Danny Harnik
Danny Harnik
IBM Research - Haifa
Verified email at il.ibm.com - Homepage
Cited by
Cited by
Proofs of ownership in remote storage systems
S Halevi, D Harnik, B Pinkas, A Shulman-Peleg
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Side channels in cloud services: Deduplication in cloud storage
D Harnik, B Pinkas, A Shulman-Peleg
IEEE Security & Privacy 8 (6), 40-47, 2010
On robust combiners for oblivious transfer and other primitives
D Harnik, J Kilian, M Naor, O Reingold, A Rosen
Annual International Conference on the Theory and Applications of …, 2005
On the Compressibility of Instances and Cryptographic Applications
D Harnik, M Naor
SIAM Journal on Computing 39 (5), 1667-1713, 2010
Constant-round oblivious transfer in the bounded storage model
YZ Ding, D Harnik, A Rosen, R Shaltiel
Journal of Cryptology 20 (2), 165-202, 2007
OT-combiners via secure computation
D Harnik, Y Ishai, E Kushilevitz, JB Nielsen
Theory of Cryptography Conference, 393-411, 2008
Semantic Security Under Related-Key Attacks and Applications.
B Applebaum, D Harnik, Y Ishai
ICS 2011, 45-60, 2011
On the power of the randomized iterate
I Haitner, D Harnik, O Reingold
SIAM Journal on Computing 40 (6), 1486-1528, 2011
Low power mode in cloud storage systems
D Harnik, D Naor, I Segall
2009 IEEE International Symposium on Parallel & Distributed Processing, 1-8, 2009
Estimation of deduplication ratios in large data sets
D Harnik, O Margalit, D Naor, D Sotnikov, G Vernik
012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST), 1-11, 2012
A cloud environment for data-intensive storage services
EK Kolodner, S Tal, D Kyriazis, D Naor, M Allalouf, L Bonelli, P Brand, ...
2011 IEEE third international conference on cloud computing technology and …, 2011
To zip or not to zip: Effective resource usage for real-time compression
D Harnik, R Kat, D Sotnikov, A Traeger, O Margalit
Presented as part of the 11th {USENIX} Conference on File and Storage …, 2013
Compression and SSDs: Where and how?
A Zuck, S Toledo, D Sotnikov, D Harnik
2nd Workshop on Interactions of NVM/Flash with Operating Systems and …, 2014
Higher lower bounds on monotone size
D Harnik, R Raz
Proceedings of the thirty-second annual ACM symposium on Theory of computing …, 2000
Completeness in two-party secure computation: A computational view
D Harnik, M Naor, O Reingold, A Rosen
Journal of cryptology 19 (4), 521-552, 2006
Efficient pseudorandom generators from exponentially hard one-way functions
I Haitner, D Harnik, O Reingold
International Colloquium on Automata, Languages, and Programming, 228-239, 2006
A fast implementation of Deflate
D Harnik, E Khaitzin, D Sotnikov, S Taharlev
2014 Data Compression Conference, 223-232, 2014
Estimation of data reduction rate in a data storage system
D Harnik, O Margalit, D Naor, D Sotnikov, G Vernik
US Patent 8,650,163, 2014
Secure access mechanism for cloud storage
D Harnik, EK Kolodner, S Ronen, J Satran, A Shulman-Peleg, S Tal
Scalable Computing: Practice and Experience 12 (3), 317-336, 2011
SDGen: Mimicking datasets for content generation in storage benchmarks
R Gracia-Tinedo, D Harnik, D Naor, D Sotnikov, S Toledo, A Zuck
13th {USENIX} Conference on File and Storage Technologies ({FAST} 15), 317-330, 2015
The system can't perform the operation now. Try again later.
Articles 1–20