M
Moni Naor
Researcher at Weizmann Institute of Science
Publications - 348
Citations - 49941
Moni Naor is an academic researcher from Weizmann Institute of Science. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 102, co-authored 338 publications receiving 47090 citations. Previous affiliations of Moni Naor include IBM & Stanford University.
Papers
More filters
Proceedings ArticleDOI
Fairness in scheduling
TL;DR: This paper explores the issue of fairness in scheduling in settings where there are long-lived processes which should be repeatedly scheduled for various tasks throughout the lifetime of a system, and develops a notion of desired load of a process, which is a function of the tasks it participates in.
Proceedings Article
Privately Learning Thresholds: Closing the Exponential Gap
TL;DR: In this article, the sample complexity of learning threshold functions under the constraint of differential privacy was studied, where each labeled example in the training data is the information of one individual and the goal is to come up with a generalizing hypothesis $h$ while guaranteeing differential privacy for the individuals.
Book ChapterDOI
Polling with physical envelopes: a rigorous analysis of a human-centric protocol
Tal Moran,Moni Naor +1 more
TL;DR: In this article, the authors propose simple, realistic protocols for polling that allow the responder to plausibly repudiate his response, while at the same time allowing accurate statistical analysis of poll results.
Journal ArticleDOI
Optimal File Sharing in Distributed Networks
Moni Naor,Ron M. Roth +1 more
TL;DR: A file distribution scheme which realizes the objective to minimize the total size of memory in the network and the requirement of $k$ being much larger than $\log \Delta_G$ is shown, which approaches an integer programming lower bound on that size.
Journal Article
Threshold traitor tracing
Moni Naor,Benny Pinkas +1 more
TL;DR: In this article, the authors present threshold tracing schemes which are only designed to trace the source of keys of decoders which decrypt with probability greater than some threshold q (which is a parameter) and present a dramatic reduction in the overhead compared to the previous constructions of tracing schemes.