关注
Benny Pinkas
Benny Pinkas
Bar Ilan University and Aptos Labs
在 biu.ac.il 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Privacy preserving data mining
Y Lindell, B Pinkas
Annual international cryptology conference, 36-54, 2000
17642000
Efficient private matching and set intersection
MJ Freedman, K Nissim, B Pinkas
International conference on the theory and applications of cryptographic …, 2004
17212004
Fairplay-Secure Two-Party Computation System.
D Malkhi, N Nisan, B Pinkas, Y Sella
USENIX security symposium 4, 9, 2004
12162004
Multicast security: A taxonomy and some efficient constructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
INFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and …, 1999
11771999
Tracing traitors
B Chor, A Fiat, M Naor, B Pinkas
Information Theory, IEEE Transactions on 46 (3), 893-910, 2000
1165*2000
Efficient oblivious transfer protocols.
M Naor, B Pinkas
SODA 1, 448-457, 2001
10992001
Privacy preserving auctions and mechanism design
M Naor, B Pinkas, R Sumner
Proceedings of the 1st ACM Conference on Electronic Commerce, 129-139, 1999
10141999
Secure multiparty computation for privacy preserving data mining
Y Lindell
Encyclopedia of Data Warehousing and Mining, 1005-1009, 2005
9952005
A proof of security of Yao’s protocol for two-party computation
Y Lindell, B Pinkas
Journal of cryptology 22, 161-188, 2009
9842009
Proofs of ownership in remote storage systems
S Halevi, D Harnik, B Pinkas, A Shulman-Peleg
Proceedings of the 18th ACM conference on Computer and communications …, 2011
9292011
Oblivious transfer and polynomial evaluation
M Naor, B Pinkas
Proceedings of the thirty-first annual ACM symposium on Theory of computing …, 1999
8751999
Privacy preserving data mining
Lindell, Pinkas
Journal of cryptology 15, 177-206, 2002
8642002
Turning your weakness into a strength: Watermarking deep neural networks by backdooring
Y Adi, C Baum, M Cisse, B Pinkas, J Keshet
27th USENIX security symposium (USENIX Security 18), 1615-1631, 2018
8272018
Side channels in cloud services: Deduplication in cloud storage
D Harnik, B Pinkas, A Shulman-Peleg
IEEE Security & Privacy 8 (6), 40-47, 2010
7452010
FairplayMP: a system for secure multi-party computation
A Ben-David, N Nisan, B Pinkas
Proceedings of the 15th ACM conference on Computer and communications …, 2008
7342008
Secure two-party computation is practical
B Pinkas, T Schneider, NP Smart, SC Williams
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
6492009
Scalable private set intersection based on OT extension
B Pinkas, T Schneider, M Zohner
ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-35, 2018
6292018
Efficient trace and revoke schemes
M Naor, B Pinkas
Financial Cryptography: 4th International Conference, FC 2000 Anguilla …, 2001
6062001
Cryptographic techniques for privacy-preserving data mining
B Pinkas
ACM Sigkdd Explorations Newsletter 4 (2), 12-19, 2002
5972002
Keyword search and oblivious pseudorandom functions
MJ Freedman, Y Ishai, B Pinkas, O Reingold
Theory of Cryptography, 303-324, 2005
5742005
系统目前无法执行此操作,请稍后再试。
文章 1–20