Search the dblp DataBase
Stuart Haber :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Stuart Haber , Benny Pinkas Securely combining public-key cryptosystems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:215-224 [Conf ] Stuart Haber , W. Scott Stornetta Secure Names for Bit-Strings. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1997, pp:28-35 [Conf ] Matthew K. Franklin , Stuart Haber Joint Encryption and Message-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:266-277 [Conf ] Zvi Galil , Stuart Haber , Moti Yung Symmetric Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:128-137 [Conf ] Zvi Galil , Stuart Haber , Moti Yung Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:135-155 [Conf ] Stuart Haber , W. Scott Stornetta How to Time-Stamp a Digital Document. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:437-455 [Conf ] Stuart Haber , Bill G. Horne , Joe Pato , Tomas Sander , Robert Endre Tarjan If Piracy Is the Problem, Is DRM the Answer? [Citation Graph (0, 0)][DBLP ] Digital Rights Management, 2003, pp:224-233 [Conf ] Donald Beaver , Stuart Haber Cryptographic Protocols Provably Secure Against Dynamic Adversaries. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:307-323 [Conf ] Zvi Galil , Stuart Haber , Moti Yung A Secure Public-key Authentication Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:3-15 [Conf ] Zvi Galil , Stuart Haber , Moti Yung A Private Interactive Test of a Boolean Predicate and Minimum-Knowledge Public-Key Cryptosystems (Extended Abstract) [Citation Graph (0, 0)][DBLP ] FOCS, 1985, pp:360-371 [Conf ] William Aiello , Stuart Haber , Ramarathnam Venkatesan New Constructions for Secure Hash Functions. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:150-167 [Conf ] Matthew K. Franklin , Stuart Haber Joint Encryption and Message-Efficient Secure Computation. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1996, v:9, n:4, pp:217-232 [Journal ] Stuart Haber , W. Scott Stornetta How to Time-Stamp a Digital Document. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1991, v:3, n:2, pp:99-111 [Journal ] Zvi Galil , Stuart Haber , Moti Yung Minimum-Knowledge Interactive Proofs for Decision Problems. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1989, v:18, n:4, pp:711-739 [Journal ] Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. [Citation Graph (, )][DBLP ] Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs