The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

William Aiello: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis
    Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf]
  2. William Aiello, John Ioannidis, Patrick Drew McDaniel
    Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:165-178 [Conf]
  3. William Aiello, Aviel D. Rubin, Martin Strauss
    Using Smartcards to Secure a Personalized Gambling Device. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:128-137 [Conf]
  4. Kevin R. B. Butler, Patrick McDaniel, William Aiello
    Optimizing BGP security by exploiting path stability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:298-310 [Conf]
  5. William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
    Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:390-407 [Conf]
  6. William Aiello, Sachin Lodha, Rafail Ostrovsky
    Fast Digital Identity Revocation (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:137-152 [Conf]
  7. William Aiello, Yuval Ishai, Omer Reingold
    Priced Oblivious Transfer: How to Sell Digital Goods. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:119-135 [Conf]
  8. William Aiello, Ramarathnam Venkatesan
    Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:307-320 [Conf]
  9. William Aiello, Fan R. K. Chung, Linyuan Lu
    Random Evolution in Massive Graphs. [Citation Graph (0, 0)][DBLP]
    FOCS, 2001, pp:510-519 [Conf]
  10. William Aiello, Shafi Goldwasser, Johan Håstad
    On the Power of Interaction [Citation Graph (0, 0)][DBLP]
    FOCS, 1986, pp:368-379 [Conf]
  11. William Aiello, Johan Håstad
    Perfect Zero-Knowledge Languages Can Be Recognized in Two Rounds [Citation Graph (0, 0)][DBLP]
    FOCS, 1987, pp:439-448 [Conf]
  12. William Aiello, Stuart Haber, Ramarathnam Venkatesan
    New Constructions for Secure Hash Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:150-167 [Conf]
  13. William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan
    High-Speed Pseudorandom Number Generation with Small Memory. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:290-304 [Conf]
  14. William Aiello, Sandeep N. Bhatt, Rafail Ostrovsky, Sivaramakrishnan Rajagopalan
    Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP. [Citation Graph (0, 0)][DBLP]
    ICALP, 2000, pp:463-474 [Conf]
  15. William Aiello, Anna C. Gilbert, Brian Rexroad, Vyas Sekar
    Sparse Approximations for High Fidelity Compression of Network Traffic Data. [Citation Graph (0, 0)][DBLP]
    Internet Measurment Conference, 2005, pp:253-266 [Conf]
  16. William Aiello, Yishay Mansour, S. Rajagopolan, Adi Rosén
    Competitive Queue Policies for Differentiated Services. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2000, pp:431-440 [Conf]
  17. Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin
    Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  18. Patrick Drew McDaniel, Shubho Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek
    Enterprise Security: A Community of Interest Based Approach. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  19. William Aiello, Charles R. Kalmanek, Patrick Drew McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe
    Analysis of Communities of Interest in Data Networks. [Citation Graph (0, 0)][DBLP]
    PAM, 2005, pp:83-96 [Conf]
  20. William Aiello, Ramarathnam Venkatesan, Moti Yung
    Coins, Weights and Contention in Balancing Networks. [Citation Graph (0, 0)][DBLP]
    PODC, 1994, pp:193-205 [Conf]
  21. William Aiello, Sandeep N. Bhatt, Fan R. K. Chung, Arnold L. Rosenberg, Ramesh K. Sitaraman
    Augmented Ring Networks. [Citation Graph (0, 0)][DBLP]
    SIROCCO, 1999, pp:1-16 [Conf]
  22. William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan
    Design of Practical and Provably Good Random Number Generators (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    SODA, 1995, pp:1-9 [Conf]
  23. William Aiello, Milena Mihail
    Learning the Fourier Spectrum of Probabilistic Lists and Trees. [Citation Graph (0, 0)][DBLP]
    SODA, 1991, pp:291-299 [Conf]
  24. William Aiello, Rafail Ostrovsky, Eyal Kushilevitz, Adi Rosén
    Dynamic routing on networks with fixed-size buffers. [Citation Graph (0, 0)][DBLP]
    SODA, 2003, pp:771-780 [Conf]
  25. B. Aiello, Frank Thomson Leighton
    Coding Theory, Hypercube Embeddings, and Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    SPAA, 1991, pp:125-136 [Conf]
  26. B. Aiello, Frank Thomson Leighton, Bruce M. Maggs, Mark Newman
    Fast Algorithms for Bit-Serial Routing on a Hypercube. [Citation Graph (0, 0)][DBLP]
    SPAA, 1990, pp:55-64 [Conf]
