Revocation and tracing schemes for stateless receivers D Naor, M Naor, J Lotspiech Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 1638 | 2001 |
Access control meets public key infrastructure, or: Assigning roles to strangers A Herzberg, Y Mass, J Mihaeli, D Naor, Y Ravid Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2-14, 2000 | 606 | 2000 |
Object storage: The future building block for storage systems M Factor, K Meth, D Naor, O Rodeh, J Satran 2005 IEEE International Symposium on Mass Storage Systems and Technology …, 2005 | 239 | 2005 |
A fast algorithm for optimally increasing the edge connectivity D Naor, D Gusfield, C Martel SIAM Journal on Computing 26 (4), 1139-1165, 1997 | 188 | 1997 |
Towards an object store A Azagury, V Dreizin, M Factor, E Henis, D Naor, N Rinetzky, O Rodeh, ... 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and …, 2003 | 144 | 2003 |
Parametric optimization of sequence alignment D Gusfield, K Balasubramanian, D Naor Algorithmica 12 (4), 312-326, 1994 | 143 | 1994 |
Proactive security: Long-term protection against break-ins R Canetti, R Gennaro, A Herzberg, D Naor RSA Laboratories’ CryptoBytes 3 (1), 1-8, 1997 | 138 | 1997 |
Storage modeling for power estimation M Allalouf, Y Arbitman, M Factor, RI Kat, K Meth, D Naor Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, 1-10, 2009 | 95 | 2009 |
Method for broadcast encryption and key revocation of stateless receivers JB Lotspiech, D Naor, S Naor US Patent 7,039,803, 2006 | 95 | 2006 |
Method for ensuring privacy in electronic transactions with session key blocks D Blakeley, J Lotspiech, D Naor, S Nin, R Reddy, S Srinivasan US Patent App. 10/335,433, 2004 | 89 | 2004 |
Authenticity and Provenance in Long Term Digital Preservation: Modeling and Implementation in Preservation Aware Storage. M Factor, E Henis, D Naor, S Rabinovici-Cohen, P Reshef, S Ronen, ... Workshop on the Theory and Practice of Provenance, 1-10, 2009 | 81 | 2009 |
Low power mode in cloud storage systems D Harnik, D Naor, I Segall 2009 IEEE International Symposium on Parallel & Distributed Processing, 1-8, 2009 | 76 | 2009 |
Method, system and program product for modifying content usage conditions during content distribution EM Foster, JB Lotspiech, D Naor, SI Nin, F Pestoni, WE Plouffe Jr, ... US Patent 8,656,178, 2014 | 75 | 2014 |
Estimation of deduplication ratios in large data sets D Harnik, O Margalit, D Naor, D Sotnikov, G Vernik 2012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST), 1-11, 2012 | 70 | 2012 |
Method for tracing traitor receivers in a broadcast encryption system JB Lotspiech, D Naor, S Naor US Patent 7,010,125, 2006 | 68 | 2006 |
A cloud environment for data-intensive storage services EK Kolodner, S Tal, D Kyriazis, D Naor, M Allalouf, L Bonelli, P Brand, ... 2011 IEEE third international conference on cloud computing technology and …, 2011 | 66 | 2011 |
Method for ensuring content protection and subscription compliance JB Lotspiech, D Naor, SI Nin, F Pestoni US Patent 7,523,307, 2009 | 65 | 2009 |
On near-optimal alignments of biological sequences D Naor, DL Brutlag Journal of Computational Biology 1 (4), 349-366, 1994 | 63 | 1994 |
Representing and enumerating edge connectivity cuts in RNC D Naor, VV Vazirani Workshop on Algorithms and Data Structures, 273-285, 1991 | 56 | 1991 |
A two layered approach for securing an object store network A Azagury, R Canetti, M Factor, S Halevi, E Henis, D Naor, N Rinetzky, ... First International IEEE Security in Storage Workshop, 2002. Proceedings., 10-23, 2002 | 54 | 2002 |