/10.1145/501158.501190},
  doi       = {10.1145/501158.501190},
  timestamp = {Mon, 24 Feb 2014 16:09:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/FeigenbaumKSS01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/FeigenbaumIMNSW01,
  author    = {Joan Feigenbaum and
               Yuval Ishai and
               Tal Malkin and
               Kobbi Nissim and
               Martin Strauss and
               Rebecca N. Wright},
  title     = {Secure Multiparty Computation of Approximations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2001},
  pages     = {24},
  year      = {2001},
  url       = {http://eprint.iacr.org/2001/024},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/FeigenbaumIMNSW01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/soda/FeigenbaumKSV00,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Martin Strauss and
               Mahesh Viswanathan},
  title     = {Testing and spot-checking of data streams (extended abstract)},
  booktitle = {Proceedings of the Eleventh Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, January 9-11, 2000, San Francisco, CA, {USA.}},
  pages     = {165--174},
  year      = {2000},
  crossref  = {DBLP:conf/soda/2000},
  url       = {http://dl.acm.org/citation.cfm?id=338219.338248},
  timestamp = {Sat, 18 Apr 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soda/FeigenbaumKSV00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiGF00,
  author    = {Ninghui Li and
               Benjamin N. Grosof and
               Joan Feigenbaum},
  title     = {A Practically Implementable and Tractable Delegation Logic},
  booktitle = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California,
               USA, May 14-17, 2000},
  pages     = {27--42},
  year      = {2000},
  crossref  = {DBLP:conf/sp/2000},
  url       = {https://doi.org/10.1109/SECPRI.2000.848444},
  doi       = {10.1109/SECPRI.2000.848444},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/LiGF00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/FeigenbaumPS00,
  author    = {Joan Feigenbaum and
               Christos H. Papadimitriou and
               Scott Shenker},
  title     = {Sharing the cost of muliticast transmissions (preliminary version)},
  booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
               of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages     = {218--227},
  year      = {2000},
  crossref  = {DBLP:conf/stoc/2000},
  url       = {http://doi.acm.org/10.1145/335305.335332},
  doi       = {10.1145/335305.335332},
  timestamp = {Thu, 16 Feb 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/FeigenbaumPS00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/FeigenbaumFSW00,
  author    = {Joan Feigenbaum and
               Jessica H. Fong and
               Martin Strauss and
               Rebecca N. Wright},
  title     = {Secure Multiparty Computation of Approximations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2000},
  pages     = {30},
  year      = {2000},
  url       = {http://eprint.iacr.org/2000/030},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/FeigenbaumFSW00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cjtcs/FeigenbaumKVV99,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Moshe Y. Vardi and
               Mahesh Viswanathan},
  title     = {The Complexity of Problems on Graphs Represented as OBDDs},
  journal   = {Chicago J. Theor. Comput. Sci.},
  volume    = {1999},
  year      = {1999},
  url       = {http://cjtcs.cs.uchicago.edu/articles/1999/5/contents.html},
  timestamp = {Sat, 18 Apr 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cjtcs/FeigenbaumKVV99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LiFG99,
  author    = {Ninghui Li and
               Joan Feigenbaum and
               Benjamin N. Grosof},
  title     = {A Logic-based Knowledge Representation for Authorization with Delegation},
  booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop,
               {CSFW} 1999, Mordano, Italy, June 28-30, 1999},
  pages     = {162--174},
  year      = {1999},
  crossref  = {DBLP:conf/csfw/1999},
  url       = {https://doi.org/10.1109/CSFW.1999.779771},
  doi       = {10.1109/CSFW.1999.779771},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/csfw/LiFG99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ecoopw/BlazeFK99,
  author    = {Matt Blaze and
               Joan Feigenbaum and
               Angelos D. Keromytis},
  title     = {The Role of Trust Management in Distributed Systems Security},
  booktitle = {Secure Internet Programming, Security Issues for Mobile and Distributed
               Objects},
  pages     = {185--210},
  year      = {1999},
  crossref  = {DBLP:conf/ecoopw/1999secure},
  url       = {https://doi.org/10.1007/3-540-48749-2_8},
  doi       = {10.1007/3-540-48749-2_8},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ecoopw/BlazeFK99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/CallasFGS99,
  author    = {Jon Callas and
               Joan Feigenbaum and
               David M. Goldschlag and
               Erin Sawyer},
  title     = {Fair Use, Intellectual Property, and the Information Economy (Panel
               Session Summary)},
  booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
               British West Indies, February 1999, Proceedings},
  pages     = {173--183},
  year      = {1999},
  crossref  = {DBLP:conf/fc/1999},
  url       = {https://doi.org/10.1007/3-540-48390-X_13},
  doi       = {10.1007/3-540-48390-X_13},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/CallasFGS99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/FeigenbaumKSV99,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Martin Strauss and
               Mahesh Viswanathan},
  title     = {An Approximate L\({}^{\mbox{1}}\)-Difference Algorithm for Massive
               Data Streams},
  booktitle = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99,
               17-18 October, 1999, New York, NY, {USA}},
  pages     = {501--511},
  year      = {1999},
  crossref  = {DBLP:conf/focs/1999},
  url       = {https://doi.org/10.1109/SFFCS.1999.814623},
  doi       = {10.1109/SFFCS.1999.814623},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/FeigenbaumKSV99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/soda/BlazeFN99,
  author    = {Matt Blaze and
               Joan Feigenbaum and
               Moni Naor},
  title     = {A Formal Treatment of Remotely Keyed Encryption},
  booktitle = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
               17-19 January 1999, Baltimore, Maryland.},
  pages     = {868--869},
  year      = {1999},
  crossref  = {DBLP:conf/soda/1999},
  url       = {http://dl.acm.org/citation.cfm?id=314500.315056},
  timestamp = {Mon, 14 Mar 2016 15:38:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soda/BlazeFN99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crc/GoldbergCPFK99,
  author    = {Charles H. Goldberg and
               Jianer Chen and
               Viera Krnanova Proulx and
               Joan Feigenbaum and
               Sampath Kannan},
  title     = {Information Structures},
  booktitle = {Handbook of Discrete and Combinatorial Mathematics.},
  year      = {1999},
  crossref  = {DBLP:reference/crc/1999drm},
  url       = {https://doi.org/10.1201/9781439832905.ch17},
  doi       = {10.1201/9781439832905.ch17},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crc/GoldbergCPFK99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/amai/CowenFK98,
  author    = {Lenore Cowen and
               Joan Feigenbaum and
               Sampath Kannan},
  title     = {A Formal Framework for Evaluating Heuristic Programs},
  journal   = {Ann. Math. Artif. Intell.},
  volume    = {22},
  number    = {3-4},
  pages     = {193--206},
  year      = {1998},
  url       = {https://doi.org/10.1023/A:1018950418415},
  doi       = {10.1023/A:1018950418415},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/amai/CowenFK98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cc/FeigenbaumFLN98,
  author    = {Joan Feigenbaum and
               Lance Fortnow and
               Sophie Laplante and
               Ashish V. Naik},
  title     = {On Coherence, Random-Self-Reducibility, and Self-Correction},
  journal   = {Computational Complexity},
  volume    = {7},
  number    = {2},
  pages     = {174--191},
  year      = {1998},
  url       = {https://doi.org/10.1007/s000370050009},
  doi       = {10.1007/s000370050009},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cc/FeigenbaumFLN98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BlazeFN98,
  author    = {Matt Blaze and
               Joan Feigenbaum and
               Moni Naor},
  title     = {A Formal Treatment of Remotely Keyed Encryption},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
               on the Theory and Application of Cryptographic Techniques, Espoo,
               Finland, May 31 - June 4, 1998, Proceeding},
  pages     = {251--265},
  year      = {1998},
  crossref  = {DBLP:conf/eurocrypt/98},
  url       = {https://doi.org/10.1007/BFb0054131},
  doi       = {10.1007/BFb0054131},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BlazeFN98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/BlazeFS98,
  author    = {Matt Blaze and
               Joan Feigenbaum and
               Martin Strauss},
  title     = {Compliance Checking in the PolicyMaker Trust Management System},
  booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
               British West Indies, February 23-25, 1998, Proceedings},
  pages     = {254--274},
  year      = {1998},
  crossref  = {DBLP:conf/fc/1998},