  27. Pangfeng Liu, William Aiello, Sandeep N. Bhatt
    An Atomic Model for Message-Passing. [Citation Graph (0, 0)][DBLP]
    SPAA, 1993, pp:154-163 [Conf]
  28. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:27-39 [Conf]
  29. William Aiello, Costas Busch, Maurice Herlihy, Marios Mavronicolas, Nir Shavit, Dan Touitou
    Supporting Increment and Decrement Operations in Balancing Networks. [Citation Graph (0, 0)][DBLP]
    STACS, 1999, pp:393-403 [Conf]
  30. William Aiello, Baruch Awerbuch, Bruce M. Maggs, Satish Rao
    Approximate load balancing on dynamic and asynchronous networks. [Citation Graph (0, 0)][DBLP]
    STOC, 1993, pp:632-641 [Conf]
  31. William Aiello, Mihir Bellare, Ramarathnam Venkatesan
    Knowledge on the average-perfect, statistical and logarithmic. [Citation Graph (0, 0)][DBLP]
    STOC, 1995, pp:469-478 [Conf]
  32. William Aiello, Fan R. K. Chung, Linyuan Lu
    A random graph model for massive graphs. [Citation Graph (0, 0)][DBLP]
    STOC, 2000, pp:171-180 [Conf]
  33. William Aiello, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosén
    Adaptive Packet Routing for Bursty Adversarial Traffic. [Citation Graph (0, 0)][DBLP]
    STOC, 1998, pp:359-368 [Conf]
  34. William Aiello, Costas Busch, Maurice Herlihy, Marios Mavronicolas, Nir Shavit, Dan Touitou
    Supporting Increment and Decrement Operations in Balancing Networks. [Citation Graph (0, 0)][DBLP]
    Chicago J. Theor. Comput. Sci., 2000, v:2000, n:, pp:- [Journal]
  35. Patrick McDaniel, William Aiello, Kevin Butler, John Ioannidis
    Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:16, pp:2953-2980 [Journal]
  36. William Aiello, Shafi Goldwasser, Johan Håstad
    On the power of interaction. [Citation Graph (0, 0)][DBLP]
    Combinatorica, 1990, v:10, n:1, pp:3-25 [Journal]
  37. William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
    Security amplification by composition: The case of doubly-iterated ideal ciphers [Citation Graph (0, 0)][DBLP]
    CoRR, 1998, v:0, n:, pp:- [Journal]
  38. William Aiello, Johan Håstad
    Relativized Perfect Zero Knowledge Is Not BPP [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1991, v:93, n:2, pp:223-240 [Journal]
  39. William Aiello, Yishay Mansour, S. Rajagopolan, Adi Rosén
    Competitive queue policies for differentiated services. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 2005, v:55, n:2, pp:113-141 [Journal]
  40. William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan
    Design of Practical and Provably Good Random Number Generators. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1998, v:29, n:2, pp:358-389 [Journal]
  41. William Aiello, Johan Håstad
    Statistical Zero-Knowledge Languages can be Recognized in Two Rounds. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1991, v:42, n:3, pp:327-345 [Journal]
  42. William Aiello, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosén
    Adaptive Packet Routing for Bursty Adversarial Traffic. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 2000, v:60, n:3, pp:482-509 [Journal]
  43. William Aiello, Frank Thomson Leighton, Bruce M. Maggs, Mark Newman
    Fast Algorithms for Bit-Serial Routing on a Hypercube. [Citation Graph (0, 0)][DBLP]
    Mathematical Systems Theory, 1991, v:24, n:4, pp:253-271 [Journal]
  44. Pangfeng Liu, William Aiello, Sandeep N. Bhatt
    Tree Search on an Atomic Model for Message Passing. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2001, v:31, n:1, pp:67-85 [Journal]
  45. William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
    Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal]
  46. William Aiello, Sandeep N. Bhatt, Fan R. K. Chung, Arnold L. Rosenberg, Ramesh K. Sitaraman
    Augmented Ring Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:6, pp:598-609 [Journal]
  47. William Aiello, Anthony Bonato, C. Cooper, J. Janssen, P. Pralat
    A Spatial Web Graph Model with Local Influence Regions. [Citation Graph (0, 0)][DBLP]
    WAW, 2007, pp:96-107 [Conf]
  48. William Aiello, Frank Thomson Leighton
    Hamming Codes, Hypercube Embeddings, and Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2007, v:37, n:3, pp:783-803 [Journal]

  49. Configuration Management at Massive Scale: System Design and Experience. [Citation Graph (, )][DBLP]


  50. Modelling and Mining of Networked Information Spaces. [Citation Graph (, )][DBLP]


  51. Workshop on Algorithms and Models for the Web Graph. [Citation Graph (, )][DBLP]


  52. Characterization of Graphs Using Degree Cores. [Citation Graph (, )][DBLP]


Search in 0.000secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002