Kobbi Nissim
Kobbi Nissim
Dept. of Computer Science (Georgetown) & Center for Research on Computation and Society (Harvard)
Email verificata su georgetown.edu - Home page
TitoloCitata daAnno
Calibrating noise to sensitivity in private data analysis
C Dwork, F McSherry, K Nissim, A Smith
Theory of cryptography conference, 265-284, 2006
35702006
Calibrating noise to sensitivity in private data analysis
C Dwork, F McSherry, K Nissim, A Smith
TCC, 265-284, 2006
35552006
Evaluating 2-DNF Formulas on Ciphertexts.
D Boneh, EJ Goh, K Nissim
TCC, 325-341, 2005
16062005
Efficient private matching and set intersection
MJ Freedman, K Nissim, B Pinkas
International conference on the theory and applications of cryptographic …, 2004
11672004
Revealing information while preserving privacy
I Dinur, K Nissim
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on …, 2003
8352003
Smooth sensitivity and sampling in private data analysis
K Nissim, S Raskhodnikova, A Smith
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing …, 2007
7172007
Practical privacy: the SuLQ framework
A Blum, C Dwork, F McSherry, K Nissim
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on …, 2005
7092005
Certificate revocation and certificate update
M Naor, K Nissim
IEEE Journal on selected areas in communications 18 (4), 561-570, 2000
6762000
Extending oblivious transfers efficiently
Y Ishai, J Kilian, K Nissim, E Petrank
Annual International Cryptology Conference, 145-161, 2003
5162003
What can we learn privately?
SP Kasiviswanathan, HK Lee, K Nissim, S Raskhodnikova, A Smith
Foundations of Computer Science, 2008. FOCS'08. IEEE 49th Annual IEEE …, 2008
5012008
Privacy-preserving datamining on vertically partitioned databases
C Dwork, K Nissim
Annual International Cryptology Conference, 528-544, 2004
3722004
Firmato: A novel firewall management toolkit
Y Bartal, A Mayer, K Nissim, A Wool
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
3371999
Efficient Communication-Storage Tradeoff s for Multicast Encryption
R Canetti, T Malkin, K Nissim
Advances in Cryptology-Eurocrypt99, Lecture Notes in Computer Science, 1999
3201999
Firmato: A novel firewall management toolkit
Y Bartal, A Mayer, K Nissim, A Wool
ACM Transactions on Computer Systems (TOCS) 22 (4), 381-420, 2004
1932004
Communication preserving protocols for secure function evaluation
M Naor, K Nissim
Proceedings of the thirty-third annual ACM symposium on Theory of computing …, 2001
1812001
Simulatable auditing
K Kenthapadi, N Mishra, K Nissim
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on …, 2005
1622005
Analyzing graphs with node differential privacy
SP Kasiviswanathan, K Nissim, S Raskhodnikova, A Smith
Theory of Cryptography Conference, 457-476, 2013
1602013
Algorithmic stability for adaptive data analysis
R Bassily, K Nissim, A Smith, T Steinke, U Stemmer, J Ullman
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
1372016
Secure multiparty computation of approximations
J Feigenbaum, Y Ishai, T Malkin, K Nissim, M Strauss, R Wright
ACM Transactions on Algorithms (TALG) 2 (3, July 2006), 435 - 472, 2001
1352001
Approximately optimal mechanism design via differential privacy
K Nissim, R Smorodinsky, M Tennenholtz
Proceedings of the 3rd innovations in theoretical computer science …, 2012
1302012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20