  url       = {https://doi.org/10.1007/BFb0055488},
  doi       = {10.1007/BFb0055488},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/BlazeFS98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/Feigenbaum98,
  author    = {Joan Feigenbaum},
  title     = {Overview of the AT{\&}T Labs Trust-Management Project (Position
               Paper)},
  booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April
               15-17, 1998, Proceedings},
  pages     = {45--50},
  year      = {1998},
  crossref  = {DBLP:conf/spw/1998},
  url       = {https://doi.org/10.1007/3-540-49135-X_7},
  doi       = {10.1007/3-540-49135-X_7},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/Feigenbaum98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/Feigenbaum98a,
  author    = {Joan Feigenbaum},
  title     = {Overview of the AT{\&}T Labs Trust-Management Project (Transcript
               of Discussion)},
  booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April
               15-17, 1998, Proceedings},
  pages     = {51--58},
  year      = {1998},
  crossref  = {DBLP:conf/spw/1998},
  url       = {https://doi.org/10.1007/3-540-49135-X_8},
  doi       = {10.1007/3-540-49135-X_8},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/Feigenbaum98a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/BlazeFK98,
  author    = {Matt Blaze and
               Joan Feigenbaum and
               Angelos D. Keromytis},
  title     = {KeyNote: Trust Management for Public-Key Infrastructures (Position
               Paper)},
  booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April
               15-17, 1998, Proceedings},
  pages     = {59--63},
  year      = {1998},
  crossref  = {DBLP:conf/spw/1998},
  url       = {https://doi.org/10.1007/3-540-49135-X_9},
  doi       = {10.1007/3-540-49135-X_9},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/BlazeFK98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spw/NeedhamLFGC98,
  author    = {Roger M. Needham and
               E. Stewart Lee and
               Joan Feigenbaum and
               Virgil D. Gligor and
               Bruce Christianson},
  title     = {Panel Session - Future Directions},
  booktitle = {Security Protocols, 6th International Workshop, Cambridge, UK, April
               15-17, 1998, Proceedings},
  pages     = {227--239},
  year      = {1998},
  crossref  = {DBLP:conf/spw/1998},
  url       = {https://doi.org/10.1007/3-540-49135-X_31},
  doi       = {10.1007/3-540-49135-X_31},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/NeedhamLFGC98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stacs/FeigenbaumKVV98,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Moshe Y. Vardi and
               Mahesh Viswanathan},
  title     = {Complexity of Problems on Graphs Represented as OBDDs (Extended Abstract)},
  booktitle = {{STACS} 98, 15th Annual Symposium on Theoretical Aspects of Computer
               Science, Paris, France, February 25-27, 1998, Proceedings},
  pages     = {216--226},
  year      = {1998},
  crossref  = {DBLP:conf/stacs/1998},
  url       = {https://doi.org/10.1007/BFb0028563},
  doi       = {10.1007/BFb0028563},
  timestamp = {Tue, 23 May 2017 11:53:57 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stacs/FeigenbaumKVV98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cn/ChuFLRS97,
  author    = {Yang{-}Hua Chu and
               Joan Feigenbaum and
               Brian A. LaMacchia and
               Paul Resnick and
               Martin Strauss},
  title     = {{REFEREE:} Trust Management for Web Applications},
  journal   = {Computer Networks},
  volume    = {29},
  number    = {8-13},
  pages     = {953--964},
  year      = {1997},
  url       = {https://doi.org/10.1016/S0169-7552(97)00009-3},
  doi       = {10.1016/S0169-7552(97)00009-3},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cn/ChuFLRS97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ett/BlazeFRS97,
  author    = {Matt Blaze and
               Joan Feigenbaum and
               Paul Resnick and
               Martin Strauss},
  title     = {Managing trust in an information-labeling system},
  journal   = {European Transactions on Telecommunications},
  volume    = {8},
  number    = {5},
  pages     = {491--501},
  year      = {1997},
  url       = {https://doi.org/10.1002/ett.4460080507},
  doi       = {10.1002/ett.4460080507},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ett/BlazeFRS97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BeaverFKR97,
  author    = {Donald Beaver and
               Joan Feigenbaum and
               Joe Kilian and
               Phillip Rogaway},
  title     = {Locally Random Reductions: Improvements and Applications},
  journal   = {J. Cryptology},
  volume    = {10},
  number    = {1},
  pages     = {17--36},
  year      = {1997},
  url       = {https://doi.org/10.1007/s001459900017},
  doi       = {10.1007/s001459900017},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/joc/BeaverFKR97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/CondonFLS97,
  author    = {Anne Condon and
               Joan Feigenbaum and
               Carsten Lund and
               Peter W. Shor},
  title     = {Random Debaters and the Hardness of Approximating Stochastic Functions},
  journal   = {{SIAM} J. Comput.},
  volume    = {26},
  number    = {2},
  pages     = {369--400},
  year      = {1997},
  url       = {https://doi.org/10.1137/S0097539793260738},
  doi       = {10.1137/S0097539793260738},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/siamcomp/CondonFLS97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/wwwj/ChuFLRS97,
  author    = {Yang{-}Hua Chu and
               Joan Feigenbaum and
               Brian A. LaMacchia and
               Paul Resnick and
               Martin Strauss},
  title     = {Referee: trust management for Web applications},
  journal   = {World Wide Web Journal},
  volume    = {2},
  pages     = {127--139},
  year      = {1997},
  timestamp = {Wed, 10 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/wwwj/ChuFLRS97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stacs/FeigenbaumS97,
  author    = {Joan Feigenbaum and
               Martin Strauss},
  title     = {An Information-Theoretic Treatment of Random-Self-Reducibility (Extended
               Abstract)},
  booktitle = {{STACS} 97, 14th Annual Symposium on Theoretical Aspects of Computer
               Science, L{\"{u}}beck, Germany, February 27 - March 1, 1997,
               Proceedings},
  pages     = {523--534},
  year      = {1997},
  crossref  = {DBLP:conf/stacs/1997},
  url       = {https://doi.org/10.1007/BFb0023486},
  doi       = {10.1007/BFb0023486},
  timestamp = {Mon, 22 May 2017 17:11:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stacs/FeigenbaumS97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sigact/AllenderFGPR96,
  author    = {Eric Allender and
               Joan Feigenbaum and
               Judy Goldsmith and
               Toniann Pitassi and
               Steven Rudich},
  title     = {The future of computational complexity theory: part {II}},
  journal   = {{SIGACT} News},
  volume    = {27},
  number    = {4},
  pages     = {3--7},
  year      = {1996},
  url       = {http://doi.acm.org/10.1145/242581.242582},
  doi       = {10.1145/242581.242582},
  timestamp = {Mon, 25 Jan 2010 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/sigact/AllenderFGPR96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/FeigenbaumFMMV96,
  author    = {Joan Feigenbaum and
               G. David Forney Jr. and
               Brian H. Marcus and
               Robert J. McEliece and
               Alexander Vardy},
  title     = {Introduction to the special issue on codes and complexity},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {42},
  number    = {6},
  pages     = {1649--1659},
  year      = {1996},
  timestamp = {Wed, 09 Mar 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tit/FeigenbaumFMMV96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/FeigenbaumFLN96,
  author    = {Joan Feigenbaum and
               Lance Fortnow and
               Sophie Laplante and
               Ashish V. Naik},
  title     = {On Coherence, Random-self-reducibility, and Self-correction},
  booktitle = {Proceedings of the Eleveth Annual {IEEE} Conference on Computational
               Complexity, Philadelphia, Pennsylvania, USA, May 24-27, 1996},
  pages     = {59--67},
  year      = {1996},
  crossref  = {DBLP:conf/coco/1996},
  url       = {https://doi.org/10.1109/CCC.1996.507668},
  doi       = {10.1109/CCC.1996.507668},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/FeigenbaumFLN96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icalp/CowenFK96,
  author    = {Lenore Cowen and
               Joan Feigenbaum and
               Sampath Kannan},
  title     = {A Formal Framework for Evaluating Heuristic Programs},
  booktitle = {Automata, Languages and Programming, 23rd International Colloquium,
               ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings},
  pages     = {634--645},
  year      = {1996},
  crossref  = {DBLP:conf/icalp/1996},
  url       = {https://doi.org/10.1007/3-540-61440-0_165},
  doi       = {10.1007/3-540-61440-0_165},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icalp/CowenFK96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/BlazeFL96,
  author    = {Matt Blaze and
               Joan Feigenbaum and
               Jack Lacy},
  title     = {Decentralized Trust Management},
  booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
               CA, {USA}},
  pages     = {164--173},
