Privacy preserving data mining Y Lindell, B Pinkas Annual International Cryptology Conference, 36-54, 2000 | 1746 | 2000 |
Efficient private matching and set intersection MJ Freedman, K Nissim, B Pinkas International conference on the theory and applications of cryptographic …, 2004 | 1684 | 2004 |
Fairplay-Secure Two-Party Computation System. D Malkhi, N Nisan, B Pinkas, Y Sella USENIX security symposium 4, 9, 2004 | 1194 | 2004 |
Multicast security: A taxonomy and some efficient constructions R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas INFOCOM'99. Eighteenth Annual Joint Conference of the IEEE Computer and …, 1999 | 1170 | 1999 |
Tracing traitors B Chor, A Fiat, M Naor, B Pinkas Information Theory, IEEE Transactions on 46 (3), 893-910, 2000 | 1146* | 2000 |
Efficient oblivious transfer protocols. M Naor, B Pinkas SODA 1, 448-457, 2001 | 1079 | 2001 |
Privacy preserving auctions and mechanism design M Naor, B Pinkas, R Sumner Proceedings of the 1st ACM Conference on Electronic Commerce, 129-139, 1999 | 996 | 1999 |
A proof of security of Yao’s protocol for two-party computation Y Lindell, B Pinkas Journal of cryptology 22, 161-188, 2009 | 963 | 2009 |
Secure multiparty computation for privacy preserving data mining Y Lindell Encyclopedia of Data Warehousing and Mining, 1005-1009, 2005 | 961 | 2005 |
Proofs of ownership in remote storage systems S Halevi, D Harnik, B Pinkas, A Shulman-Peleg Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 914 | 2011 |
Oblivious transfer and polynomial evaluation M Naor, B Pinkas Proceedings of the thirty-first annual ACM symposium on Theory of computing …, 1999 | 872 | 1999 |
Privacy preserving data mining Lindell, Pinkas Journal of cryptology 15, 177-206, 2002 | 860 | 2002 |
Side channels in cloud services: Deduplication in cloud storage D Harnik, B Pinkas, A Shulman-Peleg IEEE Security & Privacy 8 (6), 40-47, 2010 | 728 | 2010 |
Turning your weakness into a strength: Watermarking deep neural networks by backdooring Y Adi, C Baum, M Cisse, B Pinkas, J Keshet 27th USENIX Security Symposium (USENIX Security 18), 1615-1631, 2018 | 724 | 2018 |
FairplayMP: a system for secure multi-party computation A Ben-David, N Nisan, B Pinkas Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 718 | 2008 |
Secure two-party computation is practical B Pinkas, T Schneider, NP Smart, SC Williams Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 637 | 2009 |
Efficient trace and revoke schemes M Naor, B Pinkas Financial Cryptography: 4th International Conference, FC 2000 Anguilla …, 2001 | 600 | 2001 |
Cryptographic techniques for privacy-preserving data mining B Pinkas ACM Sigkdd Explorations Newsletter 4 (2), 12-19, 2002 | 592 | 2002 |
Scalable private set intersection based on OT extension B Pinkas, T Schneider, M Zohner ACM Transactions on Privacy and Security (TOPS) 21 (2), 1-35, 2018 | 580 | 2018 |
An efficient protocol for secure two-party computation in the presence of malicious adversaries Y Lindell, B Pinkas Advances in Cryptology-EUROCRYPT 2007: 26th Annual International Conference …, 2007 | 573 | 2007 |