Dalit Naor
Dalit Naor
IBM Research
Verified email at il.ibm.com
Title
Cited by
Cited by
Year
Revocation and tracing schemes for stateless receivers
D Naor, M Naor, J Lotspiech
Annual International Cryptology Conference, 41-62, 2001
14202001
Access control meets public key infrastructure, or: Assigning roles to strangers
A Herzberg, Y Mass, J Mihaeli, D Naor, Y Ravid
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2-14, 2000
5572000
Object storage: The future building block for storage systems
M Factor, K Meth, D Naor, O Rodeh, J Satran
2005 IEEE International Symposium on Mass Storage Systems and Technology …, 2005
1792005
A fast algorithm for optimally increasing the edge connectivity
D Naor, D Gusfield, C Martel
SIAM Journal on Computing 26 (4), 1139-1165, 1997
1651997
Parametric optimization of sequence alignment
D Gusfield, K Balasubramanian, D Naor
Algorithmica 12 (4-5), 312, 1994
1321994
Proactive security: Long-term protection against break-ins
R Canetti, R Gennaro, A Herzberg, D Naor
RSA Laboratories’ CryptoBytes 3 (1), 1-8, 1997
1241997
Towards an object store
A Azagury, V Dreizin, M Factor, E Henis, D Naor, N Rinetzky, O Rodeh, ...
20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and …, 2003
1222003
Method for broadcast encryption and key revocation of stateless receivers
JB Lotspiech, D Naor, S Naor
US Patent 7,039,803, 2006
852006
Storage modeling for power estimation
M Allalouf, Y Arbitman, M Factor, RI Kat, K Meth, D Naor
Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, 1-10, 2009
842009
Method, system and program product for modifying content usage conditions during content distribution
EM Foster, JB Lotspiech, D Naor, SI Nin, F Pestoni, WE Plouffe Jr, ...
US Patent 8,656,178, 2014
712014
Method for ensuring privacy in electronic transactions with session key blocks
D Blakeley, J Lotspiech, D Naor, S Nin, R Reddy, S Srinivasan
US Patent App. 10/335,433, 2004
682004
Method for tracing traitor receivers in a broadcast encryption system
JB Lotspiech, D Naor, S Naor
US Patent 7,010,125, 2006
662006
Low power mode in cloud storage systems
D Harnik, D Naor, I Segall
2009 IEEE International Symposium on Parallel & Distributed Processing, 1-8, 2009
642009
Method for ensuring content protection and subscription compliance
JB Lotspiech, D Naor, SI Nin, F Pestoni
US Patent 7,523,307, 2009
642009
Authenticity and Provenance in Long Term Digital Preservation: Modeling and Implementation in Preservation Aware Storage.
M Factor, E Henis, D Naor, S Rabinovici-Cohen, P Reshef, S Ronen, ...
Workshop on the Theory and Practice of Provenance, 2009
622009
On near-optimal alignments of biological sequences
D Naor, DL Brutlag
Journal of Computational Biology 1 (4), 349-366, 1994
621994
Estimation of deduplication ratios in large data sets
D Harnik, O Margalit, D Naor, D Sotnikov, G Vernik
012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST), 1-11, 2012
582012
A cloud environment for data-intensive storage services
EK Kolodner, S Tal, D Kyriazis, D Naor, M Allalouf, L Bonelli, P Brand, ...
2011 IEEE third international conference on cloud computing technology and …, 2011
552011
A two layered approach for securing an object store network
A Azagury, R Canetti, M Factor, S Halevi, E Henis, D Naor, N Rinetzky, ...
First International IEEE Security in Storage Workshop, 2002. Proceedings., 10-23, 2002
492002
One-time signatures revisited: Have they become practical?
D Naor, A Shenhav, A Wool
IACR Cryptol. ePrint Arch. 2005, 442, 2005
482005
The system can't perform the operation now. Try again later.
Articles 1–20