Search the dblp DataBase
Avishai Wool :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Todd A. Anderson , Yuri Breitbart , Henry F. Korth , Avishai Wool Replication, Consistency, and Practicality: Are These Mutually Exclusive? [Citation Graph (4, 8)][DBLP ] SIGMOD Conference, 1998, pp:484-495 [Conf ] Yair Amir , Avishai Wool Evaluating Quorum Systems over the Internet. [Citation Graph (1, 0)][DBLP ] FTCS, 1996, pp:26-35 [Conf ] Dahlia Malkhi , Michael K. Reiter , Avishai Wool The Load and Availability of Byzantine Quorum Systems. [Citation Graph (1, 0)][DBLP ] PODC, 1997, pp:249-257 [Conf ] David Peleg , Avishai Wool Crumbling Walls: A Class of Practical and Efficient Quorum Systems. [Citation Graph (1, 0)][DBLP ] Distributed Computing, 1997, v:10, n:2, pp:87-97 [Journal ] Yair Amir , Avishai Wool Optimal Availability Quorum Systems: Theory and Practice. [Citation Graph (1, 0)][DBLP ] Inf. Process. Lett., 1998, v:65, n:5, pp:223-228 [Journal ] Moni Naor , Avishai Wool The Load, Capacity, and Availability of Quorum Systems. [Citation Graph (1, 0)][DBLP ] SIAM J. Comput., 1998, v:27, n:2, pp:423-447 [Journal ] Eran Gabber , Avishai Wool How to Prove Where You Are: Tracking the Location of Customer Equipment. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:142-149 [Conf ] Moni Naor , Avishai Wool Access Control and Signatures via Quorum Secret Sharing. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:157-168 [Conf ] Avishai Wool Key Management for Encrypted broadcast. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:7-16 [Conf ] Yigael Berger , Avishai Wool , Arie Yeredor Dictionary attacks using keyboard acoustic emanations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:245-254 [Conf ] Juan A. Garay , Jessica Staddon , Avishai Wool Long-Lived Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:333-352 [Conf ] Ornan Ori Gerstel , Avishai Wool , Shmuel Zaks Optimal Layouts on a Chain ATM Network (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ESA, 1995, pp:508-522 [Conf ] Donald Beaver , Avishai Wool Quorum-Based Secure Multi-party Computation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:375-390 [Conf ] Michel Abdalla , Yuval Shavitt , Avishai Wool Towards Making Broadcast Encryption Practical. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:140-157 [Conf ] Moni Naor , Avishai Wool The Load, Capacity and Availability of Quorum Systems [Citation Graph (0, 0)][DBLP ] FOCS, 1994, pp:214-225 [Conf ] Yuval Shavitt , Xiaodong Sun , Avishai Wool , Bülent Yener Computing the Unmeasured: An Algebraic Approach to Internet Mapping. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2001, pp:1646-1654 [Conf ] David Peleg , Gideon Schechtman , Avishai Wool Approximating Bounded 0-1 Integer Linear Programs. [Citation Graph (0, 0)][DBLP ] ISTCS, 1993, pp:69-77 [Conf ] Yaniv Shaked , Avishai Wool Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD's. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:187-202 [Conf ] Avishai Wool How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. [Citation Graph (0, 0)][DBLP ] LISA, 2001, pp:- [Conf ] Sagy Bar , Mira Gonen , Avishai Wool A Geographic Directed Preferential Internet Topology Model. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2005, pp:325-328 [Conf ] Yaniv Shaked , Avishai Wool Cracking the Bluetooth PIN. [Citation Graph (0, 0)][DBLP ] MobiSys, 2005, pp:39-50 [Conf ] Sagy Bar , Mira Gonen , Avishai Wool An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract. [Citation Graph (0, 0)][DBLP ] PAM , 2004, pp:53-62 [Conf ] Yair Amir , Avishai Wool Evaluating Quorum Systems Over the Internet (Abstract). [Citation Graph (0, 0)][DBLP ] PODC, 1996, pp:344- [Conf ] Dahlia Malkhi , Michael K. Reiter , Avishai Wool , Rebecca N. Wright Probabilistic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP ] PODC, 1998, pp:321- [Conf ] David Peleg , Avishai Wool Crumbling Walls: A Class of Practical and Efficient Quorum Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP ] PODC, 1995, pp:120-129 [Conf ] David Peleg , Avishai Wool How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP ] PODC, 1996, pp:290-299 [Conf ] Danny Nebenzahl , Avishai Wool Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:225-240 [Conf ] Yair Bartal , Alain J. Mayer , Kobbi Nissim , Avishai Wool Firmato: A Novel Firewall Management Toolkit. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:17-31 [Conf ] Alain J. Mayer , Avishai Wool , Elisha Ziskind Fang: A Firewall Analysis Engine. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:177-187 [Conf ] Noam Kogan , Yuval Shavitt , Avishai Wool A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:225-235 [Conf ] David Peleg , Gideon Schechtman , Avishai Wool Randomized Approximation of Bounded Multicovering Problems. [Citation Graph (0, 0)][DBLP ] Algorithmica, 1997, v:18, n:1, pp:44-66 [Journal ] Avishai Wool Why security standards sometimes fail. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2002, v:45, n:12, pp:144- [Journal ] Yueyue Song , Avishai Wool , Bülent Yener Combinatorial design of multi-ring networks with combined routing and flow control. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:41, n:2, pp:247-267 [Journal ] Avishai Wool The use and usability of direction-based filtering in firewalls. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:6, pp:459-468 [Journal ] Avishai Wool A Quantitative Study of Firewall Configuration Errors. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2004, v:37, n:6, pp:62-67 [Journal ] Dahlia Malkhi , Michael K. Reiter , Avishai Wool The Load and Availability of Byzantine Quorum Systems [Citation Graph (0, 0)][DBLP ] CoRR, 1999, v:0, n:, pp:- [Journal ] Ornan Ori Gerstel , Avishai Wool , Shmuel Zaks Optimal layouts on a chain ATM network. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 1998, v:83, n:1-3, pp:157-178 [Journal ] David Peleg , Avishai Wool The Availability of Crumbling Wall Quorum Systems. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 1997, v:74, n:1, pp:69-83 [Journal ] Avishai Wool Quorum Systems in Replicated Databases: Science or Fiction? [Citation Graph (0, 30)][DBLP ] IEEE Data Eng. Bull., 1998, v:21, n:4, pp:3-11 [Journal ] Dahlia Malkhi , Michael K. Reiter , Avishai Wool , Rebecca N. Wright Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2001, v:170, n:2, pp:184-206 [Journal ] David Peleg , Avishai Wool The Availability of Quorum Systems. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1995, v:123, n:2, pp:210-223 [Journal ] Alain J. Mayer , Avishai Wool , Elisha Ziskind Offline firewall analysis. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:3, pp:125-144 [Journal ] Dahlia Malkhi , Michael K. Reiter , Avishai Wool The Load and Availability of Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 2000, v:29, n:6, pp:1889-1906 [Journal ] David Peleg , Avishai Wool How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems. [Citation Graph (0, 0)][DBLP ] SIAM J. Discrete Math., 2002, v:15, n:3, pp:416-433 [Journal ] Danny Nebenzahl , Shmuel Sagiv , Avishai Wool Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:78-90 [Journal ] Avishai Wool Key management for encrypted broadcast. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2000, v:3, n:2, pp:107-134 [Journal ] Noam Kogan , Yuval Shavitt , Avishai Wool A practical revocation scheme for broadcast encryption using smartcards. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:325-351 [Journal ] Yair Bartal , Alain J. Mayer , Kobbi Nissim , Avishai Wool Firmato : A novel firewall management toolkit. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 2004, v:22, n:4, pp:381-420 [Journal ] Michel Abdalla , Yuval Shavitt , Avishai Wool Key management for restricted multicast using broadcast encryption. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 2000, v:8, n:4, pp:443-454 [Journal ] Moni Naor , Avishai Wool Access Control and Signatures via Quorum Secret Sharing. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1998, v:9, n:9, pp:909-922 [Journal ] Avishai Wool Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2005, v:11, n:6, pp:677-686 [Journal ] Mira Gonen , Dana Ron , Udi Weinsberg , Avishai Wool Finding a Dense-Core in Jellyfish Graphs. [Citation Graph (0, 0)][DBLP ] WAW, 2007, pp:29-40 [Conf ] Sagy Bar , Mira Gonen , Avishai Wool A geographic directed preferential internet topology model. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:14, pp:4174-4188 [Journal ] Reuven Cohen , Mira Gonen , Avishai Wool Bounding the Bias of Tree-Like Sampling in IP Topologies [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Sagy Bar , Mira Gonen , Avishai Wool A Geographic Directed Preferential Internet Topology Model [Citation Graph (0, 0)][DBLP ] CoRR, 2005, v:0, n:, pp:- [Journal ] Algebraic Side-Channel Analysis in the Presence of Errors. [Citation Graph (, )][DBLP ] Remote Algorithmic Complexity Attacks against Randomized Hash Tables. [Citation Graph (, )][DBLP ] Toward securing untrusted storage without public-key operations. [Citation Graph (, )][DBLP ] Finding a dense-core in Jellyfish graphs. [Citation Graph (, )][DBLP ] Firewall Configuration Errors Revisited [Citation Graph (, )][DBLP ] Search in 0.028secs, Finished in 0.031secs