  year      = {1996},
  crossref  = {DBLP:conf/sp/1996},
  url       = {https://doi.org/10.1109/SECPRI.1996.502679},
  doi       = {10.1109/SECPRI.1996.502679},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/BlazeFL96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cjtcs/CondonFLS95,
  author    = {Anne Condon and
               Joan Feigenbaum and
               Carsten Lund and
               Peter W. Shor},
  title     = {Probabilistically Checkable Debate Systems and Nonapproximability
               of PSPACE-Hard Functions},
  journal   = {Chicago J. Theor. Comput. Sci.},
  volume    = {1995},
  year      = {1995},
  url       = {http://cjtcs.cs.uchicago.edu/articles/1995/4/contents.html},
  timestamp = {Thu, 08 Jul 2004 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cjtcs/CondonFLS95},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/FeigenbaumKS95,
  author    = {Joan Feigenbaum and
               Daphne Koller and
               Peter W. Shor},
  title     = {A Game-Theoretic Classification of Interactive Complexity Classes},
  booktitle = {Proceedings of the Tenth Annual Structure in Complexity Theory Conference,
               Minneapolis, Minnesota, USA, June 19-22, 1995},
  pages     = {227--237},
  year      = {1995},
  crossref  = {DBLP:conf/coco/1995},
  url       = {https://doi.org/10.1109/SCT.1995.514861},
  doi       = {10.1109/SCT.1995.514861},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/FeigenbaumKS95},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cc/FeigenbaumFLS94,
  author    = {Joan Feigenbaum and
               Lance Fortnow and
               Carsten Lund and
               Daniel A. Spielman},
  title     = {The Power of Adaptiveness and Additional Queries in Random-Self-Reductions},
  journal   = {Computational Complexity},
  volume    = {4},
  pages     = {158--174},
  year      = {1994},
  url       = {https://doi.org/10.1007/BF01202287},
  doi       = {10.1007/BF01202287},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cc/FeigenbaumFLS94},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/CondonFLS94,
  author    = {Anne Condon and
               Joan Feigenbaum and
               Carsten Lund and
               Peter W. Shor},
  title     = {Random Debaters and the Hardness of Approximating Stochastic Functions},
  booktitle = {Proceedings of the Ninth Annual Structure in Complexity Theory Conference,
               Amsterdam, The Netherlands, June 28 - July 1, 1994},
  pages     = {280--293},
  year      = {1994},
  crossref  = {DBLP:conf/coco/1994},
  url       = {https://doi.org/10.1109/SCT.1994.315796},
  doi       = {10.1109/SCT.1994.315796},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/CondonFLS94},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/FeigenbaumF93,
  author    = {Joan Feigenbaum and
               Lance Fortnow},
  title     = {Random-Self-Reducibility of Complete Sets},
  journal   = {{SIAM} J. Comput.},
  volume    = {22},
  number    = {5},
  pages     = {994--1005},
  year      = {1993},
  url       = {https://doi.org/10.1137/0222061},
  doi       = {10.1137/0222061},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/siamcomp/FeigenbaumF93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamdm/FeigenbaumKL93,
  author    = {Joan Feigenbaum and
               Jeremy A. Kahn and
               Carsten Lund},
  title     = {Complexity Results for Pomset Languages},
  journal   = {{SIAM} J. Discrete Math.},
  volume    = {6},
  number    = {3},
  pages     = {432--442},
  year      = {1993},
  url       = {https://doi.org/10.1137/0406035},
  doi       = {10.1137/0406035},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/siamdm/FeigenbaumKL93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CondonFLS93,
  author    = {Anne Condon and
               Joan Feigenbaum and
               Carsten Lund and
               Peter W. Shor},
  title     = {Probabilistically checkable debate systems and approximation algorithms
               for PSPACE-hard functions},
  booktitle = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of
               Computing, May 16-18, 1993, San Diego, CA, {USA}},
  pages     = {305--314},
  year      = {1993},
  crossref  = {DBLP:conf/stoc/STOC25},
  url       = {http://doi.acm.org/10.1145/167088.167190},
  doi       = {10.1145/167088.167190},
  timestamp = {Thu, 16 Feb 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/CondonFLS93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cc/BeigelF92,
  author    = {Richard Beigel and
               Joan Feigenbaum},
  title     = {On Being Incoherent Without Being Very Hard},
  journal   = {Computational Complexity},
  volume    = {2},
  pages     = {1--17},
  year      = {1992},
  url       = {https://doi.org/10.1007/BF01276436},
  doi       = {10.1007/BF01276436},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cc/BeigelF92},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dm/FeigenbaumS92,
  author    = {Joan Feigenbaum and
               Alejandro A. Sch{\"{a}}ffer},
  title     = {Finding the prime factors of strong direct product graphs in polynomial
               time},
  journal   = {Discrete Mathematics},
  volume    = {109},
  number    = {1-3},
  pages     = {77--102},
  year      = {1992},
  url       = {https://doi.org/10.1016/0012-365X(92)90280-S},
  doi       = {10.1016/0012-365X(92)90280-S},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dm/FeigenbaumS92},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/FeigenbaumFLS92,
  author    = {Joan Feigenbaum and
               Lance Fortnow and
               Carsten Lund and
               Daniel A. Spielman},
  title     = {The Power of Adaptiveness and Additional Queries in Random-Self-Reductions},
  booktitle = {Proceedings of the Seventh Annual Structure in Complexity Theory Conference,
               Boston, Massachusetts, USA, June 22-25, 1992},
  pages     = {338--346},
  year      = {1992},
  crossref  = {DBLP:conf/coco/1992},
  url       = {https://doi.org/10.1109/SCT.1992.215408},
  doi       = {10.1109/SCT.1992.215408},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/FeigenbaumFLS92},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1991,
  editor    = {Joan Feigenbaum},
  title     = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {576},
  publisher = {Springer},
  year      = {1992},
  url       = {https://doi.org/10.1007/3-540-46766-1},
  doi       = {10.1007/3-540-46766-1},
  isbn      = {3-540-55188-3},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1991},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FeigenbaumO91,
  author    = {Joan Feigenbaum and
               Rafail Ostrovsky},
  title     = {A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
               on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
               November 11-14, 1991, Proceedings},
  pages     = {352--359},
  year      = {1991},
  crossref  = {DBLP:conf/asiacrypt/1991},
  url       = {https://doi.org/10.1007/3-540-57332-1_30},
  doi       = {10.1007/3-540-57332-1_30},
  timestamp = {Sat, 20 May 2017 15:32:54 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/FeigenbaumO91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cav/FeigenbaumKL91,
  author    = {Joan Feigenbaum and
               Jeremy A. Kahn and
               Carsten Lund},
  title     = {Complexity Results for {POMSET} Languages},
  booktitle = {Computer Aided Verification, 3rd International Workshop, {CAV} '91,
               Aalborg, Denmark, July, 1-4, 1991, Proceedings},
  pages     = {343--353},
  year      = {1991},
  crossref  = {DBLP:conf/cav/1991},
  url       = {https://doi.org/10.1007/3-540-55179-4_33},
  doi       = {10.1007/3-540-55179-4_33},
  timestamp = {Sat, 20 May 2017 15:32:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cav/FeigenbaumKL91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/FeigenbaumF91,
  author    = {Joan Feigenbaum and
               Lance Fortnow},
  title     = {On the Random-Self-Reducibility of Complete Sets},
  booktitle = {Proceedings of the Sixth Annual Structure in Complexity Theory Conference,
               Chicago, Illinois, USA, June 30 - July 3, 1991},
  pages     = {124--132},
  year      = {1991},
  crossref  = {DBLP:conf/coco/1991},
  url       = {https://doi.org/10.1109/SCT.1991.160252},
  doi       = {10.1109/SCT.1991.160252},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/FeigenbaumF91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/BeigelBFG91,
  author    = {Richard Beigel and
               Mihir Bellare and
               Joan Feigenbaum and
               Shafi Goldwasser},
  title     = {Languages that Are Easier than their Proofs},
  booktitle = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
               Puerto Rico, 1-4 October 1991},
  pages     = {19--28},
  year      = {1991},
  crossref  = {DBLP:conf/focs/FOCS32},
  url       = {https://doi.org/10.1109/SFCS.1991.185343},
  doi       = {10.1109/SFCS.1991.185343},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/BeigelBFG91},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dimacs/dimacs2,
  editor    = {Joan Feigenbaum and
               Michael Merritt},
  title     = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
               Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series    = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume    = {2},
  publisher = {{DIMACS/AMS}},
  year      = {1991},
  url       = {http://dimacs.rutgers.edu/Volumes/Vol02.html},
  timestamp = {Wed, 13 Jan 2016 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/dimacs2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dm/EppsteinFL90,
