Notice: Unexpected clearActionName after getActionName already called in /var/www/html/w/includes/context/RequestContext.php on line 333
Kobbi Nissim - MaRDI portal

Kobbi Nissim

From MaRDI portal
(Redirected from Person:434342)
Person:271587

Available identifiers

zbMath Open nissim.kobbiDBLP65/801WikidataQ39075032 ScholiaQ39075032MaRDI QIDQ271587

List of research outcomes





PublicationDate of PublicationType
Dynamic algorithms against an adaptive adversary: generic constructions and lower bounds2023-12-08Paper
https://portal.mardi4nfdi.de/entity/Q60593742023-11-02Paper
https://portal.mardi4nfdi.de/entity/Q58755252023-02-03Paper
Separating adaptive streaming from oblivious streaming using the bounded storage model2022-04-22Paper
On the round complexity of the shuffle model2022-03-23Paper
Learning privately with labeled and unlabeled examples2021-02-01Paper
Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols2020-12-04Paper
https://portal.mardi4nfdi.de/entity/Q49690482020-10-05Paper
Segmentation, Incentives, and Privacy2020-03-12Paper
https://portal.mardi4nfdi.de/entity/Q52141792020-02-07Paper
https://portal.mardi4nfdi.de/entity/Q52142382020-02-07Paper
https://portal.mardi4nfdi.de/entity/Q46176302019-02-06Paper
Learning Privately with Labeled and Unlabeled Examples2017-10-05Paper
Redrawing the boundaries on purchasing data from privacy-sensitive individuals2017-05-19Paper
Characterizing the sample complexity of private learners2017-05-16Paper
Approximately optimal mechanism design via differential privacy2016-10-07Paper
https://portal.mardi4nfdi.de/entity/Q57416342016-07-29Paper
Simultaneous Private Learning of Multiple Concepts2016-04-15Paper
Efficient set intersection with simulation-based security2016-04-07Paper
Secure multiparty computation of approximations2015-09-02Paper
Private approximation of NP-hard functions2015-02-27Paper
Communication preserving protocols for secure function evaluation2015-02-27Paper
Impossibility of Differentially Private Universally Optimal Mechanisms2015-02-09Paper
Private coresets2015-02-04Paper
Private approximation of search problems2014-11-25Paper
Approximating the minimum bisection size (extended abstract)2014-09-26Paper
Attacks on statistical databases: the highly noisy case2014-08-13Paper
Bounds on the sample complexity for private learning and private data release2014-07-14Paper
Denials leak information: simulatable auditing2014-01-27Paper
Hiding the Input-Size in Secure Two-Party Computation2013-12-10Paper
Private Learning and Sanitization: Pure vs. Approximate Differential Privacy2013-10-04Paper
Efficient set operations in the presence of malicious adversaries2012-07-10Paper
Private approximation of clustering and vertex cover2011-02-18Paper
Efficient Set Operations in the Presence of Malicious Adversaries2010-05-28Paper
How should we solve search problems privately?2010-03-01Paper
Bounds on the Sample Complexity for Private Learning and Private Data Release2010-02-24Paper
Private Approximation of Search Problems2009-11-06Paper
How Should We Solve Search Problems Privately?2009-03-10Paper
Distributed Private Data Analysis: Simultaneously Solving How and What2009-02-10Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Private Approximation of Clustering and Vertex Cover2007-08-30Paper
Algorithmic Number Theory2007-05-02Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2005-12-07Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
On cutting a few vertices from a graph2003-06-10Paper
https://portal.mardi4nfdi.de/entity/Q45350732002-06-12Paper
https://portal.mardi4nfdi.de/entity/Q27537322001-11-11Paper
https://portal.mardi4nfdi.de/entity/Q42507811999-06-17Paper

Research outcomes over time

This page was built for person: Kobbi Nissim