Yacov Yacobi

Affiliations:
  • Microsoft Research


According to our database1, Yacov Yacobi authored at least 43 papers between 1980 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
A Fast Attribute Based Encryption.
IACR Cryptol. ePrint Arch., 2016

2010
Towards a Theory of Trust Based Collaborative Search.
IACR Cryptol. ePrint Arch., 2010

Quantifying Trust.
IACR Cryptol. ePrint Arch., 2010

2008
On the economic payoff of forensic systems when used to trace Counterfeited Software and content.
IACR Cryptol. ePrint Arch., 2008

On The Diffie-Hellman Assumption.
IACR Cryptol. ePrint Arch., 2008

Counterfeiting and anti-counterfeitingof software and content.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

Content identification.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

2007
Vulnerabilities in Anonymous Credential Systems.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

2006
A New Related Message Attack on RSA.
Proceedings of the Theoretical Computer Science, 2006

2004
Topics in wireless security.
IEEE Wirel. Commun., 2004

A Dual Watermark-Fingerprint System.
IEEE Multim., 2004

On the economics of anti-counterfeiting.
Proceedings of the Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), 2004

2002
A Note on the Bilinear Diffie-Hellman Assumption.
IACR Cryptol. ePrint Arch., 2002

Multimedia content screening using a dual watermarking and fingerprinting system.
Proceedings of the 10th ACM International Conference on Multimedia 2002, 2002

2001
Improved Boneh-Shaw Content Fingerprinting.
Proceedings of the Topics in Cryptology, 2001

A Few Thoughts on E-Commerce.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

1999
Risk Management for E-Cash Systems with Partial Real-Time Audit.
Proceedings of the Financial Cryptography, 1999

1998
Fast Exponentiation Using Data Compression.
SIAM J. Comput., 1998

1997
Batch Diffie-Hellman Key Agreement Systems.
J. Cryptol., 1997

On the Continuum Between On-line and Off-line E-cash Systems - 1.
Proceedings of the Financial Cryptography, 1997

1996
A Non-interactive Public-Key Distribution System.
Des. Codes Cryptogr., 1996

1995
A Key Escrow System with Warrant Bounds.
Proceedings of the Advances in Cryptology, 1995

1994
Efficient Electronic Money (Extended Abstract).
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Privacy and Authentication on a Portable Communications System.
IEEE J. Sel. Areas Commun., 1993

User Impersonation in Key Certification Schemes.
J. Cryptol., 1993

1992
Security for personal communications services: public-key vs. private key approaches.
Proceedings of the Third IEEE International Symposium on Personal, 1992

A Remark on a Non-interactive Public-Key Distribution System.
Proceedings of the Advances in Cryptology, 1992

Batch Diffie-Hellman Key Agreement Systems and their Application to Portable Communications.
Proceedings of the Advances in Cryptology, 1992

1991
Non-interactive Public-Key Cryptography.
Proceedings of the Advances in Cryptology, 1991

Complexity Theoretic Analysis of Crypto-Protcols - Overview.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
Exponentiating Faster with Addition Chains.
Proceedings of the Advances in Cryptology, 1990

Discrete-Log With Compressible Exponents.
Proceedings of the Advances in Cryptology, 1990

A Key Distribution "Paradox".
Proceedings of the Advances in Cryptology, 1990

1989
On Key Distribution Systems.
Proceedings of the Advances in Cryptology, 1989

1987
On Privacy Homomorphisms (Extended Abstract).
Proceedings of the Advances in Cryptology, 1987

Attack on the Koyama-Ohta Identity Basedd Key Distribution Scheme.
Proceedings of the Advances in Cryptology, 1987

Secure Audio Teleconference.
Proceedings of the Advances in Cryptology, 1987

1985
Hard-Core Theorems for Complexity Classes
J. ACM, January, 1985

1984
The Complexity of Promise Problems with Applications to Public-Key Cryptography
Inf. Control., May, 1984

1982
A Note on Deterministic and Nondeterministic Time Complexity
Inf. Control., 1982

The Complexity of Promise Problems.
Proceedings of the Automata, 1982

1980
An Observation Concerning the Complexity of Problems with Few Solutions and its Application to Cryptography.
Proceedings of the Graphtheoretic Concepts in Computer Science, 1980

Cryptocomplexity and NP-Completeness.
Proceedings of the Automata, 1980


  Loading...