Dalit Naor
Dalit Naor
School of Computer Science, Academic College of Tel-Aviv Yaffo
Dirección de correo verificada de - Página principal
Citado por
Citado por
Revocation and tracing schemes for stateless receivers
D Naor, M Naor, J Lotspiech
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
Access control meets public key infrastructure, or: Assigning roles to strangers
A Herzberg, Y Mass, J Mihaeli, D Naor, Y Ravid
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2-14, 2000
Object storage: The future building block for storage systems
M Factor, K Meth, D Naor, O Rodeh, J Satran
2005 IEEE International Symposium on Mass Storage Systems and Technology …, 2005
A fast algorithm for optimally increasing the edge connectivity
D Naor, D Gusfield, C Martel
SIAM Journal on Computing 26 (4), 1139-1165, 1997
Towards an object store
A Azagury, V Dreizin, M Factor, E Henis, D Naor, N Rinetzky, O Rodeh, ...
20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and …, 2003
Parametric optimization of sequence alignment
D Gusfield, K Balasubramanian, D Naor
Algorithmica 12 (4), 312-326, 1994
Proactive security: Long-term protection against break-ins
R Canetti, R Gennaro, A Herzberg, D Naor
RSA Laboratories’ CryptoBytes 3 (1), 1-8, 1997
Method for broadcast encryption and key revocation of stateless receivers
JB Lotspiech, D Naor, S Naor
US Patent 7,039,803, 2006
Storage modeling for power estimation
M Allalouf, Y Arbitman, M Factor, RI Kat, K Meth, D Naor
Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, 1-10, 2009
Method for ensuring privacy in electronic transactions with session key blocks
D Blakeley, J Lotspiech, D Naor, S Nin, R Reddy, S Srinivasan
US Patent App. 10/335,433, 2004
Authenticity and Provenance in Long Term Digital Preservation: Modeling and Implementation in Preservation Aware Storage.
M Factor, E Henis, D Naor, S Rabinovici-Cohen, P Reshef, S Ronen, ...
Workshop on the Theory and Practice of Provenance, 1-10, 2009
Low power mode in cloud storage systems
D Harnik, D Naor, I Segall
2009 IEEE International Symposium on Parallel & Distributed Processing, 1-8, 2009
Method, system and program product for modifying content usage conditions during content distribution
EM Foster, JB Lotspiech, D Naor, SI Nin, F Pestoni, WE Plouffe Jr, ...
US Patent 8,656,178, 2014
Estimation of deduplication ratios in large data sets
D Harnik, O Margalit, D Naor, D Sotnikov, G Vernik
2012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST), 1-11, 2012
Method for tracing traitor receivers in a broadcast encryption system
JB Lotspiech, D Naor, S Naor
US Patent 7,010,125, 2006
A cloud environment for data-intensive storage services
EK Kolodner, S Tal, D Kyriazis, D Naor, M Allalouf, L Bonelli, P Brand, ...
2011 IEEE third international conference on cloud computing technology and …, 2011
Method for ensuring content protection and subscription compliance
JB Lotspiech, D Naor, SI Nin, F Pestoni
US Patent 7,523,307, 2009
On near-optimal alignments of biological sequences
D Naor, DL Brutlag
Journal of Computational Biology 1 (4), 349-366, 1994
Representing and enumerating edge connectivity cuts in RNC
D Naor, VV Vazirani
Workshop on Algorithms and Data Structures, 273-285, 1991
A two layered approach for securing an object store network
A Azagury, R Canetti, M Factor, S Halevi, E Henis, D Naor, N Rinetzky, ...
First International IEEE Security in Storage Workshop, 2002. Proceedings., 10-23, 2002
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20