Pinkas

Results: 36



#Item
31Cryptographic protocols / Computational complexity theory / IP / Homomorphic encryption / Paillier cryptosystem / Communication complexity / One-way function / Polynomial / Oblivious transfer / Cryptography / Theoretical computer science / Applied mathematics

Efficient Private Matching and Set Intersection Michael J. Freedman1? , Kobbi Nissim2?? , and Benny Pinkas3 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-12 12:29:04
32Decision trees / Theoretical computer science / Secure multi-party computation / ID3 algorithm / Decision tree learning / ID3 / Secure two-party computation / Communication complexity / Oblivious transfer / Cryptographic protocols / Data / Information

Privacy Preserving Data Mining∗ Yehuda Lindell Department of Computer Science Weizmann Institute of Science Rehovot, Israel. [removed]

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-02-17 13:42:09
33Cloud storage / Data synchronization / File hosting / Backup software / Data deduplication / Memopal / Dropbox / Backup / Remote backup service / Software / Computing / Online backup services

Side channels in cloud services, the case of deduplication in cloud storage Danny Harnik Benny Pinkas

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2011-04-17 14:57:04
34Cryptographic protocols / Secure multi-party computation / Trusted Computing / Information privacy / Privacy / Internet privacy / Statistical database / Secure two-party computation / Vulnerability / Cryptography / Computer security / Ethics

Report on DIMACS∗ Working Group on Challenges for Cryptographers in Health Data Privacy Date of working group meeting: June 30, 2004 Working Group Organizers: Benny Pinkas, HP Labs Kobbi Nissim, Microsoft Research

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2004-08-16 11:11:48
35Thermodynamic entropy / Device file / Information theory / /dev/random / Entropy / Hardware random number generator / Random number generation / Pseudorandomness / Key generation / Cryptography / Randomness / Pseudorandom number generators

PDF Document

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2006-03-22 06:52:50
36Password / Computer security / Salt / Login / Password strength / Password manager / Security / Access control / Cryptography

PDF Document

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2003-01-11 00:09:49
UPDATE