Cryptographers' World
 

Kobbi Nissim


Author's Web Page Link

12 papers in database with 1398 citations StarStar

H-number: 9

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Shiva Prasad Kasiviswanathan,  Homin K. Lee,  Kobbi Nissim,  Sofya Raskhodnikova,  Adam Smith,  What Can We Learn Privately?, pp. 531 - 540, FOCS 2008.

[Electronic Edition][Cited 43 times ]

2. Amos Beimel,  Kobbi Nissim,  Eran Omri,  Distributed Private Data Analysis: Simultaneously Solving How and What, pp. 451 - 468, CRYPTO 2008.

[Electronic Edition][Cited 7 times ]

3. Kobbi Nissim,  Sofya Raskhodnikova,  Adam Smith,  Smooth sensitivity and sampling in private data analysis, pp. 75 - 84, STOC 2007.

[Electronic Edition][Cited 87 times Red Star]

4. Amos Beimel,  Renen Hallak,  Kobbi Nissim,  Private Approximation of Clustering and Vertex Cover, pp. 383 - 403, TCC 2007.

[Electronic Edition][Cited 8 times ]

5. Amos Beimel,  Tal Malkin,  Kobbi Nissim,  Enav Weinreb,  How Should We Solve Search Problems Privately?, pp. 31 - 49, CRYPTO 2007.

[Electronic Edition][Cited 6 times ]

6. Kobbi Nissim,  Enav Weinreb,  Communication Efficient Secure Linear Algebra, pp. 522 - 541, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 9 times ]

7. Cynthia Dwork,  Frank McSherry,  Kobbi Nissim,  Adam Smith,  Calibrating Noise to Sensitivity in Private Data Analysis, pp. 265 - 284, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 239 times Red StarRed Star]

8. Dan Boneh,  Eu-Jin Goh,  Kobbi Nissim,  Evaluating 2-DNF Formulas on Ciphertexts, pp. 325 - 341, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 258 times Red StarRed StarRed Star]

9. Cynthia Dwork,  Kobbi Nissim,  Privacy-Preserving Datamining on Vertically Partitioned Databases, pp. 528 - 544, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 130 times Red StarRed Star]

10. Michael J. Freedman,  Kobbi Nissim,  Benny Pinkas,  Efficient Private Matching and Set Intersection, pp. 1 - 19, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 344 times Red StarRed StarRed Star]

11. Yuval Ishai,  Joe Kilian,  Kobbi Nissim,  Erez Petrank,  Extending Oblivious Transfers Efficiently, pp. 145 - 161, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 73 times Red Star]

12. Ran Canetti,  Tal Malkin,  Kobbi Nissim,  Efficient Communication-Storage Tradeoffs for Multicast Encryption, pp. 459 - 474, EUROCRYPT 1999.

[Electronic Edition][Cited 194 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...