How to time-stamp a digital document WSS Stuart Haber Journal of Cryptology 3 (2), 99-111, 1991 | 3214* | 1991 |
Improving the efficiency and reliability of digital time-stamping D Bayer, S Haber, WS Stornetta Sequences II: Methods in Communication, Security and Computer Science, 329-334, 1993 | 966 | 1993 |
Method for secure time-stamping of digital documents SA Haber, WS Stornetta Jr US Patent 5,136,647, 1992 | 473 | 1992 |
Digital document time-stamping with catenate certificate SA Haber, WS Stornetta Jr US Patent 5,136,646, 1992 | 406 | 1992 |
Secure names for bit-strings S Haber, WS Stornetta Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 359 | 1997 |
Digital document authentication system SA Haber, WS Stornetta Jr US Patent 5,781,629, 1998 | 307 | 1998 |
Method of extending the validity of a cryptographic certificate SA Haber, WS Stornetta Jr US Patent 5,373,561, 1994 | 283 | 1994 |
Audit-log integrity using redactable signatures W Horne, S Haber, T Sander US Patent 8,943,332, 2015 | 249 | 2015 |
Method for secure time-stamping of digital documents SA Haber, WS Stornetta Jr US Patent RE34,954, 1995 | 201 | 1995 |
Cryptographic computation: Secure fault-tolerant protocols and the public-key model Z Galil, S Haber, M Yung Conference on the Theory and Application of Cryptographic Techniques, 135-155, 1987 | 176 | 1987 |
Cryptographic protocols provably secure against dynamic adversaries D Beaver, S Haber Workshop on the Theory and Application of of Cryptographic Techniques, 307-323, 1992 | 175 | 1992 |
Establishing a secure channel with a human user B Pinkas, SA Haber, RE Tarjan, T Sander US Patent 7,149,899, 2006 | 155 | 2006 |
Joint encryption and message-efficient secure computation M Franklin, S Haber Annual International Cryptology Conference, 266-277, 1993 | 149 | 1993 |
A VLSI-efficient technique for generating multiple uncorrelated noise sources and its application to stochastic neural networks J Alspector, JW Gannett, S Haber, MB Parker, R Chu IEEE Transactions on circuits and systems 38 (1), 109-123, 1991 | 148 | 1991 |
Joint encryption and message-efficient secure computation M Franklin, S Haber Journal of Cryptology 9 (4), 217-232, 1996 | 130 | 1996 |
Silent shredder: Zero-cost shredding for secure non-volatile main memory controllers A Awad, P Manadhata, S Haber, Y Solihin, W Horne ACM SIGPLAN Notices 51 (4), 263-276, 2016 | 122 | 2016 |
A private interactive test of a Boolean predicate and minimum-knowledge public-key cryptosystems Z Galil, S Haber, M Yung FoCS, 360-371, 1985 | 91 | 1985 |
Securely combining public-key cryptosystems S Haber, B Pinkas Proceedings of the 8th ACM conference on Computer and Communications …, 2001 | 88 | 2001 |
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification S Haber, Y Hatano, Y Honda, W Horne, K Miyazaki, T Sander, S Tezoku, ... Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 87 | 2008 |
Privacy-preserving computation and verification of aggregate queries on outsourced databases B Thompson, S Haber, W Horne, T Sander, D Yao Privacy Enhancing Technologies, 185-201, 2009 | 86 | 2009 |