Moni Naor
Moni Naor
Professor of Computer Science, Weizmann Institute of Science
Verifierad e-postadress på weizmann.ac.il - Startsida
Titel
Citeras av
Citeras av
År
Visual cryptography
M Naor, A Shamir
Workshop on the Theory and Application of of Cryptographic Techniques, 1-12, 1994
33281994
Optimal aggregation algorithms for middleware
R Fagin, A Lotem, M Naor
Journal of computer and system sciences 66 (4), 614-656, 2003
23492003
Rank aggregation methods for the web
C Dwork, R Kumar, M Naor, D Sivakumar
Proceedings of the 10th international conference on World Wide Web, 613-622, 2001
19532001
Broadcast encryption
A Fiat, M Naor
Annual International Cryptology Conference, 480-491, 1993
18411993
Untraceable electronic cash
D Chaum, A Fiat, M Naor
Conference on the Theory and Application of Cryptography, 319-327, 1988
17961988
Nonmalleable cryptography
D Dolev, C Dwork, M Naor
SIAM review 45 (4), 727-784, 2003
17842003
Pricing via processing or combatting junk mail
C Dwork, M Naor
Annual International Cryptology Conference, 139-147, 1992
14191992
Revocation and tracing schemes for stateless receivers
D Naor, M Naor, J Lotspiech
Annual International Cryptology Conference, 41-62, 2001
14012001
Universal one-way hash functions and their cryptographic applications
M Naor, M Yung
Proceedings of the twenty-first annual ACM symposium on Theory of computing …, 1989
11631989
Public-key cryptosystems provably secure against chosen ciphertext attacks
M Naor, M Yung
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
11161990
Our data, ourselves: Privacy via distributed noise generation
C Dwork, K Kenthapadi, F McSherry, I Mironov, M Naor
Annual International Conference on the Theory and Applications of …, 2006
10992006
Multicast security: A taxonomy and some efficient constructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999
10601999
Viceroy: A scalable and dynamic emulation of the butterfly
D Malkhi, M Naor, D Ratajczak
Proceedings of the twenty-first annual symposium on Principles of …, 2002
9612002
Efficient oblivious transfer protocols.
M Naor, B Pinkas
SODA 1, 448-457, 2001
8452001
Small-bias probability spaces: Efficient constructions and applications
J Naor, M Naor
SIAM journal on computing 22 (4), 838-856, 1993
8381993
Tracing traitors
B Chor, A Fiat, M Naor
Annual International Cryptology Conference, 257-270, 1994
8271994
Privacy preserving auctions and mechanism design
M Naor, B Pinkas, R Sumner
Proceedings of the 1st ACM conference on Electronic commerce, 129-139, 1999
7921999
Oblivious transfer and polynomial evaluation
M Naor, B Pinkas
Proceedings of the thirty-first annual ACM symposium on Theory of computing …, 1999
7401999
Bit commitment using pseudorandomness
M Naor
Journal of cryptology 4 (2), 151-158, 1991
7191991
Number-theoretic constructions of efficient pseudo-random functions
M Naor, O Reingold
Journal of the ACM (JACM) 51 (2), 231-262, 2004
6882004
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20