  author    = {David Eppstein and
               Joan Feigenbaum and
               Chung{-}Lun Li},
  title     = {Equipartitions of graphs},
  journal   = {Discrete Mathematics},
  volume    = {91},
  number    = {3},
  pages     = {239--248},
  year      = {1990},
  url       = {https://doi.org/10.1016/0012-365X(90)90233-8},
  doi       = {10.1016/0012-365X(90)90233-8},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dm/EppsteinFL90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/AbadiF90,
  author    = {Mart{\'{\i}}n Abadi and
               Joan Feigenbaum},
  title     = {Secure Circuit Evaluation},
  journal   = {J. Cryptology},
  volume    = {2},
  number    = {1},
  pages     = {1--12},
  year      = {1990},
  url       = {https://doi.org/10.1007/BF02252866},
  doi       = {10.1007/BF02252866},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/joc/AbadiF90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sigact/Feigenbaum90,
  author    = {Joan Feigenbaum},
  title     = {Report on {DIMACS} seminar series},
  journal   = {{SIGACT} News},
  volume    = {21},
  number    = {2},
  pages     = {25},
  year      = {1990},
  url       = {http://doi.acm.org/10.1145/379172.379184},
  doi       = {10.1145/379172.379184},
  timestamp = {Mon, 25 Jan 2010 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/sigact/Feigenbaum90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/FeigenbaumKN90,
  author    = {Joan Feigenbaum and
               Sampath Kannan and
               Noam Nisan},
  title     = {Lower Bounds on Random-Self-Reducibility},
  booktitle = {Proceedings: Fifth Annual Structure in Complexity Theory Conference,
               Universitat Polit{\`{e}}cnica de Catalunya, Barcelona, Spain, July
               8-11, 1990},
  pages     = {100--109},
  year      = {1990},
  crossref  = {DBLP:conf/coco/1990},
  url       = {https://doi.org/10.1109/SCT.1990.113959},
  doi       = {10.1109/SCT.1990.113959},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/FeigenbaumKN90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeaverFKR90,
  author    = {Donald Beaver and
               Joan Feigenbaum and
               Joe Kilian and
               Phillip Rogaway},
  title     = {Security with Low Communication Overhead},
  booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  pages     = {62--76},
  year      = {1990},
  crossref  = {DBLP:conf/crypto/1990},
  url       = {https://doi.org/10.1007/3-540-38424-3_5},
  doi       = {10.1007/3-540-38424-3_5},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BeaverFKR90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeaverFS90,
  author    = {Donald Beaver and
               Joan Feigenbaum and
               Victor Shoup},
  title     = {Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract)},
  booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  pages     = {326--338},
  year      = {1990},
  crossref  = {DBLP:conf/crypto/1990},
  url       = {https://doi.org/10.1007/3-540-38424-3_24},
  doi       = {10.1007/3-540-38424-3_24},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BeaverFS90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/Feigenbaum90,
  author    = {Joan Feigenbaum},
  title     = {Locally Random Reductions in Interactive Complexity Theory},
  booktitle = {Advances In Computational Complexity Theory, Proceedings of a {DIMACS}
               Workshop, New Jersey, USA, December 3-7, 1990},
  pages     = {73--98},
  year      = {1990},
  crossref  = {DBLP:conf/dimacs/dimacs13},
  timestamp = {Fri, 15 Jan 2016 23:13:03 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/Feigenbaum90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stacs/BeaverF90,
  author    = {Donald Beaver and
               Joan Feigenbaum},
  title     = {Hiding Instances in Multioracle Queries},
  booktitle = {{STACS} 90, 7th Annual Symposium on Theoretical Aspects of Computer
               Science, Rouen, France, February 22-24, 1990, Proceedings},
  pages     = {37--48},
  year      = {1990},
  crossref  = {DBLP:conf/stacs/1990},
  url       = {https://doi.org/10.1007/3-540-52282-4_30},
  doi       = {10.1007/3-540-52282-4_30},
  timestamp = {Fri, 19 May 2017 13:10:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stacs/BeaverF90},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/AbadiFK89,
  author    = {Mart{\'{\i}}n Abadi and
               Joan Feigenbaum and
               Joe Kilian},
  title     = {On Hiding Information from an Oracle},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {39},
  number    = {1},
  pages     = {21--50},
  year      = {1989},
  url       = {https://doi.org/10.1016/0022-0000(89)90018-4},
  doi       = {10.1016/0022-0000(89)90018-4},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jcss/AbadiFK89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamdm/FeigenbaumH89,
  author    = {Joan Feigenbaum and
               Ramsey W. Haddad},
  title     = {On Factorable Extensions and Subgraphs of Prime Graphs},
  journal   = {{SIAM} J. Discrete Math.},
  volume    = {2},
  number    = {2},
  pages     = {197--218},
  year      = {1989},
  url       = {https://doi.org/10.1137/0402017},
  doi       = {10.1137/0402017},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/siamdm/FeigenbaumH89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sigact/Feigenbaum89,
  author    = {Joan Feigenbaum},
  title     = {Report on {DIMACS} seminar series},
  journal   = {{SIGACT} News},
  volume    = {20},
  number    = {4},
  pages     = {48--49},
  year      = {1989},
  url       = {http://doi.acm.org/10.1145/74074.74084},
  doi       = {10.1145/74074.74084},
  timestamp = {Mon, 25 Jan 2010 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/sigact/Feigenbaum89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/FeigenbaumM89,
  author    = {Joan Feigenbaum and
               Michael Merritt},
  title     = {Open Questions, Talk Abstracts, and Summary of Discussions},
  booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
               Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  pages     = {1--46},
  year      = {1989},
  crossref  = {DBLP:conf/dimacs/dimacs2},
  timestamp = {Wed, 13 Jan 2016 17:47:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/FeigenbaumM89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/FeigenbaumLW89,
  author    = {Joan Feigenbaum and
               Mark Y. Liberman and
               Rebecca N. Wright},
  title     = {Cryptographic Protection of Databases and Software},
  booktitle = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
               Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  pages     = {161--172},
  year      = {1989},
  crossref  = {DBLP:conf/dimacs/dimacs2},
  timestamp = {Wed, 13 Jan 2016 17:47:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/FeigenbaumLW89},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbadiABFH88,
  author    = {Mart{\'{\i}}n Abadi and
               Eric Allender and
               Andrei Z. Broder and
               Joan Feigenbaum and
               Lane A. Hemachandra},
  title     = {On Generating Solved Instances of Computational Problems},
  booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  pages     = {297--310},
  year      = {1988},
  crossref  = {DBLP:conf/crypto/1988},
  url       = {https://doi.org/10.1007/0-387-34799-2_23},
  doi       = {10.1007/0-387-34799-2_23},
  timestamp = {Fri, 19 May 2017 13:10:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/AbadiABFH88},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stacs/AbadiF88,
  author    = {Mart{\'{\i}}n Abadi and
               Joan Feigenbaum},
  title     = {A Simple Protocol for Secure Circuit Evaluation},
  booktitle = {{STACS} 88, 5th Annual Symposium on Theoretical Aspects of Computer
               Science, Bordeaux, France, February 11-13, 1988, Proceedings},
  pages     = {264--272},
  year      = {1988},
  crossref  = {DBLP:conf/stacs/1988},
  url       = {https://doi.org/10.1007/BFb0035850},
  doi       = {10.1007/BFb0035850},
  timestamp = {Fri, 19 May 2017 13:10:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stacs/AbadiF88},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/coco/AbadiFK87,
  author    = {Mart{\'{\i}}n Abadi and
               Joan Feigenbaum and
               Joe Kilian},
  title     = {On hiding information from an oracle},
  booktitle = {Proceedings of the Second Annual Conference on Structure in Complexity
               Theory, Cornell University, Ithaca, New York, USA, June 16-19, 1987},
  year      = {1987},
  crossref  = {DBLP:conf/coco/1987},
  timestamp = {Tue, 22 Jan 2013 14:30:11 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/AbadiFK87},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/AbadiFK87,
  author    = {Mart{\'{\i}}n Abadi and
               Joan Feigenbaum and
               Joe Kilian},
  title     = {On Hiding Information from an Oracle (Extended Abstract)},
  booktitle = {Proceedings of the 19th Annual {ACM} Symposium on Theory of Computing,
               1987, New York, New York, {USA}},
  pages     = {195--203},
  year      = {1987},
  crossref  = {DBLP:conf/stoc/STOC19},
  url       = {http://doi.acm.org/10.1145/28395.28417},
  doi       = {10.1145/28395.28417},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/AbadiFK87},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dam/Feigenbaum86,
  author    = {Joan Feigenbaum},
  title     = {Directed cartesian-product graphs have unique factorizations that
               can be computed in polynomial time},
  journal   = {Discrete Applied Mathematics},
