Yahoo India Web Search

Search results

  1. Jun 28, 2024 · Moni Naor's lecture notes. Jaikumar Radhakrishnan's lecture notes. Steven Rudich's lecture notes. Webpage Designed and Developed by ...

  2. 5 days ago · Popularity-based secure deduplication scheme classifies data based on their number of owners and provides different levels of security for a trade-off between privacy preservation and storage savings.

  3. 4 days ago · Russell Impagliazzo and Moni Naor. Efficient cryptographic schemes provably as secure as subset sum. Journal of Cryptology, 9(4):199-216, 1996. Klaus Jansen, Felix Land, and Kati Land. Bounding the running time of algorithms for scheduling and packing problems. SIAM Journal on Discrete Mathematics, 30(1):343-366, 2016. Ce Jin.

  4. 4 days ago · Proof of Work is a consensus mechanism used by many cryptocurrencies to secure transactions and create new blocks in a blockchain. Originally conceived by Cynthia Dwork and Moni Naor in 1993, it gained widespread attention when it was adopted by Bitcoin, the first and most famous cryptocurrency, developed by an unknown person or group of people ...

  5. Jun 10, 2024 · Miklós Ajtai, James Aspnes, Moni Naor, Yuval Rabani, Leonard J. Schulman, and Orli Waarts. Fairness in scheduling. J. Algorithms, 29(2):306–357, 1998.

  6. 2 days ago · Moni Naor: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings. Lecture Notes in Computer Science 2951, Springer 2004 , ISBN 3-540-21000-8 [contents]

  7. 5 days ago · Searchable Symmetric Encryption (SSE) has opened up an attractive avenue for privacy-preserved processing of outsourced data on the untrusted cloud infrastructure. SSE aims to support efficient Boolean query processing with optimal storage and search overhead over large real databases.