|
Search the dblp DataBase
Dalit Naor:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shalom Tsur, Frank Olken, Dalit Naor
Deductive Databases for Genomic Mapping (Extended Abstract). [Citation Graph (4, 0)][DBLP] Workshop on Deductive Databases, 1990, pp:0-0 [Conf]
- Boaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai
The Proactive Security Toolkit and Applications. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:18-27 [Conf]
- Dalit Naor, Douglas L. Brutlag
On Suboptimal Alignments of Biological Sequences. [Citation Graph (0, 0)][DBLP] CPM, 1993, pp:179-196 [Conf]
- Dalit Naor, Moni Naor, Jeffery Lotspiech
Revocation and Tracing Schemes for Stateless Receivers. [Citation Graph (0, 0)][DBLP] CRYPTO, 2001, pp:41-62 [Conf]
- Dalit Naor, Dan Gusfield, Charles U. Martel
A Fast Algorithm for Optimally Increasing the Edge-Connectivity [Citation Graph (0, 0)][DBLP] FOCS, 1990, pp:698-707 [Conf]
- Dalit Naor, Petra Reshef, Ohad Rodeh, Allon Shafrir, Adam Wolman, Eitan Yaffe
Benchmarking and Testing OSD for Correctness and Compliance. [Citation Graph (0, 0)][DBLP] Haifa Verification Conference, 2005, pp:158-176 [Conf]
- Alain Azagury, Vladimir Dreizin, Michael Factor, Ealan Henis, Dalit Naor, Noam Rinetzky, Ohad Rodeh, Julian Satran, Ami Tavory, Lena Yerushalmi
Towards an Object Stor. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Mass Storage Systems, 2003, pp:165-0 [Conf]
- Boaz Barak, Shai Halevi, Amir Herzberg, Dalit Naor
Clock synchronization with faults and recoveries (extended abstract). [Citation Graph (0, 0)][DBLP] PODC, 2000, pp:133-142 [Conf]
- Alain Azagury, Ran Canetti, Michael Factor, Shai Halevi, Ealan Henis, Dalit Naor, Noam Rinetzky, Ohad Rodeh, Julian Satran
A Two Layered Approach for Securing an Object Store Network. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:10-23 [Conf]
- Dan Gusfield, K. Balasubramanian, Dalit Naor
Parametric Optimization of Sequence Alignment. [Citation Graph (0, 0)][DBLP] SODA, 1992, pp:432-439 [Conf]
- Dan Gusfield, Dalit Naor
Efficient Algorithms for Generalized Cut Trees. [Citation Graph (0, 0)][DBLP] SODA, 1990, pp:422-433 [Conf]
- Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2000, pp:2-14 [Conf]
- Dalit Naor, Vijay V. Vazirani
Representing and Enumerating Edge Connectivity Cuts in RNC. [Citation Graph (0, 0)][DBLP] WADS, 1991, pp:273-285 [Conf]
- Dan Gusfield, K. Balasubramanian, Dalit Naor
Parametric Optimization of Sequence Alignment. [Citation Graph (0, 0)][DBLP] Algorithmica, 1994, v:12, n:4/5, pp:312-326 [Journal]
- Dan Gusfield, Dalit Naor
Extracting Maximal Information About Sets of Minimum Cuts. [Citation Graph (0, 0)][DBLP] Algorithmica, 1993, v:10, n:1, pp:64-89 [Journal]
- Dalit Naor, Charles U. Martel, Norman S. Matloff
Performance of Priority Queue Structures in a Virtual Memory Environment. [Citation Graph (0, 0)][DBLP] Comput. J., 1991, v:34, n:5, pp:428-437 [Journal]
- Dalit Naor, Moni Naor
Protecting Cryptographic Keys: The Trace-and-Revoke Approach. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2003, v:36, n:7, pp:47-53 [Journal]
- Dalit Naor, Moni Naor, Jeffery Lotspiech
Revocation and Tracing Schemes for Stateless Receivers [Citation Graph (0, 0)][DBLP] Electronic Colloquium on Computational Complexity (ECCC), 2002, v:, n:043, pp:- [Journal]
- Amir Herzberg, Dalit Naor
Surf'N'Sign: Client Signatures on Web Documents. [Citation Graph (0, 0)][DBLP] IBM Systems Journal, 1998, v:37, n:1, pp:61-71 [Journal]
- Dalit Naor, Douglas L. Brutlag
On Near-Optimal Alignments of Biological Sequences. [Citation Graph (0, 0)][DBLP] Journal of Computational Biology, 1994, v:1, n:4, pp:349-0 [Journal]
- Dalit Naor, Dan Gusfield, Charles U. Martel
A Fast Algorithm for Optimally Increasing the Edge Connectivity. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1997, v:26, n:4, pp:1139-1165 [Journal]
- Michael Factor, Dalit Naor, Simona Rabinovici-Cohen, Leeat Ramati, Petra Reshef, Julian Satran
The need for preservation aware storage: a position paper. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2007, v:41, n:1, pp:19-23 [Journal]
- Michael Factor, Dalit Naor, Simona Rabinovici-Cohen, Leeat Ramati, Petra Reshef, Julian Satran, David L. Giaretta
Preservation DataStores: Architecture for Preservation Aware Storage. [Citation Graph (0, 0)][DBLP] MSST, 2007, pp:3-15 [Conf]
- Michael Factor, Dalit Naor, Eran Rom, Julian Satran, Sivan Tal
Capability based Secure Access Control to Networked Storage Devices. [Citation Graph (0, 0)][DBLP] MSST, 2007, pp:114-128 [Conf]
Authenticity and Provenance in Long Term Digital Preservation: Modeling and Implementation in Preservation Aware Storage. [Citation Graph (, )][DBLP]
Low power mode in cloud storage systems. [Citation Graph (, )][DBLP]
Towards Knowledge in the Cloud. [Citation Graph (, )][DBLP]
The OSD Security Protocol. [Citation Graph (, )][DBLP]
Toward securing untrusted storage without public-key operations. [Citation Graph (, )][DBLP]
Storage modeling for power estimation. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|