  volume    = {15},
  number    = {1},
  pages     = {105--110},
  year      = {1986},
  url       = {https://doi.org/10.1016/0166-218X(86)90023-5},
  doi       = {10.1016/0166-218X(86)90023-5},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dam/Feigenbaum86},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/FeigenbaumS86,
  author    = {Joan Feigenbaum and
               Alejandro A. Sch{\"{a}}ffer},
  title     = {Recognizing Composite Graphs is Equivalent to Testing Graph Isomorphism},
  journal   = {{SIAM} J. Comput.},
  volume    = {15},
  number    = {2},
  pages     = {619--627},
  year      = {1986},
  url       = {https://doi.org/10.1137/0215045},
  doi       = {10.1137/0215045},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/siamcomp/FeigenbaumS86},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/aaai/SubramanianF86,
  author    = {Devika Subramanian and
               Joan Feigenbaum},
  title     = {Factorization in Experiment Generation},
  booktitle = {Proceedings of the 5th National Conference on Artificial Intelligence.
               Philadelphia, PA, August 11-15, 1986. Volume 1: Science.},
  pages     = {518--522},
  year      = {1986},
  crossref  = {DBLP:conf/aaai/1986-1},
  url       = {http://www.aaai.org/Library/AAAI/1986/aaai86-087.php},
  timestamp = {Wed, 12 Dec 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/aaai/SubramanianF86},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dam/FeigenbaumHS85,
  author    = {Joan Feigenbaum and
               John Hershberger and
               Alejandro A. Sch{\"{a}}ffer},
  title     = {A polynomial time algorithm for finding the prime factors of cartesian-product
               graphs},
  journal   = {Discrete Applied Mathematics},
  volume    = {12},
  number    = {2},
  pages     = {123--138},
  year      = {1985},
  url       = {https://doi.org/10.1016/0166-218X(85)90066-6},
  doi       = {10.1016/0166-218X(85)90066-6},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dam/FeigenbaumHS85},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Feigenbaum85,
  author    = {Joan Feigenbaum},
  title     = {Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone
               Without Having to Trust Him?},
  booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
               USA, August 18-22, 1985, Proceedings},
  pages     = {477--488},
  year      = {1985},
  crossref  = {DBLP:conf/crypto/1985},
  url       = {https://doi.org/10.1007/3-540-39799-X_38},
  doi       = {10.1007/3-540-39799-X_38},
  timestamp = {Fri, 19 May 2017 12:26:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/Feigenbaum85},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tods/KorthKFGU84,
  author    = {Henry F. Korth and
               Gabriel M. Kuper and
               Joan Feigenbaum and
               Allen Van Gelder and
               Jeffrey D. Ullman},
  title     = {System/U: {A} Database System Based on the Universal Relation Assumption},
  journal   = {{ACM} Trans. Database Syst.},
  volume    = {9},
  number    = {3},
  pages     = {331--347},
  year      = {1984},
  url       = {http://doi.acm.org/10.1145/1270.1209},
  doi       = {10.1145/1270.1209},
  timestamp = {Thu, 30 Mar 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tods/KorthKFGU84},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2016w,
  editor    = {Jeremy Clark and
               Sarah Meiklejohn and
               Peter Y. A. Ryan and
               Dan S. Wallach and
               Michael Brenner and
               Kurt Rohloff},
  title     = {Financial Cryptography and Data Security - {FC} 2016 International
               Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
               26, 2016, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9604},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53357-4},
  doi       = {10.1007/978-3-662-53357-4},
  isbn      = {978-3-662-53356-7},
  timestamp = {Fri, 26 May 2017 00:50:27 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/2016w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wpes/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Sabrina De Capitani di Vimercati},
  title     = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
               Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://doi.acm.org/10.1145/2994620},
  doi       = {10.1145/2994620},
  isbn      = {978-1-4503-4569-9},
  timestamp = {Mon, 06 Mar 2017 08:12:38 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wpes/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/spw/2015,
  editor    = {Bruce Christianson and
               Petr Svenda and
               Vashek Maty{\'{a}}s and
               James A. Malcolm and
               Frank Stajano and
               Jonathan Anderson},
  title     = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
               UK, March 31 - April 2, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9379},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-26096-9},
  doi       = {10.1007/978-3-319-26096-9},
  isbn      = {978-3-319-26095-2},
  timestamp = {Thu, 25 May 2017 00:42:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014,
  editor    = {Gail{-}Joon Ahn and
               Moti Yung and
               Ninghui Li},
  title     = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2660267},
  isbn      = {978-1-4503-2957-6},
  timestamp = {Mon, 10 Nov 2014 10:57:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2014w,
  editor    = {Rainer B{\"{o}}hme and
               Michael Brenner and
               Tyler Moore and
               Matthew Smith},
  title     = {Financial Cryptography and Data Security - {FC} 2014 Workshops, {BITCOIN}
               and {WAHC} 2014, Christ Church, Barbados, March 7, 2014, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8438},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44774-1},
  doi       = {10.1007/978-3-662-44774-1},
  isbn      = {978-3-662-44773-4},
  timestamp = {Fri, 26 May 2017 00:50:27 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/2014w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/hotsos/2014,
  editor    = {Laurie A. Williams and
               David M. Nicol and
               Munindar P. Singh},
  title     = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
               HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2600176},
  isbn      = {978-1-4503-2907-1},
  timestamp = {Tue, 05 May 2015 15:28:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/hotsos/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/scn/2014,
  editor    = {Michel Abdalla and
               Roberto De Prisco},
  title     = {Security and Cryptography for Networks - 9th International Conference,
               {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8642},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-10879-7},
  doi       = {10.1007/978-3-319-10879-7},
  isbn      = {978-3-319-10878-0},
  timestamp = {Sat, 16 Sep 2017 12:10:18 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/scn/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/spw/2014,
  editor    = {Bruce Christianson and
               James A. Malcolm and
               Vashek Maty{\'{a}}s and
               Petr Svenda and
               Frank Stajano and
               Jonathan Anderson},
  title     = {Security Protocols {XXII} - 22nd International Workshop Cambridge,
               UK, March 19-21, 2014 Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8809},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-12400-1},
  doi       = {10.1007/978-3-319-12400-1},
  isbn      = {978-3-319-12399-8},
  timestamp = {Thu, 25 May 2017 00:42:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2014foci,
  editor    = {Jedidiah R. Crandall and
               Vern Paxson},
  title     = {4th {USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '14, San Diego, CA, USA, August 18, 2014},
  publisher = {{USENIX} Association},
  year      = {2014},
  url       = {https://www.usenix.org/conference/foci14},
  timestamp = {Wed, 10 Sep 2014 16:41:03 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2014foci},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013ccsw,
  editor    = {Ari Juels and
               Bryan Parno},
  title     = {CCSW'13, Proceedings of the 2013 {ACM} Cloud Computing Security Workshop,
               Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517488},
  isbn      = {978-1-4503-2490-8},
  timestamp = {Mon, 13 Jan 2014 21:21:49 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2013ccsw},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2012,
  editor    = {Srikanth Kandula and
               Jitendra Padhye and
               Emin G{\"{u}}n Sirer and
               Ramesh Govindan},
  title     = {11th {ACM} Workshop on Hot Topics in Networks, HotNets-XI, Redmond,
               WA, {USA} - October 29 - 30, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2390231},
  isbn      = {978-1-4503-1776-4},
  timestamp = {Fri, 16 Nov 2012 09:48:13 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/hotnets/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/lics/2012,
  title     = {Proceedings of the 27th Annual {IEEE} Symposium on Logic in Computer
               Science, {LICS} 2012, Dubrovnik, Croatia, June 25-28, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6275587},
  isbn      = {978-1-4673-2263-8},
  timestamp = {Fri, 21 Nov 2014 14:08:56 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/lics/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/podc/2012,
  editor    = {Darek Kowalski and
               Alessandro Panconesi},
  title     = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '12,
               Funchal, Madeira, Portugal, July 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2332432},
  isbn      = {978-1-4503-1450-3},
  timestamp = {Sun, 15 Jul 2012 18:41:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/podc/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wine/2012,
  editor    = {Paul W. Goldberg},
  title     = {Internet and Network Economics - 8th International Workshop, {WINE}
               2012, Liverpool, UK, December 10-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7695},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35311-6},
  doi       = {10.1007/978-3-642-35311-6},
  isbn      = {978-3-642-35310-9},
  timestamp = {Fri, 26 May 2017 00:49:40 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wine/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/nspw/2011,
  editor    = {Sean Peisert and
               Richard Ford and
               Carrie Gates and
               Cormac Herley},
  title     = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
               USA, September 12-15, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2073276},
  isbn      = {978-1-4503-1078-9},
  timestamp = {Tue, 13 Nov 2012 21:22:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/nspw/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/websci/2011,
  editor    = {David De Roure and
               Marshall Scott Poole},
  title     = {Web Science 2011, WebSci '11, Koblenz, Germany - June 15 - 17, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2527031},
  isbn      = {978-1-4503-0855-7},
  timestamp = {Wed, 25 Jun 2014 13:51:56 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/websci/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pet/2010,
  editor    = {Mikhail J. Atallah and
               Nicholas J. Hopper},
  title     = {Privacy Enhancing Technologies, 10th International Symposium, {PETS}
               2010, Berlin, Germany, July 21-23, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6205},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14527-8},
  doi       = {10.1007/978-3-642-14527-8},
  isbn      = {978-3-642-14526-1},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pet/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2010,
  editor    = {David C. Parkes and
               Chrysanthos Dellarocas and
               Moshe Tennenholtz},
  title     = {Proceedings 11th {ACM} Conference on Electronic Commerce (EC-2010),
               Cambridge, Massachusetts, USA, June 7-11, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-60558-822-3},
  timestamp = {Mon, 24 Feb 2014 16:09:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2007,
  editor    = {Sven Dietrich and
               Rachna Dhamija},
  title     = {Financial Cryptography and Data Security, 11th International Conference,
               {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
               2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4886},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-77366-5},
  doi       = {10.1007/978-3-540-77366-5},
  isbn      = {978-3-540-77365-8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wpes/2007,
  editor    = {Peng Ning and
               Ting Yu},
  title     = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-883-1},
  timestamp = {Mon, 07 Apr 2008 08:32:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wpes/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cikm/2006,
  editor    = {Philip S. Yu and
               Vassilis J. Tsotras and
               Edward A. Fox and
               Bing Liu},
  title     = {Proceedings of the 2006 {ACM} {CIKM} International Conference on Information
               and Knowledge Management, Arlington, Virginia, USA, November 6-11,
               2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-433-2},
  timestamp = {Mon, 14 May 2012 09:20:40 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cikm/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2006,
  editor    = {Joan Feigenbaum and
               John C.{-}I. Chuang and
               David M. Pennock},
  title     = {Proceedings 7th {ACM} Conference on Electronic Commerce (EC-2006),
               Ann Arbor, Michigan, USA, June 11-15, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-236-4},
  timestamp = {Mon, 24 Feb 2014 16:09:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/minenet/2005,
  editor    = {Subhabrata Sen and
               Chuanyi Ji and
               Debanjan Saha and
               Joe McCloskey},
  title     = {Proceedings of the 1st Annual {ACM} Workshop on Mining Network Data,
               MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-026-4},
  timestamp = {Wed, 23 Apr 2008 14:54:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/minenet/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/soda/2005,
  title     = {Proceedings of the Sixteenth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, {SODA} 2005, Vancouver, British Columbia, Canada, January
               23-25, 2005},
  publisher = {{SIAM}},
  year      = {2005},
  url       = {http://dl.acm.org/citation.cfm?id=1070432},
  isbn      = {0-89871-585-7},
  timestamp = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soda/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/weis/2005,
  title     = {4th Annual Workshop on the Economics of Information Security, {WEIS}
               2005, Harvard University, Cambridge, MA, USA, June 1-3, 2005},
  year      = {2005},
  url       = {http://infosecon.net/workshop/schedule.php},
  timestamp = {Fri, 13 Jan 2017 12:13:07 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/weis/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wine/2005,
  editor    = {Xiaotie Deng and
               Yinyu Ye},
  title     = {Internet and Network Economics, First International Workshop, {WINE}
               2005, Hong Kong, China, December 15-17, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3828},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11600930},
  doi       = {10.1007/11600930},
  isbn      = {3-540-30900-4},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wine/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/esorics/2004,
  editor    = {Pierangela Samarati and
               Peter Y. A. Ryan and
               Dieter Gollmann and
               Refik Molva},
  title     = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
               Computer Security, Sophia Antipolis, France, September 13-15, 2004,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3193},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b100085},
  doi       = {10.1007/b100085},
  isbn      = {3-540-22987-6},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/esorics/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icalp/2004,
  editor    = {Josep D{\'{\i}}az and
               Juhani Karhum{\"{a}}ki and
               Arto Lepist{\"{o}} and
               Donald Sannella},
  title     = {Automata, Languages and Programming: 31st International Colloquium,
               {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3142},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b99859},
  doi       = {10.1007/b99859},
  isbn      = {3-540-22849-7},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icalp/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/podc/2004,
  editor    = {Soma Chaudhuri and
               Shay Kutten},
  title     = {Proceedings of the Twenty-Third Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2004, St. John's, Newfoundland, Canada,
               July 25-28, 2004},
  publisher = {{ACM}},
  year      = {2004},
  url       = {http://dl.acm.org/citation.cfm?id=1011767},
  isbn      = {1-58113-802-4},
  timestamp = {Wed, 23 May 2012 14:26:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/podc/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2003,
  title     = {Proceedings 4th {ACM} Conference on Electronic Commerce (EC-2003),
               San Diego, California, USA, June 9-12, 2003},
  publisher = {{ACM}},
  year      = {2003},
  isbn      = {1-58113-679-X},
  timestamp = {Mon, 24 Feb 2014 16:09:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dialm/2002,
  title     = {Proceedings of the 6th International Workshop on Discrete Algorithms
               and Methods for Mobile Computing and Communications {(DIAL-M} 2002),
               Atlanta, Georgia, USA, September 28-28, 2002},
  publisher = {{ACM}},
  year      = {2002},
  isbn      = {1-58113-587-4},
  timestamp = {Thu, 23 Jun 2016 15:53:27 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dialm/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fsttcs/2002,
  editor    = {Manindra Agrawal and
               Anil Seth},
  title     = {{FST} {TCS} 2002: Foundations of Software Technology and Theoretical
               Computer Science, 22nd Conference Kanpur, India, December 12-14, 2002,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2556},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36206-1},
  doi       = {10.1007/3-540-36206-1},
  isbn      = {3-540-00225-1},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fsttcs/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/podc/2002,
  editor    = {Aleta Ricciardi},
  title     = {Proceedings of the Twenty-First Annual {ACM} Symposium on Principles
               of Distributed Computing, {PODC} 2002, Monterey, California, USA,
               July 21-24, 2002},
  publisher = {{ACM}},
  year      = {2002},
  url       = {http://dl.acm.org/citation.cfm?id=571825},
