Cryptographers' World
 

Joan Feigenbaum


Author's Web Page Link

12 papers in database with 685 citations StarStar

Editor of 1 conference proceedings book

H-number: 9

Conference Proceedings

 
1. Joan Feigenbaum, editor, Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings. Springer, 1992. ISBN 3-540-55188-3.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Donald Beaver,  Joan Feigenbaum,  Joe Kilian,  Phillip Rogaway,  Locally Random Reductions: Improvements and Applications, Journal of Cryptology, Volume 10(1), pp. 17 - 36, Springer, 1997.

[Cited 40 times ]

2. Martín Abadi,  Joan Feigenbaum,  Secure Circuit Evaluation, Journal of Cryptology, Volume 2(1), pp. 1 - 12, Springer, 1990.

[Cited 121 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Joan Feigenbaum,  Aaron Johnson,  Paul F. Syverson,  A Model of Onion Routing with Provable Anonymity, pp. 57 - 71, FC 2007.

[Electronic Edition][Cited 6 times ]

2. Ninghui Li,  Joan Feigenbaum,  Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation, pp. 157 - 168, FC 2001.

[Electronic Edition][Cited 11 times ]

3. Jon Callas,  Joan Feigenbaum,  David M. Goldschlag,  Erin Sawyer,  Fair Use, Intellectual Property, and the Information Economy (Panel Session Summary), pp. 173 - 183, FC 1999.

[Electronic Edition][Cited 1 times ]

4. Matt Blaze,  Joan Feigenbaum,  Moni Naor,  A Formal Treatment of Remotely Keyed Encryption, pp. 251 - 265, EUROCRYPT 1998.

[Electronic Edition][Cited 59 times Red Star]

5. Matt Blaze,  Joan Feigenbaum,  Martin J. Strauss,  Compliance Checking in the PolicyMaker Trust Management System, pp. 254 - 274, FC 1998.

[Electronic Edition][Cited 253 times Red StarRed StarRed Star]

6. Joan Feigenbaum,  Rafail Ostrovsky,  A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems, pp. 352 - 359, ASIACRYPT 1991.

[Electronic Edition][Cited 2 times ]

7. Donald Beaver,  Joan Feigenbaum,  Joe Kilian,  Phillip Rogaway,  Security with Low Communication Overhead, pp. 62 - 76, CRYPTO 1990.

[Electronic Edition][Cited 89 times Red Star]

8. Donald Beaver,  Joan Feigenbaum,  Victor Shoup,  Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract), pp. 326 - 338, CRYPTO 1990.

[Electronic Edition][Cited 24 times ]

9. Martín Abadi,  Eric Allender,  Andrei Z. Broder,  Joan Feigenbaum,  Lane A. Hemachandra,  On Generating Solved Instances of Computational Problems, pp. 297 - 310, CRYPTO 1988.

[Electronic Edition][Cited 23 times ]

10. Joan Feigenbaum,  Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him?, pp. 477 - 488, CRYPTO 1985.

[Electronic Edition][Cited 56 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...