[go: up one dir, main page]

Follow
Stuart Haber
Stuart Haber
Stuart Haber Crypto, LLC
Verified email at acm.org - Homepage
Title
Cited by
Cited by
Year
How to time-stamp a digital document
S Haber, WS Stornetta
Conference on the Theory and Application of Cryptography, 437-455, 1990
34821990
Improving the efficiency and reliability of digital time-stamping
D Bayer, S Haber, WS Stornetta
Sequences II: Methods in Communication, Security and Computer Science, 329-334, 1993
10301993
Method for secure time-stamping of digital documents
SA Haber, WS Stornetta Jr
US Patent 5,136,647, 1992
4501992
Digital document time-stamping with catenate certificate
SA Haber, WS Stornetta Jr
US Patent 5,136,646, 1992
3851992
Secure names for bit-strings
S Haber, WS Stornetta
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
3821997
Digital document authentication system
SA Haber, WS Stornetta Jr
US Patent 5,781,629, 1998
3091998
Method of extending the validity of a cryptographic certificate
SA Haber, WS Stornetta Jr
US Patent 5,373,561, 1994
2581994
Audit-log integrity using redactable signatures
W Horne, S Haber, T Sander
US Patent 8,943,332, 2015
2572015
Cryptographic protocols provably secure against dynamic adversaries
D Beaver, S Haber
Workshop on the Theory and Application of of Cryptographic Techniques, 307-323, 1992
1831992
Cryptographic computation: Secure fault-tolerant protocols and the public-key model
Z Galil, S Haber, M Yung
Conference on the Theory and Application of Cryptographic Techniques, 135-155, 1987
1781987
Establishing a secure channel with a human user
B Pinkas, SA Haber, RE Tarjan, T Sander
US Patent 7,149,899, 2006
1532006
A VLSI-efficient technique for generating multiple uncorrelated noise sources and its application to stochastic neural networks
J Alspector, JW Gannett, S Haber, MB Parker, R Chu
IEEE Transactions on circuits and systems 38 (1), 109-123, 1991
1521991
Joint encryption and message-efficient secure computation
M Franklin, S Haber
Annual International Cryptology Conference, 266-277, 1993
1501993
Joint encryption and message-efficient secure computation
M Franklin, S Haber
Journal of Cryptology 9 (4), 217-232, 1996
1301996
Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers
A Awad, P Manadhata, S Haber, Y Solihin, W Horne
ACM SIGPLAN Notices 51 (4), 263-276, 2016
1262016
A private interactive test of a Boolean predicate and minimum-knowledge public-key cryptosystems
Z Galil, S Haber, M Yung
FoCS, 360-371, 1985
901985
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification
S Haber, Y Hatano, Y Honda, W Horne, K Miyazaki, T Sander, S Tezoku, ...
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
882008
Securely combining public-key cryptosystems
S Haber, B Pinkas
Proceedings of the 8th ACM conference on Computer and Communications …, 2001
882001
Privacy-preserving computation and verification of aggregate queries on outsourced databases
B Thompson, S Haber, W Horne, T Sander, D Yao
Privacy Enhancing Technologies, 185-201, 2009
832009
Integrity verification of pseudonymized documents
S Haber, WG Horne, T Sander, YAO Danfeng
US Patent 8,266,439, 2012
782012
The system can't perform the operation now. Try again later.
Articles 1–20