Kobbi Nissim

From MaRDI portal
Person:271587

Available identifiers

zbMath Open nissim.kobbiDBLP65/801WikidataQ39075032 ScholiaQ39075032MaRDI QIDQ271587

List of research outcomes

PublicationDate of PublicationType
Dynamic algorithms against an adaptive adversary: generic constructions and lower bounds2023-12-08Paper
https://portal.mardi4nfdi.de/entity/Q60593742023-11-02Paper
https://portal.mardi4nfdi.de/entity/Q58755252023-02-03Paper
Separating adaptive streaming from oblivious streaming using the bounded storage model2022-04-22Paper
On the round complexity of the shuffle model2022-03-23Paper
Learning privately with labeled and unlabeled examples2021-02-01Paper
Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols2020-12-04Paper
https://portal.mardi4nfdi.de/entity/Q49690482020-10-05Paper
Segmentation, Incentives, and Privacy2020-03-12Paper
https://portal.mardi4nfdi.de/entity/Q52141792020-02-07Paper
https://portal.mardi4nfdi.de/entity/Q52142382020-02-07Paper
https://portal.mardi4nfdi.de/entity/Q46176302019-02-06Paper
Learning Privately with Labeled and Unlabeled Examples2017-10-05Paper
Redrawing the boundaries on purchasing data from privacy-sensitive individuals2017-05-19Paper
Characterizing the sample complexity of private learners2017-05-16Paper
Approximately optimal mechanism design via differential privacy2016-10-07Paper
https://portal.mardi4nfdi.de/entity/Q57416342016-07-29Paper
Simultaneous Private Learning of Multiple Concepts2016-04-15Paper
Efficient set intersection with simulation-based security2016-04-07Paper
Secure multiparty computation of approximations2015-09-02Paper
Private approximation of NP-hard functions2015-02-27Paper
Communication preserving protocols for secure function evaluation2015-02-27Paper
Impossibility of Differentially Private Universally Optimal Mechanisms2015-02-09Paper
Private coresets2015-02-04Paper
Private approximation of search problems2014-11-25Paper
Approximating the minimum bisection size (extended abstract)2014-09-26Paper
Attacks on statistical databases: the highly noisy case2014-08-13Paper
Bounds on the sample complexity for private learning and private data release2014-07-14Paper
Denials leak information: simulatable auditing2014-01-27Paper
Hiding the Input-Size in Secure Two-Party Computation2013-12-10Paper
Private Learning and Sanitization: Pure vs. Approximate Differential Privacy2013-10-04Paper
Efficient set operations in the presence of malicious adversaries2012-07-10Paper
Private approximation of clustering and vertex cover2011-02-18Paper
Efficient Set Operations in the Presence of Malicious Adversaries2010-05-28Paper
How should we solve search problems privately?2010-03-01Paper
Bounds on the Sample Complexity for Private Learning and Private Data Release2010-02-24Paper
Private Approximation of Search Problems2009-11-06Paper
How Should We Solve Search Problems Privately?2009-03-10Paper
Distributed Private Data Analysis: Simultaneously Solving How and What2009-02-10Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Private Approximation of Clustering and Vertex Cover2007-08-30Paper
Algorithmic Number Theory2007-05-02Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2005-12-07Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
On cutting a few vertices from a graph2003-06-10Paper
https://portal.mardi4nfdi.de/entity/Q45350732002-06-12Paper
https://portal.mardi4nfdi.de/entity/Q27537322001-11-11Paper
https://portal.mardi4nfdi.de/entity/Q42507811999-06-17Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Kobbi Nissim