The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stuart Haber: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stuart Haber, Benny Pinkas
    Securely combining public-key cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:215-224 [Conf]
  2. Stuart Haber, W. Scott Stornetta
    Secure Names for Bit-Strings. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:28-35 [Conf]
  3. Matthew K. Franklin, Stuart Haber
    Joint Encryption and Message-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:266-277 [Conf]
  4. Zvi Galil, Stuart Haber, Moti Yung
    Symmetric Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:128-137 [Conf]
  5. Zvi Galil, Stuart Haber, Moti Yung
    Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:135-155 [Conf]
  6. Stuart Haber, W. Scott Stornetta
    How to Time-Stamp a Digital Document. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:437-455 [Conf]
  7. Stuart Haber, Bill G. Horne, Joe Pato, Tomas Sander, Robert Endre Tarjan
    If Piracy Is the Problem, Is DRM the Answer? [Citation Graph (0, 0)][DBLP]
    Digital Rights Management, 2003, pp:224-233 [Conf]
  8. Donald Beaver, Stuart Haber
    Cryptographic Protocols Provably Secure Against Dynamic Adversaries. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:307-323 [Conf]
  9. Zvi Galil, Stuart Haber, Moti Yung
    A Secure Public-key Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:3-15 [Conf]
  10. Zvi Galil, Stuart Haber, Moti Yung
    A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems (Extended Abstract) [Citation Graph (0, 0)][DBLP]
    FOCS, 1985, pp:360-371 [Conf]
  11. William Aiello, Stuart Haber, Ramarathnam Venkatesan
    New Constructions for Secure Hash Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:150-167 [Conf]
  12. Matthew K. Franklin, Stuart Haber
    Joint Encryption and Message-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1996, v:9, n:4, pp:217-232 [Journal]
  13. Stuart Haber, W. Scott Stornetta
    How to Time-Stamp a Digital Document. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1991, v:3, n:2, pp:99-111 [Journal]
  14. Zvi Galil, Stuart Haber, Moti Yung
    Minimum-Knowledge Interactive Proofs for Decision Problems. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1989, v:18, n:4, pp:711-739 [Journal]

  15. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. [Citation Graph (, )][DBLP]


  16. Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002