Follow
Danny Harnik
Danny Harnik
IBM Research - Haifa
Verified email at il.ibm.com - Homepage
Title
Cited by
Cited by
Year
Proofs of ownership in remote storage systems
S Halevi, D Harnik, B Pinkas, A Shulman-Peleg
Proceedings of the 18th ACM conference on Computer and communications …, 2011
8222011
Side channels in cloud services: Deduplication in cloud storage
D Harnik, B Pinkas, A Shulman-Peleg
IEEE Security & Privacy 8 (6), 40-47, 2010
6652010
On robust combiners for oblivious transfer and other primitives
D Harnik, J Kilian, M Naor, O Reingold, A Rosen
Annual International Conference on the Theory and Applications of …, 2005
1392005
Constant-round oblivious transfer in the bounded storage model
YZ Ding, D Harnik, A Rosen, R Shaltiel
Journal of Cryptology 20 (2), 165-202, 2007
1132007
OT-combiners via secure computation
D Harnik, Y Ishai, E Kushilevitz, JB Nielsen
Theory of Cryptography Conference, 393-411, 2008
1122008
On the Compressibility of Instances and Cryptographic Applications
D Harnik, M Naor
SIAM Journal on Computing 39 (5), 1667-1713, 2010
1102010
Semantic security under related-key attacks and applications
B Applebaum, D Harnik, Y Ishai
Cryptology ePrint Archive, 2010
862010
On the power of the randomized iterate
I Haitner, D Harnik, O Reingold
SIAM Journal on Computing 40 (6), 1486-1528, 2011
75*2011
Low power mode in cloud storage systems
D Harnik, D Naor, I Segall
2009 IEEE International Symposium on Parallel & Distributed Processing, 1-8, 2009
712009
Estimation of deduplication ratios in large data sets
D Harnik, O Margalit, D Naor, D Sotnikov, G Vernik
2012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST), 1-11, 2012
662012
A cloud environment for data-intensive storage services
EK Kolodner, S Tal, D Kyriazis, D Naor, M Allalouf, L Bonelli, P Brand, ...
2011 IEEE third international conference on cloud computing technology and …, 2011
652011
To Zip or Not to Zip: Effective Resource Usage for {Real-Time} Compression
D Harnik, R Kat, D Sotnikov, A Traeger, O Margalit
11th USENIX Conference on File and Storage Technologies (FAST 13), 229-241, 2013
542013
Compression and {SSDs}: Where and How?
A Zuck, S Toledo, D Sotnikov, D Harnik
2nd Workshop on Interactions of NVM/Flash with Operating Systems and …, 2014
532014
Higher lower bounds on monotone size
D Harnik, R Raz
Proceedings of the thirty-second annual ACM symposium on Theory of computing …, 2000
522000
A fast implementation of deflate
D Harnik, E Khaitzin, D Sotnikov, S Taharlev
2014 Data Compression Conference, 223-232, 2014
382014
Completeness in two-party secure computation: A computational view
D Harnik, M Naor, O Reingold, A Rosen
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
342004
Estimation of data reduction rate in a data storage system
D Harnik, O Margalit, D Naor, D Sotnikov, G Vernik
US Patent 8,650,163, 2014
332014
Efficient pseudorandom generators from exponentially hard one-way functions
I Haitner, D Harnik, O Reingold
International Colloquium on Automata, Languages, and Programming, 228-239, 2006
322006
Cluster of secure execution platforms
D Harnik, M Hershcovitch, P Ta-Shma, Y Weinsberg
US Patent 10,567,359, 2020
282020
On Everlasting Security in the Hybrid Bounded Storage Model
D Harnik, M Naor
International Colloquium on Automata, Languages, and Programming, 192-203, 2006
282006
The system can't perform the operation now. Try again later.
Articles 1–20