The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ohad Rodeh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dalit Naor, Petra Reshef, Ohad Rodeh, Allon Shafrir, Adam Wolman, Eitan Yaffe
    Benchmarking and Testing OSD for Correctness and Compliance. [Citation Graph (0, 0)][DBLP]
    Haifa Verification Conference, 2005, pp:158-176 [Conf]
  2. Dahlia Malkhi, Michael Merritt, Ohad Rodeh
    Secure Reliable Multicast Protocols in a WAN. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1997, pp:0-0 [Conf]
  3. Alain Azagury, Vladimir Dreizin, Michael Factor, Ealan Henis, Dalit Naor, Noam Rinetzky, Ohad Rodeh, Julian Satran, Ami Tavory, Lena Yerushalmi
    Towards an Object Stor. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Mass Storage Systems, 2003, pp:165-0 [Conf]
  4. Ohad Rodeh, Avi Teperman
    zFS - A Scalable Distributed File System Using Object Disks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Mass Storage Systems, 2003, pp:207-218 [Conf]
  5. Ohad Rodeh, Kenneth P. Birman, Danny Dolev
    Optimized Rekey for Group Communication Systems. [Citation Graph (0, 0)][DBLP]
    NDSS, 2000, pp:- [Conf]
  6. Alain Azagury, Ran Canetti, Michael Factor, Shai Halevi, Ealan Henis, Dalit Naor, Noam Rinetzky, Ohad Rodeh, Julian Satran
    A Two Layered Approach for Securing an Object Store Network. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:10-23 [Conf]
  7. Dahlia Malkhi, Ohad Rodeh, Michael K. Reiter, Yaron Sella
    Efficient Update Diffusion in Byzantine Environments. [Citation Graph (0, 0)][DBLP]
    SRDS, 2001, pp:90-98 [Conf]
  8. Dahlia Malkhi, Michael Merritt, Ohad Rodeh
    Secure Multicast in a WAN [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  9. Dahlia Malkhi, Michael Merritt, Ohad Rodeh
    Secure Reliable Multicast Protocols in a WAN. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2000, v:13, n:1, pp:19-28 [Journal]
  10. Ohad Rodeh, Kenneth P. Birman, Danny Dolev
    Using AVL trees for fault-tolerant group key management. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:84-99 [Journal]
  11. Ohad Rodeh, Kenneth P. Birman, Danny Dolev
    The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:289-319 [Journal]

Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002