dblp.uni-trier.dewww.uni-trier.de

Adam Smith

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
48EEYevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi Walfish: Composability and On-Line Deniability of Authentication. TCC 2009: 146-162
2008
47EEIvan Damgård, Yuval Ishai, Mikkel Krøigaard, Jesper Buus Nielsen, Adam Smith: Scalable Multiparty Computation with Nearly Optimal Work and Resilience. CRYPTO 2008: 241-261
46EEVipul Goyal, Payman Mohassel, Adam Smith: Efficient Two Party and Multi Party Computation Against Covert Adversaries. EUROCRYPT 2008: 289-306
45EEShiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, Adam Smith: What Can We Learn Privately? FOCS 2008: 531-540
44EESrivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam Smith: Composition attacks and auxiliary information in data privacy. KDD 2008: 265-273
43EEZachary Pousman, Mario Romero, Adam Smith, Michael Mateas: Living with tableau machine: a longitudinal investigation of a curious domestic intelligence. UbiComp 2008: 370-379
42EESrivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam Smith: Composition Attacks and Auxiliary Information in Data Privacy CoRR abs/0803.0032: (2008)
41EEShiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, Adam Smith: What Can We Learn Privately? CoRR abs/0803.0924: (2008)
40EEShiva Prasad Kasiviswanathan, Adam Smith: A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information CoRR abs/0803.3946: (2008)
39EEAdam Smith: Efficient, Differentially Private Point Estimators CoRR abs/0809.4794: (2008)
38EEMoni Naor, Gil Segev, Adam Smith: Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models. IEEE Transactions on Information Theory 54(6): 2408-2425 (2008)
37EEYevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput. 38(1): 97-139 (2008)
2007
36EESofya Raskhodnikova, Dana Ron, Ronitt Rubinfeld, Adam Smith: Sublinear Algorithms for Approximating String Compressibility. APPROX-RANDOM 2007: 609-623
35EESofya Raskhodnikova, Dana Ron, Amir Shpilka, Adam Smith: Strong Lower Bounds for Approximating Distribution Support Size and the Distinct Elements Problem. FOCS 2007: 559-569
34EEAdam Smith: Scrambling adversarial errors using few random bits, optimal information reconciliation, and better private codes. SODA 2007: 395-404
33EEKobbi Nissim, Sofya Raskhodnikova, Adam Smith: Smooth sensitivity and sampling in private data analysis. STOC 2007: 75-84
32EESofya Raskhodnikova, Dana Ron, Ronitt Rubinfeld, Adam Smith: Sublinear Algorithms for Approximating String Compressibility CoRR abs/0706.1084: (2007)
2006
31EEMoni Naor, Gil Segev, Adam Smith: Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models. CRYPTO 2006: 214-231
30EEYevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam Smith: Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets. CRYPTO 2006: 232-250
29EEMichael Ben-Or, Claude Crépeau, Daniel Gottesman, Avinatan Hassidim, Adam Smith: Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority. FOCS 2006: 249-260
28EECynthia Dwork, Frank McSherry, Kobbi Nissim, Adam Smith: Calibrating Noise to Sensitivity in Private Data Analysis. TCC 2006: 265-284
27EEYevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data CoRR abs/cs/0602007: (2006)
26EESofya Raskhodnikova, Adam Smith: A Note on Adaptivity in Testing Properties of Bounded Degree Graphs. Electronic Colloquium on Computational Complexity (ECCC) 13(089): (2006)
2005
25EEXavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam Smith: Secure Remote Authentication Using Biometric Data. EUROCRYPT 2005: 147-163
24EEClaude Crépeau, Daniel Gottesman, Adam Smith: Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes. EUROCRYPT 2005: 285-301
23EEYevgeniy Dodis, Adam Smith: Correcting errors without leaking partial information. STOC 2005: 654-663
22EEShuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith, Hoeteck Wee: Toward Privacy in Public Databases. TCC 2005: 363-385
21EEYevgeniy Dodis, Adam Smith: Entropic Security and the Encryption of High Entropy Messages. TCC 2005: 556-577
20EEClaude Crépeau, Daniel Gottesman, Adam Smith: Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes CoRR abs/quant-ph/0503139: (2005)
19EESofya Raskhodnikova, Dana Ron, Ronitt Rubinfeld, Amir Shpilka, Adam Smith: Sublinear Algorithms for Approximating String Compressibility and the Distribution Support Size Electronic Colloquium on Computational Complexity (ECCC)(125): (2005)
2004
18EEAndris Ambainis, Adam Smith: Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption. APPROX-RANDOM 2004: 249-260
17EEYevgeniy Dodis, Leonid Reyzin, Adam Smith: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. EUROCRYPT 2004: 523-540
16EERafail Ostrovsky, Charles Rackoff, Adam Smith: Efficient Consistency Proofs for Generalized Queries on a Committed Database. ICALP 2004: 1041-1053
15 Adam Smith, Hari Balakrishnan, Michel Goraczko, Nissanka B. Priyantha: Tracking Moving Devices with the Cricket Location System. MobiSys 2004
14EECynthia Dwork, Ronen Shaltiel, Adam Smith, Luca Trevisan: List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument. TCC 2004: 101-120
2003
13EEJonathan Katz, Rafail Ostrovsky, Adam Smith: Round Efficiency of Multi-party Computation with a Dishonest Majority. EUROCRYPT 2003: 578-595
12EEChris Peikert, Abhi Shelat, Adam Smith: Lower bounds for collusion-secure fingerprinting. SODA 2003: 472-479
2002
11EEHoward Barnum, Claude Crépeau, Daniel Gottesman, Adam Smith, Alain Tapp: Authentication of Quantum Messages. FOCS 2002: 449-458
10EEAndris Ambainis, Adam Smith, Ke Yang: Extracting Quantum Entanglement. IEEE Conference on Computational Complexity 2002: 103-112
9EEMatthias Fitzi, Daniel Gottesman, Martin Hirt, Thomas Holenstein, Adam Smith: Detectable byzantine agreement secure against faulty majorities. PODC 2002: 118-126
8EEClaude Crépeau, Daniel Gottesman, Adam Smith: Secure multi-party quantum computation. STOC 2002: 643-652
7EEHoward Barnum, Claude Crépeau, Daniel Gottesman, Adam Smith, Alain Tapp: Authentication of Quantum Messages CoRR quant-ph/0205128: (2002)
2001
6EEMoses Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam Smith: Mutually Independent Commitments. ASIACRYPT 2001: 385-401
5EEYevgeniy Dodis, Amit Sahai, Adam Smith: On Perfect and Adaptive Security in Exposure-Resilient Cryptography. EUROCRYPT 2001: 301-324
4EEGiovanni Di Crescenzo, Jonathan Katz, Rafail Ostrovsky, Adam Smith: Efficient and Non-interactive Non-malleable Commitment. EUROCRYPT 2001: 40-59
2000
3 Adam Smith, Subhash Suri: Rectangular Tiling in Multidimensional Arrays. J. Algorithms 37(2): 451-467 (2000)
1999
2EEAdam Smith, Subhash Suri: Rectangular Tiling in Multi-dimensional Arrays. SODA 1999: 786-794
1EEAdam Smith, Anton Stiglic: Multiparty computation unconditionally secure against Q^2 adversary structures CoRR cs.CR/9902010: (1999)

