Suivre
Kobbi Nissim
Kobbi Nissim
Dept. of Computer Science (Georgetown)
Adresse e-mail validée de georgetown.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Calibrating noise to sensitivity in private data analysis
C Dwork, F McSherry, K Nissim, A Smith
TCC, 265-284, 2006
89982006
Evaluating 2-DNF Formulas on Ciphertexts.
D Boneh, EJ Goh, K Nissim
TCC, 325-341, 2005
23132005
Efficient private matching and set intersection
MJ Freedman, K Nissim, B Pinkas
International conference on the theory and applications of cryptographic …, 2004
16822004
What can we learn privately?
SP Kasiviswanathan, HK Lee, K Nissim, S Raskhodnikova, A Smith
Foundations of Computer Science, 2008. FOCS'08. IEEE 49th Annual IEEE …, 2008
15242008
Smooth sensitivity and sampling in private data analysis
K Nissim, S Raskhodnikova, A Smith
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing …, 2007
13542007
Revealing information while preserving privacy
I Dinur, K Nissim
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on …, 2003
13372003
Practical privacy: the SuLQ framework
A Blum, C Dwork, F McSherry, K Nissim
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on …, 2005
10752005
Extending oblivious transfers efficiently
Y Ishai, J Kilian, K Nissim, E Petrank
Annual International Cryptology Conference, 145-161, 2003
9372003
Certificate revocation and certificate update
M Naor, K Nissim
IEEE Journal on selected areas in communications 18 (4), 561-570, 2000
7782000
Firmato: A novel firewall management toolkit
Y Bartal, A Mayer, K Nissim, A Wool
ACM Transactions on Computer Systems (TOCS) 22 (4), 381-420, 2004
5952004
Privacy-preserving datamining on vertically partitioned databases
C Dwork, K Nissim
Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004
5092004
Analyzing graphs with node differential privacy
SP Kasiviswanathan, K Nissim, S Raskhodnikova, A Smith
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
3942013
Generic attacks on secure outsourced databases
G Kellaris, G Kollios, K Nissim, A O'neill
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3332016
Efficient Communication-Storage Tradeoff s for Multicast Encryption
R Canetti, T Malkin, K Nissim
Advances in Cryptology-Eurocrypt99, Lecture Notes in Computer Science, 1999
3241999
Differential privacy: A primer for a non-technical audience
A Wood, M Altman, A Bembenek, M Bun, M Gaboardi, J Honaker, ...
Vand. J. Ent. & Tech. L. 21, 209, 2018
3072018
Algorithmic stability for adaptive data analysis
R Bassily, K Nissim, A Smith, T Steinke, U Stemmer, J Ullman
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
2852016
The privacy blanket of the shuffle model
B Balle, J Bell, A Gascón, K Nissim
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
2612019
Practical locally private heavy hitters
R Bassily, K Nissim, U Stemmer, AG Thakurta
Advances in Neural Information Processing Systems, 2285-2293, 2017
2512017
Bounds on the sample complexity for private learning and private data release
A Beimel, H Brenner, SP Kasiviswanathan, K Nissim
Machine learning 94 (3), 401-437, 2014
2372014
Communication preserving protocols for secure function evaluation
M Naor, K Nissim
Proceedings of the thirty-third annual ACM symposium on Theory of computing …, 2001
2332001
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20