The SCEAS System
| |||||||

## Search the dblp DataBase
Guy N. Rothblum:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Moni Naor, Guy N. Rothblum
**The Complexity of Online Memory Checking.**[Citation Graph (0, 0)][DBLP] FOCS, 2005, pp:573-584 [Conf] - Moni Naor, Guy N. Rothblum
**Learning to impersonate.**[Citation Graph (0, 0)][DBLP] ICML, 2006, pp:649-656 [Conf] - Shafi Goldwasser, Guy N. Rothblum
**On Best-Possible Obfuscation.**[Citation Graph (0, 0)][DBLP] TCC, 2007, pp:194-213 [Conf] - Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan
**Securely Obfuscating Re-encryption.**[Citation Graph (0, 0)][DBLP] TCC, 2007, pp:233-252 [Conf] - Erez Petrank, Guy N. Rothblum
**Selection from Structured Data Sets**[Citation Graph (0, 0)][DBLP] Electronic Colloquium on Computational Complexity (ECCC), 2004, v:, n:085, pp:- [Journal] - Shafi Goldwasser, Dan Gutfreund, Alexander Healy, Tali Kaufman, Guy N. Rothblum
**Verifying and decoding in constant depth.**[Citation Graph (0, 0)][DBLP] STOC, 2007, pp:440-449 [Conf] - Ronen Gradwohl, Moni Naor, Benny Pinkas, Guy N. Rothblum
**Cryptographic and Physical Zero-Knowledge Proof Systems for Solutions of Sudoku Puzzles.**[Citation Graph (0, 0)][DBLP] FUN, 2007, pp:166-182 [Conf] **The Complexity of Local List Decoding.**[Citation Graph (, )][DBLP]**Are PCPs Inherent in Efficient Arguments?**[Citation Graph (, )][DBLP]**One-Time Programs.**[Citation Graph (, )][DBLP]**Securing Computation against Continuous Leakage.**[Citation Graph (, )][DBLP]**Delegating computation: interactive proofs for muggles.**[Citation Graph (, )][DBLP]**On the complexity of differentially private data release: efficient algorithms and hardness results.**[Citation Graph (, )][DBLP]**A (de)constructive approach to program checking.**[Citation Graph (, )][DBLP]**Differential privacy under continual observation.**[Citation Graph (, )][DBLP]**How Efficient Can Memory Checking Be?.**[Citation Graph (, )][DBLP]**Weak Verifiable Random Functions.**[Citation Graph (, )][DBLP]**Obfuscation of Hyperplane Membership.**[Citation Graph (, )][DBLP]**Leakage-Resilient Signatures.**[Citation Graph (, )][DBLP]**Pan-Private Streaming Algorithms.**[Citation Graph (, )][DBLP]**Are PCPs Inherent in Efficient Arguments?**[Citation Graph (, )][DBLP]**The Complexity of Local List Decoding.**[Citation Graph (, )][DBLP]**A (De)constructive Approach to Program Checking.**[Citation Graph (, )][DBLP]**The Complexity of Online Memory Checking.**[Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.004secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |