Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Moni Naor 11 found (54 total)

alternate case: moni Naor

Distributed hash table (3,909 words) [view diff] exact match in snippet view article find links to article

of DHT Security Techniques. ACM Computing Surveys 43(2), January 2011. Moni Naor and Udi Wieder. Novel Architectures for P2P Applications: the Continuous-Discrete
Differential privacy (5,016 words) [view diff] exact match in snippet view article find links to article
Dwork, Cynthia, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. "Our data, ourselves: Privacy via distributed noise generation." In Advances
Pseudorandom permutation (1,303 words) [view diff] exact match in snippet view article find links to article
Conference on the Theory and Applications of Cryptographic Techniques – by Moni Naor, International Association for Cryptologic Research Steinberger, John
Commitment scheme (7,469 words) [view diff] exact match in snippet view article find links to article
assumption necessary to construct a bit-commitment protocol. In 1991 Moni Naor showed how to create a bit-commitment scheme from a cryptographically
Randomized weighted majority algorithm (2,325 words) [view diff] exact match in snippet view article find links to article
Learning Predicting From Experts Advice Uri Feige, Robi Krauthgamer, Moni Naor. Algorithmic Game Theory Nika Haghtalab 2020 Theoretical Foundations of
CAPTCHA (3,660 words) [view diff] exact match in snippet view article find links to article
Verification of a human in the loop, or Identification via the Turing Test, Moni Naor, 1996. Inaccessibility of CAPTCHA: Alternatives to Visual Turing Tests
Advanced Access Content System (3,046 words) [view diff] exact match in snippet view article find links to article
on the Managed Copy aspects of AACS. On 24 February 2001, Dalit Naor, Moni Naor and Jeff Lotspiech published a paper entitled "Revocation and Tracing
Guided tour puzzle protocol (1,595 words) [view diff] exact match in snippet view article find links to article
of NDSS 2003, pages 25-39, 2003. Cynthia Dwork, Andrew Goldberg, and Moni Naor. On Memory-Bound Functions for Fighting Spam. In Proceedings of CRYPTO
Traitor tracing (1,522 words) [view diff] exact match in snippet view article find links to article
raise privacy concerns in some areas. Canary trap Benny Chor, Amos Fiat, Moni Naor, Benny Pinkas. "Tracing Traitors". 1994. Benny Pinkas. "Traitor Tracing"
Non-malleable code (2,173 words) [view diff] no match in snippet view article find links to article
1949.tb00928.x. hdl:10338.dmlcz/119717. Dolev, Danny; Dwork, Cynthia; Moni, Naor (Mar 24, 2000). "Non-Malleable Cryptography". SIAM Journal on Computing
Peer-to-peer (6,865 words) [view diff] exact match in snippet view article find links to article
1.1.12.5548. doi:10.1007/978-3-540-45172-3_3. ISBN 978-3-540-40724-9. Moni Naor and Udi Wieder. Novel Architectures for P2P Applications: the Continuous-Discrete