Coauthor Index

1Andris Ambainis [10] [18]
2Hari Balakrishnan [15]
3Howard Barnum [7] [11]
4Michael Ben-Or [29]
5Xavier Boyen [25]
6Shuchi Chawla [22]
7Claude Crépeau [7] [8] [11] [20] [24] [29]
8Giovanni Di Crescenzo [4]
9Ivan Damgård [47]
10Yevgeniy Dodis [5] [17] [21] [23] [25] [27] [30] [37] [48]
11Cynthia Dwork [14] [22] [28]
12Matthias Fitzi [9]
13Srivatsava Ranjit Ganta [42] [44]
14Michel Goraczko [15]
15Daniel Gottesman [7] [8] [9] [11] [20] [24] [29]
16Vipul Goyal [46]
17Avinatan Hassidim [29]
18Martin Hirt [9]
19Thomas Holenstein [9]
20Yuval Ishai [47]
21Shiva Prasad Kasiviswanathan [40] [41] [42] [44] [45]
22Jonathan Katz [4] [13] [25] [30] [48]
23Mikkel Krøigaard [47]
24Homin K. Lee [41] [45]
25Moses Liskov [6]
26Anna Lysyanskaya [6]
27Michael Mateas [43]
28Frank McSherry [22] [28]
29Silvio Micali [6]
30Payman Mohassel [46]
31Moni Naor [31] [38]
32Jesper Buus Nielsen [47]
33Kobbi Nissim [28] [33] [41] [45]
34Rafail Ostrovsky [4] [13] [16] [25] [27] [37]
35Chris Peikert [12]
36Zachary Pousman [43]
37Nissanka B. Priyantha [15]
38Charles Rackoff [16]
39Sofya Raskhodnikova [19] [26] [32] [33] [35] [36] [41] [45]
40Leonid Reyzin [6] [17] [27] [30] [37]
41Mario Romero [43]
42Dana Ron [19] [32] [35] [36]
43Ronitt Rubinfeld [19] [32] [36]
44Amit Sahai [5]
45Gil Segev [31] [38]
46Ronen Shaltiel [14]
47Abhi Shelat [12]
48Amir Shpilka [19] [35]
49Anton Stiglic [1]
50Subhash Suri [2] [3]
51Alain Tapp [7] [11]
52Luca Trevisan [14]
53Shabsi Walfish [48]
54Hoeteck Wee [22]
55Ke Yang [10]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)