1
Frederick S M Herz, Walter Paul Labys, David C Parkes, Sampath Kannan, Jason M Eisner: Secure data interchange. Pinpoint Incorporated, Wolf Greenfield & Sacks P C, December 8, 2009: US07630986 (700 worldwide citation)

A system for exchanging data includes a communication system, a first and a second party connected to the communication system, wherein each party has personal data, and each party has a disclosure policy to control dissemination of its data, and a secure intermediate party connected to the communic ...


2
Frederick S M Herz, Yael Gertner, Craig H Martell, Sampath Kannan: System and method which employs a multi user secure scheme utilizing shared keys. Woodcock Washburn, March 25, 2008: US07350069 (8 worldwide citation)

We propose a multi user information theoretically secure scheme. Our scheme allows any two parties in a multi user system to exchange messages securely using encryption, and to sign messages. Our scheme achieves a significant saving in the number of total keys in the system and in the keys each user ...


3
Frederick S M Herz, Yael Gertner, Craig Martell, Sampath Kannan: System and method for encrypting data in pictorial data. Woodcock Washburn, November 18, 2008: US07454020

An encryption scheme that uses steganography includes an encryption algorithm that encrypts messages by embedding them in a data stream in such a way that an adversary cannot get information about the messages. Since the embedding is the only computation required, this scheme is optimal in computati ...


4
Oleg Sokolsky, Insup Lee, Sampath Kannan: System and method for comparing similarity of computer programs. The Trustees of the University of Pennsylvania, Synnestvedt & Lechner, October 11, 2007: US20070239993-A1

Similarity between the distinct documents/programs is determined by comparing their respective control flow or other labeled transition graphs. The determination of similarity involves creating a combined measure of similarity based in part on a measure of local similarity between the graphs and in ...


5
Frederick Stephan Michael Herz, Yael Gertner, Craig H Martell, Sampath Kannan: System and method for encrypting data in analog form. Woodcock Washburn, January 19, 2006: US20060013390-A1

We propose an encryption scheme which uses steganography. The encryption algorithm encrypts messages by embedding them in a data stream in such a way that an adversary cannot get information about the messages. Since the embedding is the only computation requires this scheme is optimal in computatio ...


6
Frederick SM Herz, Yael Gertner, Craig Martell, Sampath Kannan: System and method which employs a multi user secure scheme utilizing shared keys. Woodcock Washburn, March 16, 2006: US20060059347-A1

We propose a multi user information theoretically secure scheme. Our scheme allows any two parties in a multi user system to exchange messages securely using encryption, and to sign messages. Our scheme achieves a significant saving in the number of total keys in the system and in the keys each user ...


7
Frederick S M Herz, Walter Paul Labys, David C Parkes, Sampath Kannan, Jason M Eisner: Secure data interchange. Pinpoint Incorporated, Wolf Greenfield & Sacks PC, October 8, 2009: US20090254971-A1

A secure data interchange system enables information about bilateral and multilateral interactions between multiple persistent parties to be exchanged and leveraged within an environment that uses a combination of techniques to control access to information, release of information, and matching of i ...