|
Search the dblp DataBase
William Aiello:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- William Aiello, Steven M. Bellovin, Matt Blaze, John Ioannidis, Omer Reingold, Ran Canetti, Angelos D. Keromytis
Efficient, DoS-resistant, secure key exchange for internet protocols. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:48-58 [Conf]
- William Aiello, John Ioannidis, Patrick Drew McDaniel
Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:165-178 [Conf]
- William Aiello, Aviel D. Rubin, Martin Strauss
Using Smartcards to Secure a Personalized Gambling Device. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:128-137 [Conf]
- Kevin R. B. Butler, Patrick McDaniel, William Aiello
Optimizing BGP security by exploiting path stability. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:298-310 [Conf]
- William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. [Citation Graph (0, 0)][DBLP] CRYPTO, 1998, pp:390-407 [Conf]
- William Aiello, Sachin Lodha, Rafail Ostrovsky
Fast Digital Identity Revocation (Extended Abstract). [Citation Graph (0, 0)][DBLP] CRYPTO, 1998, pp:137-152 [Conf]
- William Aiello, Yuval Ishai, Omer Reingold
Priced Oblivious Transfer: How to Sell Digital Goods. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2001, pp:119-135 [Conf]
- William Aiello, Ramarathnam Venkatesan
Foiling Birthday Attacks in Length-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1996, pp:307-320 [Conf]
- William Aiello, Fan R. K. Chung, Linyuan Lu
Random Evolution in Massive Graphs. [Citation Graph (0, 0)][DBLP] FOCS, 2001, pp:510-519 [Conf]
- William Aiello, Shafi Goldwasser, Johan Håstad
On the Power of Interaction [Citation Graph (0, 0)][DBLP] FOCS, 1986, pp:368-379 [Conf]
- William Aiello, Johan Håstad
Perfect Zero-Knowledge Languages Can Be Recognized in Two Rounds [Citation Graph (0, 0)][DBLP] FOCS, 1987, pp:439-448 [Conf]
- William Aiello, Stuart Haber, Ramarathnam Venkatesan
New Constructions for Secure Hash Functions. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1998, pp:150-167 [Conf]
- William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan
High-Speed Pseudorandom Number Generation with Small Memory. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1999, pp:290-304 [Conf]
- William Aiello, Sandeep N. Bhatt, Rafail Ostrovsky, Sivaramakrishnan Rajagopalan
Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP. [Citation Graph (0, 0)][DBLP] ICALP, 2000, pp:463-474 [Conf]
- William Aiello, Anna C. Gilbert, Brian Rexroad, Vyas Sekar
Sparse Approximations for High Fidelity Compression of Network Traffic Data. [Citation Graph (0, 0)][DBLP] Internet Measurment Conference, 2005, pp:253-266 [Conf]
- William Aiello, Yishay Mansour, S. Rajagopolan, Adi Rosén
Competitive Queue Policies for Differentiated Services. [Citation Graph (0, 0)][DBLP] INFOCOM, 2000, pp:431-440 [Conf]
- Geoffrey Goodell, William Aiello, Timothy Griffin, John Ioannidis, Patrick Drew McDaniel, Aviel D. Rubin
Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. [Citation Graph (0, 0)][DBLP] NDSS, 2003, pp:- [Conf]
- Patrick Drew McDaniel, Shubho Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek
Enterprise Security: A Community of Interest Based Approach. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- William Aiello, Charles R. Kalmanek, Patrick Drew McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe
Analysis of Communities of Interest in Data Networks. [Citation Graph (0, 0)][DBLP] PAM, 2005, pp:83-96 [Conf]
- William Aiello, Ramarathnam Venkatesan, Moti Yung
Coins, Weights and Contention in Balancing Networks. [Citation Graph (0, 0)][DBLP] PODC, 1994, pp:193-205 [Conf]
- William Aiello, Sandeep N. Bhatt, Fan R. K. Chung, Arnold L. Rosenberg, Ramesh K. Sitaraman
Augmented Ring Networks. [Citation Graph (0, 0)][DBLP] SIROCCO, 1999, pp:1-16 [Conf]
- William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan
Design of Practical and Provably Good Random Number Generators (Extended Abstract). [Citation Graph (0, 0)][DBLP] SODA, 1995, pp:1-9 [Conf]
- William Aiello, Milena Mihail
Learning the Fourier Spectrum of Probabilistic Lists and Trees. [Citation Graph (0, 0)][DBLP] SODA, 1991, pp:291-299 [Conf]
- William Aiello, Rafail Ostrovsky, Eyal Kushilevitz, Adi Rosén
Dynamic routing on networks with fixed-size buffers. [Citation Graph (0, 0)][DBLP] SODA, 2003, pp:771-780 [Conf]
- B. Aiello, Frank Thomson Leighton
Coding Theory, Hypercube Embeddings, and Fault Tolerance. [Citation Graph (0, 0)][DBLP] SPAA, 1991, pp:125-136 [Conf]
- B. Aiello, Frank Thomson Leighton, Bruce M. Maggs, Mark Newman