  isbn      = {1-58113-485-1},
  timestamp = {Wed, 23 May 2012 14:26:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/podc/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2001drm,
  editor    = {Tomas Sander},
  title     = {Security and Privacy in Digital Rights Management, {ACM} {CCS-8} Workshop
               {DRM} 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2320},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-47870-1},
  doi       = {10.1007/3-540-47870-1},
  isbn      = {3-540-43677-4},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2001drm},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2001,
  editor    = {Paul F. Syverson},
  title     = {Financial Cryptography, 5th International Conference, {FC} 2001, Grand
               Cayman, British West Indies, February 19-22, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2339},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-46088-8},
  doi       = {10.1007/3-540-46088-8},
  isbn      = {3-540-44079-8},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icalp/2001,
  editor    = {Fernando Orejas and
               Paul G. Spirakis and
               Jan van Leeuwen},
  title     = {Automata, Languages and Programming, 28th International Colloquium,
               {ICALP} 2001, Crete, Greece, July 8-12, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2076},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-48224-5},
  doi       = {10.1007/3-540-48224-5},
  isbn      = {3-540-42287-0},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icalp/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sigecom/2001,
  title     = {Proceedings 3rd {ACM} Conference on Electronic Commerce (EC-2001),
               Tampa, Florida, USA, October 14-17, 2001},
  publisher = {{ACM}},
  year      = {2001},
  isbn      = {1-58113-387-1},
  timestamp = {Mon, 24 Feb 2014 16:09:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sigecom/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/soda/2000,
  editor    = {David B. Shmoys},
  title     = {Proceedings of the Eleventh Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, January 9-11, 2000, San Francisco, CA, {USA}},
  publisher = {{ACM/SIAM}},
  year      = {2000},
  url       = {http://dl.acm.org/citation.cfm?id=338219},
  isbn      = {0-89871-453-2},
  timestamp = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soda/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/2000,
  title     = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California,
               USA, May 14-17, 2000},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6864},
  isbn      = {0-7695-0665-8},
  timestamp = {Thu, 08 Jan 2015 16:59:41 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2000,
  editor    = {F. Frances Yao and
               Eugene M. Luks},
  title     = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
               of Computing, May 21-23, 2000, Portland, OR, {USA}},
  publisher = {{ACM}},
  year      = {2000},
  isbn      = {1-58113-184-4},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/csfw/1999,
  title     = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop,
               {CSFW} 1999, Mordano, Italy, June 28-30, 1999},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6332},
  isbn      = {0-7695-0201-6},
  timestamp = {Fri, 13 May 2016 11:52:41 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/csfw/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ecoopw/1999secure,
  editor    = {Jan Vitek and
               Christian Damsgaard Jensen},
  title     = {Secure Internet Programming, Security Issues for Mobile and Distributed
               Objects},
  series    = {Lecture Notes in Computer Science},
  volume    = {1603},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48749-2},
  doi       = {10.1007/3-540-48749-2},
  isbn      = {3-540-66130-1},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ecoopw/1999secure},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/1999,
  editor    = {Matthew K. Franklin},
  title     = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
               British West Indies, February 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1648},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48390-X},
  doi       = {10.1007/3-540-48390-X},
  isbn      = {3-540-66362-2},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/1999,
  title     = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99,
               17-18 October, 1999, New York, NY, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6604},
  isbn      = {0-7695-0409-4},
  timestamp = {Mon, 15 Dec 2014 18:48:45 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/soda/1999,
  editor    = {Robert Endre Tarjan and
               Tandy J. Warnow},
  title     = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
               17-19 January 1999, Baltimore, Maryland},
  publisher = {{ACM/SIAM}},
  year      = {1999},
  url       = {http://dl.acm.org/citation.cfm?id=314500},
  isbn      = {0-89871-434-6},
  timestamp = {Mon, 14 Mar 2016 15:38:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soda/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crc/1999drm,
  editor    = {Kenneth H. Rosen and
               John G. Michaels and
               Jonathan L. Gross and
               Jerrold W. Grossman and
               Douglas R. Shier},
  title     = {Handbook of Discrete and Combinatorial Mathematics},
  publisher = {{CRC} Press},
  year      = {1999},
  url       = {https://doi.org/10.1201/9781439832905},
  doi       = {10.1201/9781439832905},
  isbn      = {978-0-8493-0149-0},
  timestamp = {Tue, 16 May 2017 14:02:18 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crc/1999drm},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/98,
  editor    = {Kaisa Nyberg},
  title     = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
               on the Theory and Application of Cryptographic Techniques, Espoo,
               Finland, May 31 - June 4, 1998, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1403},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0054112},
  doi       = {10.1007/BFb0054112},
  isbn      = {3-540-64518-7},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/1998,
  editor    = {Rafael Hirschfeld},
  title     = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
               British West Indies, February 23-25, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1465},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0055468},
  doi       = {10.1007/BFb0055468},
  isbn      = {3-540-64951-4},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/spw/1998,
  editor    = {Bruce Christianson and
               Bruno Crispo and
               William S. Harbison and
               Michael Roe},
  title     = {Security Protocols, 6th International Workshop, Cambridge, UK, April
               15-17, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1550},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-49135-X},
  doi       = {10.1007/3-540-49135-X},
  isbn      = {3-540-65663-4},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spw/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stacs/1998,
  editor    = {Michel Morvan and
               Christoph Meinel and
               Daniel Krob},
  title     = {{STACS} 98, 15th Annual Symposium on Theoretical Aspects of Computer
               Science, Paris, France, February 25-27, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1373},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0028542},
  doi       = {10.1007/BFb0028542},
  isbn      = {3-540-64230-7},
  timestamp = {Tue, 23 May 2017 11:53:57 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stacs/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stacs/1997,
  editor    = {R{\"{u}}diger Reischuk and
               Michel Morvan},
  title     = {{STACS} 97, 14th Annual Symposium on Theoretical Aspects of Computer
               Science, L{\"{u}}beck, Germany, February 27 - March 1, 1997,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1200},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0023443},
  doi       = {10.1007/BFb0023443},
  isbn      = {3-540-62616-6},
  timestamp = {Mon, 22 May 2017 17:11:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stacs/1997},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/1996,
  editor    = {Steven Homer and
               Jin{-}Yi Cai},
  title     = {Proceedings of the Eleveth Annual {IEEE} Conference on Computational
               Complexity, Philadelphia, Pennsylvania, USA, May 24-27, 1996},
  publisher = {{IEEE} Computer Society},
  year      = {1996},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=3765},
  isbn      = {0-8186-7386-9},
  timestamp = {Fri, 13 May 2016 10:34:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/1996},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icalp/1996,
  editor    = {Friedhelm Meyer auf der Heide and
               Burkhard Monien},
  title     = {Automata, Languages and Programming, 23rd International Colloquium,
               ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1099},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-61440-0},
  doi       = {10.1007/3-540-61440-0},
  isbn      = {3-540-61440-0},
  timestamp = {Mon, 22 May 2017 16:14:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icalp/1996},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/1996,
  title     = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
               CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {1996},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=3742},
