Calibrating noise to sensitivity in private data analysis C Dwork, F McSherry, K Nissim, A Smith TCC, 265-284, 2006 | 9120 | 2006 |
Evaluating 2-DNF Formulas on Ciphertexts. D Boneh, EJ Goh, K Nissim TCC, 325-341, 2005 | 2301 | 2005 |
Efficient private matching and set intersection MJ Freedman, K Nissim, B Pinkas International conference on the theory and applications of cryptographic …, 2004 | 1679 | 2004 |
What can we learn privately? SP Kasiviswanathan, HK Lee, K Nissim, S Raskhodnikova, A Smith Foundations of Computer Science, 2008. FOCS'08. IEEE 49th Annual IEEE …, 2008 | 1548 | 2008 |
Smooth sensitivity and sampling in private data analysis K Nissim, S Raskhodnikova, A Smith Proceedings of the thirty-ninth annual ACM symposium on Theory of computing …, 2007 | 1366 | 2007 |
Revealing information while preserving privacy I Dinur, K Nissim Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on …, 2003 | 1349 | 2003 |
Practical privacy: the SuLQ framework A Blum, C Dwork, F McSherry, K Nissim Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on …, 2005 | 1079 | 2005 |
Extending oblivious transfers efficiently Y Ishai, J Kilian, K Nissim, E Petrank Annual International Cryptology Conference, 145-161, 2003 | 944 | 2003 |
Certificate revocation and certificate update M Naor, K Nissim IEEE Journal on selected areas in communications 18 (4), 561-570, 2000 | 777 | 2000 |
Firmato: A novel firewall management toolkit Y Bartal, A Mayer, K Nissim, A Wool ACM Transactions on Computer Systems (TOCS) 22 (4), 381-420, 2004 | 596 | 2004 |
Privacy-preserving datamining on vertically partitioned databases C Dwork, K Nissim Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004 | 522 | 2004 |
Analyzing graphs with node differential privacy SP Kasiviswanathan, K Nissim, S Raskhodnikova, A Smith Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 393 | 2013 |
Generic attacks on secure outsourced databases G Kellaris, G Kollios, K Nissim, A O'neill Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 339 | 2016 |
Efficient Communication-Storage Tradeoff s for Multicast Encryption R Canetti, T Malkin, K Nissim Advances in Cryptology-Eurocrypt99, Lecture Notes in Computer Science, 1999 | 323 | 1999 |
Differential privacy: A primer for a non-technical audience A Wood, M Altman, A Bembenek, M Bun, M Gaboardi, J Honaker, ... Vand. J. Ent. & Tech. L. 21, 209, 2018 | 305 | 2018 |
Algorithmic stability for adaptive data analysis R Bassily, K Nissim, A Smith, T Steinke, U Stemmer, J Ullman Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 294 | 2016 |
The privacy blanket of the shuffle model B Balle, J Bell, A Gascón, K Nissim Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 267 | 2019 |
Practical locally private heavy hitters R Bassily, K Nissim, U Stemmer, AG Thakurta Advances in Neural Information Processing Systems, 2285-2293, 2017 | 250 | 2017 |
Bounds on the sample complexity for private learning and private data release A Beimel, H Brenner, SP Kasiviswanathan, K Nissim Machine learning 94 (3), 401-437, 2014 | 242 | 2014 |
Communication preserving protocols for secure function evaluation M Naor, K Nissim Proceedings of the thirty-third annual ACM symposium on Theory of computing …, 2001 | 234 | 2001 |