Fast Algorithms for Bit-Serial Routing on a Hypercube. [Citation Graph (0, 0)][DBLP] SPAA, 1990, pp:55-64 [Conf]
- Pangfeng Liu, William Aiello, Sandeep N. Bhatt
An Atomic Model for Message-Passing. [Citation Graph (0, 0)][DBLP] SPAA, 1993, pp:154-163 [Conf]
- William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:27-39 [Conf]
- William Aiello, Costas Busch, Maurice Herlihy, Marios Mavronicolas, Nir Shavit, Dan Touitou
Supporting Increment and Decrement Operations in Balancing Networks. [Citation Graph (0, 0)][DBLP] STACS, 1999, pp:393-403 [Conf]
- William Aiello, Baruch Awerbuch, Bruce M. Maggs, Satish Rao
Approximate load balancing on dynamic and asynchronous networks. [Citation Graph (0, 0)][DBLP] STOC, 1993, pp:632-641 [Conf]
- William Aiello, Mihir Bellare, Ramarathnam Venkatesan
Knowledge on the average-perfect, statistical and logarithmic. [Citation Graph (0, 0)][DBLP] STOC, 1995, pp:469-478 [Conf]
- William Aiello, Fan R. K. Chung, Linyuan Lu
A random graph model for massive graphs. [Citation Graph (0, 0)][DBLP] STOC, 2000, pp:171-180 [Conf]
- William Aiello, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosén
Adaptive Packet Routing for Bursty Adversarial Traffic. [Citation Graph (0, 0)][DBLP] STOC, 1998, pp:359-368 [Conf]
- William Aiello, Costas Busch, Maurice Herlihy, Marios Mavronicolas, Nir Shavit, Dan Touitou
Supporting Increment and Decrement Operations in Balancing Networks. [Citation Graph (0, 0)][DBLP] Chicago J. Theor. Comput. Sci., 2000, v:2000, n:, pp:- [Journal]
- Patrick McDaniel, William Aiello, Kevin Butler, John Ioannidis
Origin authentication in interdomain routing. [Citation Graph (0, 0)][DBLP] Computer Networks, 2006, v:50, n:16, pp:2953-2980 [Journal]
- William Aiello, Shafi Goldwasser, Johan Håstad
On the power of interaction. [Citation Graph (0, 0)][DBLP] Combinatorica, 1990, v:10, n:1, pp:3-25 [Journal]
- William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan
Security amplification by composition: The case of doubly-iterated ideal ciphers [Citation Graph (0, 0)][DBLP] CoRR, 1998, v:0, n:, pp:- [Journal]
- William Aiello, Johan Håstad
Relativized Perfect Zero Knowledge Is Not BPP [Citation Graph (0, 0)][DBLP] Inf. Comput., 1991, v:93, n:2, pp:223-240 [Journal]
- William Aiello, Yishay Mansour, S. Rajagopolan, Adi Rosén
Competitive queue policies for differentiated services. [Citation Graph (0, 0)][DBLP] J. Algorithms, 2005, v:55, n:2, pp:113-141 [Journal]
- William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan
Design of Practical and Provably Good Random Number Generators. [Citation Graph (0, 0)][DBLP] J. Algorithms, 1998, v:29, n:2, pp:358-389 [Journal]
- William Aiello, Johan Håstad
Statistical Zero-Knowledge Languages can be Recognized in Two Rounds. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 1991, v:42, n:3, pp:327-345 [Journal]
- William Aiello, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosén
Adaptive Packet Routing for Bursty Adversarial Traffic. [Citation Graph (0, 0)][DBLP] J. Comput. Syst. Sci., 2000, v:60, n:3, pp:482-509 [Journal]
- William Aiello, Frank Thomson Leighton, Bruce M. Maggs, Mark Newman
Fast Algorithms for Bit-Serial Routing on a Hypercube. [Citation Graph (0, 0)][DBLP] Mathematical Systems Theory, 1991, v:24, n:4, pp:253-271 [Journal]
- Pangfeng Liu, William Aiello, Sandeep N. Bhatt
Tree Search on an Atomic Model for Message Passing. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 2001, v:31, n:1, pp:67-85 [Journal]
- William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
Just fast keying: Key agreement in a hostile internet. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:2, pp:242-273 [Journal]
- William Aiello, Sandeep N. Bhatt, Fan R. K. Chung, Arnold L. Rosenberg, Ramesh K. Sitaraman
Augmented Ring Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2001, v:12, n:6, pp:598-609 [Journal]
- William Aiello, Anthony Bonato, C. Cooper, J. Janssen, P. Pralat
A Spatial Web Graph Model with Local Influence Regions. [Citation Graph (0, 0)][DBLP] WAW, 2007, pp:96-107 [Conf]
- William Aiello, Frank Thomson Leighton
Hamming Codes, Hypercube Embeddings, and Fault Tolerance. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 2007, v:37, n:3, pp:783-803 [Journal]
Configuration Management at Massive Scale: System Design and Experience. [Citation Graph (, )][DBLP]
Modelling and Mining of Networked Information Spaces. [Citation Graph (, )][DBLP]
Workshop on Algorithms and Models for the Web Graph. [Citation Graph (, )][DBLP]
Characterization of Graphs Using Degree Cores. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.009secs
|