  isbn      = {0-8186-7417-2},
  timestamp = {Thu, 08 Jan 2015 16:59:41 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/1996},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/1995,
  title     = {Proceedings of the Tenth Annual Structure in Complexity Theory Conference,
               Minneapolis, Minnesota, USA, June 19-22, 1995},
  publisher = {{IEEE} Computer Society},
  year      = {1995},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=3938},
  isbn      = {0-8186-7052-5},
  timestamp = {Fri, 13 May 2016 10:37:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/1995},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/1994,
  title     = {Proceedings of the Ninth Annual Structure in Complexity Theory Conference,
               Amsterdam, The Netherlands, June 28 - July 1, 1994},
  publisher = {{IEEE} Computer Society},
  year      = {1994},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=967},
  isbn      = {0-8186-5670-0},
  timestamp = {Fri, 13 May 2016 10:38:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/1994},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC25,
  editor    = {S. Rao Kosaraju and
               David S. Johnson and
               Alok Aggarwal},
  title     = {Proceedings of the Twenty-Fifth Annual {ACM} Symposium on Theory of
               Computing, May 16-18, 1993, San Diego, CA, {USA}},
  publisher = {{ACM}},
  year      = {1993},
  isbn      = {0-89791-591-7},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/STOC25},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/1992,
  title     = {Proceedings of the Seventh Annual Structure in Complexity Theory Conference,
               Boston, Massachusetts, USA, June 22-25, 1992},
  publisher = {{IEEE} Computer Society},
  year      = {1992},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=430},
  isbn      = {0-8186-2955-X},
  timestamp = {Fri, 13 May 2016 10:38:51 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/1992},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1991,
  editor    = {Hideki Imai and
               Ronald L. Rivest and
               Tsutomu Matsumoto},
  title     = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
               on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
               November 11-14, 1991, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {739},
  publisher = {Springer},
  year      = {1993},
  url       = {https://doi.org/10.1007/3-540-57332-1},
  doi       = {10.1007/3-540-57332-1},
  isbn      = {3-540-57332-1},
  timestamp = {Sat, 20 May 2017 15:32:54 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/1991},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cav/1991,
  editor    = {Kim Guldstrand Larsen and
               Arne Skou},
  title     = {Computer Aided Verification, 3rd International Workshop, {CAV} '91,
               Aalborg, Denmark, July, 1-4, 1991, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {575},
  publisher = {Springer},
  year      = {1992},
  url       = {https://doi.org/10.1007/3-540-55179-4},
  doi       = {10.1007/3-540-55179-4},
  isbn      = {3-540-55179-4},
  timestamp = {Sat, 20 May 2017 15:32:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cav/1991},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/1991,
  title     = {Proceedings of the Sixth Annual Structure in Complexity Theory Conference,
               Chicago, Illinois, USA, June 30 - July 3, 1991},
  publisher = {{IEEE} Computer Society},
  year      = {1991},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=364},
  isbn      = {0-8186-2255-5},
  timestamp = {Fri, 13 May 2016 10:39:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/1991},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/FOCS32,
  title     = {32nd Annual Symposium on Foundations of Computer Science, San Juan,
               Puerto Rico, 1-4 October 1991},
  publisher = {{IEEE} Computer Society},
  year      = {1991},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=379},
  isbn      = {0-8186-2445-0},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/FOCS32},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/1990,
  title     = {Proceedings: Fifth Annual Structure in Complexity Theory Conference,
               Universitat Polit{\`{e}}cnica de Catalunya, Barcelona, Spain, July
               8-11, 1990},
  publisher = {{IEEE} Computer Society},
  year      = {1990},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=476},
  isbn      = {0-8186-2072-2},
  timestamp = {Fri, 13 May 2016 10:39:30 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/1990},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1990,
  editor    = {Alfred Menezes and
               Scott A. Vanstone},
  title     = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {537},
  publisher = {Springer},
  year      = {1991},
  url       = {https://doi.org/10.1007/3-540-38424-3},
  doi       = {10.1007/3-540-38424-3},
  isbn      = {3-540-54508-5},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1990},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dimacs/dimacs13,
  editor    = {Jin{-}Yi Cai},
  title     = {Advances In Computational Complexity Theory, Proceedings of a {DIMACS}
               Workshop, New Jersey, USA, December 3-7, 1990},
  series    = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume    = {13},
  publisher = {{DIMACS/AMS}},
  year      = {1993},
  url       = {http://dimacs.rutgers.edu/Volumes/Vol13.html},
  timestamp = {Fri, 15 Jan 2016 23:13:03 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/dimacs13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stacs/1990,
  editor    = {Christian Choffrut and
               Thomas Lengauer},
  title     = {{STACS} 90, 7th Annual Symposium on Theoretical Aspects of Computer
               Science, Rouen, France, February 22-24, 1990, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {415},
  publisher = {Springer},
  year      = {1990},
  url       = {https://doi.org/10.1007/3-540-52282-4},
  doi       = {10.1007/3-540-52282-4},
  isbn      = {3-540-52282-4},
  timestamp = {Fri, 19 May 2017 13:10:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stacs/1990},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dimacs/dimacs2,
  editor    = {Joan Feigenbaum and
               Michael Merritt},
  title     = {Distributed Computing And Cryptography, Proceedings of a {DIMACS}
               Workshop, Princeton, New Jersey, USA, October 4-6, 1989},
  series    = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume    = {2},
  publisher = {{DIMACS/AMS}},
  year      = {1991},
  url       = {http://dimacs.rutgers.edu/Volumes/Vol02.html},
  timestamp = {Wed, 13 Jan 2016 17:47:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/dimacs2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1988,
  editor    = {Shafi Goldwasser},
  title     = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {403},
  publisher = {Springer},
  year      = {1990},
  url       = {https://doi.org/10.1007/0-387-34799-2},
  doi       = {10.1007/0-387-34799-2},
  isbn      = {3-540-97196-3},
  timestamp = {Fri, 19 May 2017 13:10:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1988},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stacs/1988,
  editor    = {Robert Cori and
               Martin Wirsing},
  title     = {{STACS} 88, 5th Annual Symposium on Theoretical Aspects of Computer
               Science, Bordeaux, France, February 11-13, 1988, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {294},
  publisher = {Springer},
  year      = {1988},
  url       = {https://doi.org/10.1007/BFb0035825},
  doi       = {10.1007/BFb0035825},
  isbn      = {3-540-18834-7},
  timestamp = {Fri, 19 May 2017 13:10:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stacs/1988},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/1987,
  title     = {Proceedings of the Second Annual Conference on Structure in Complexity
               Theory, Cornell University, Ithaca, New York, USA, June 16-19, 1987},
  publisher = {{IEEE} Computer Society},
  year      = {1987},
  timestamp = {Tue, 22 Jan 2013 14:30:11 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/1987},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/STOC19,
  editor    = {Alfred V. Aho},
  title     = {Proceedings of the 19th Annual {ACM} Symposium on Theory of Computing,
               1987, New York, New York, {USA}},
  publisher = {{ACM}},
  year      = {1987},
  isbn      = {0-89791-221-7},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/STOC19},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/aaai/1986-1,
  editor    = {Tom Kehler},
  title     = {Proceedings of the 5th National Conference on Artificial Intelligence.
               Philadelphia, PA, August 11-15, 1986. Volume 1: Science},
  publisher = {Morgan Kaufmann},
  year      = {1986},
  url       = {http://www.aaai.org/Conferences/AAAI/aaai86.php},
  timestamp = {Thu, 01 Dec 2011 17:16:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/aaai/1986-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1985,
  editor    = {Hugh C. Williams},
  title     = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
               USA, August 18-22, 1985, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {218},
  publisher = {Springer},
  year      = {1986},
  url       = {https://doi.org/10.1007/3-540-39799-X},
  doi       = {10.1007/3-540-39799-X},
  isbn      = {3-540-16463-4},
  timestamp = {Fri, 19 May 2017 12:26:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1985},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier