Követés
Moni Naor
Moni Naor
Professor of Computer Science, Weizmann Institute of Science
E-mail megerősítve itt: weizmann.ac.il - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Visual cryptography
M Naor, A Shamir
Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application …, 1995
40731995
Optimal aggregation algorithms for middleware
R Fagin, A Lotem, M Naor
Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on …, 2001
26552001
Rank aggregation methods for the web
C Dwork, R Kumar, M Naor, D Sivakumar
Proceedings of the 10th international conference on World Wide Web, 613-622, 2001
23152001
Our data, ourselves: Privacy via distributed noise generation
C Dwork, K Kenthapadi, F McSherry, I Mironov, M Naor
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
23122006
Pricing via processing or combatting junk mail
C Dwork, M Naor
Annual international cryptology conference, 139-147, 1992
21631992
Broadcast encryption
A Fiat, M Naor
Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 1994
21331994
Untraceable electronic cash
D Chaum, A Fiat, M Naor
Advances in Cryptology—CRYPTO’88: Proceedings 8, 319-327, 1990
20731990
Non-malleable cryptography
D Dolev, C Dwork, M Naor
Proceedings of the twenty-third annual ACM symposium on Theory of computing …, 1991
20221991
Revocation and tracing schemes for stateless receivers
D Naor, M Naor, J Lotspiech
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
16102001
Public-key cryptosystems provably secure against chosen ciphertext attacks
M Naor, M Yung
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
13601990
Universal one-way hash functions and their cryptographic applications
M Naor, M Yung
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
13341989
Multicast security: A taxonomy and some efficient constructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999
11641999
Efficient oblivious transfer protocols.
M Naor, B Pinkas
SODA 1, 448-457, 2001
10642001
Viceroy: A scalable and dynamic emulation of the butterfly
D Malkhi, M Naor, D Ratajczak
Proceedings of the twenty-first annual symposium on Principles of …, 2002
10222002
Privacy preserving auctions and mechanism design
M Naor, B Pinkas, R Sumner
Proceedings of the 1st ACM Conference on Electronic Commerce, 129-139, 1999
9841999
Small-bias probability spaces: Efficient constructions and applications
J Naor, M Naor
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
9771990
Tracing traitors
B Chor, A Fiat, M Naor
Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology …, 1994
9341994
Number-theoretic constructions of efficient pseudo-random functions
M Naor, O Reingold
Journal of the ACM (JACM) 51 (2), 231-262, 2004
8912004
Bit commitment using pseudorandomness
M Naor
Journal of cryptology 4, 151-158, 1991
8731991
Oblivious transfer and polynomial evaluation
M Naor, B Pinkas
Proceedings of the thirty-first annual ACM symposium on Theory of computing …, 1999
8661999
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20