The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Avishai Wool: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Todd A. Anderson, Yuri Breitbart, Henry F. Korth, Avishai Wool
    Replication, Consistency, and Practicality: Are These Mutually Exclusive? [Citation Graph (4, 8)][DBLP]
    SIGMOD Conference, 1998, pp:484-495 [Conf]
  2. Yair Amir, Avishai Wool
    Evaluating Quorum Systems over the Internet. [Citation Graph (1, 0)][DBLP]
    FTCS, 1996, pp:26-35 [Conf]
  3. Dahlia Malkhi, Michael K. Reiter, Avishai Wool
    The Load and Availability of Byzantine Quorum Systems. [Citation Graph (1, 0)][DBLP]
    PODC, 1997, pp:249-257 [Conf]
  4. David Peleg, Avishai Wool
    Crumbling Walls: A Class of Practical and Efficient Quorum Systems. [Citation Graph (1, 0)][DBLP]
    Distributed Computing, 1997, v:10, n:2, pp:87-97 [Journal]
  5. Yair Amir, Avishai Wool
    Optimal Availability Quorum Systems: Theory and Practice. [Citation Graph (1, 0)][DBLP]
    Inf. Process. Lett., 1998, v:65, n:5, pp:223-228 [Journal]
  6. Moni Naor, Avishai Wool
    The Load, Capacity, and Availability of Quorum Systems. [Citation Graph (1, 0)][DBLP]
    SIAM J. Comput., 1998, v:27, n:2, pp:423-447 [Journal]
  7. Eran Gabber, Avishai Wool
    How to Prove Where You Are: Tracking the Location of Customer Equipment. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:142-149 [Conf]
  8. Moni Naor, Avishai Wool
    Access Control and Signatures via Quorum Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:157-168 [Conf]
  9. Avishai Wool
    Key Management for Encrypted broadcast. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:7-16 [Conf]
  10. Yigael Berger, Avishai Wool, Arie Yeredor
    Dictionary attacks using keyboard acoustic emanations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:245-254 [Conf]
  11. Juan A. Garay, Jessica Staddon, Avishai Wool
    Long-Lived Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:333-352 [Conf]
  12. Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks
    Optimal Layouts on a Chain ATM Network (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ESA, 1995, pp:508-522 [Conf]
  13. Donald Beaver, Avishai Wool
    Quorum-Based Secure Multi-party Computation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:375-390 [Conf]
  14. Michel Abdalla, Yuval Shavitt, Avishai Wool
    Towards Making Broadcast Encryption Practical. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:140-157 [Conf]
  15. Moni Naor, Avishai Wool
    The Load, Capacity and Availability of Quorum Systems [Citation Graph (0, 0)][DBLP]
    FOCS, 1994, pp:214-225 [Conf]
  16. Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener
    Computing the Unmeasured: An Algebraic Approach to Internet Mapping. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2001, pp:1646-1654 [Conf]
  17. David Peleg, Gideon Schechtman, Avishai Wool
    Approximating Bounded 0-1 Integer Linear Programs. [Citation Graph (0, 0)][DBLP]
    ISTCS, 1993, pp:69-77 [Conf]
  18. Yaniv Shaked, Avishai Wool
    Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:187-202 [Conf]
  19. Avishai Wool
    How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. [Citation Graph (0, 0)][DBLP]
    LISA, 2001, pp:- [Conf]
  20. Sagy Bar, Mira Gonen, Avishai Wool
    A Geographic Directed Preferential Internet Topology Model. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2005, pp:325-328 [Conf]
  21. Yaniv Shaked, Avishai Wool
    Cracking the Bluetooth PIN. [Citation Graph (0, 0)][DBLP]
    MobiSys, 2005, pp:39-50 [Conf]
  22. Sagy Bar, Mira Gonen, Avishai Wool
    An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract. [Citation Graph (0, 0)][DBLP]
    PAM , 2004, pp:53-62 [Conf]
  23. Yair Amir, Avishai Wool
    Evaluating Quorum Systems Over the Internet (Abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 1996, pp:344- [Conf]
  24. Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright
    Probabilistic Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    PODC, 1998, pp:321- [Conf]
  25. David Peleg, Avishai Wool
    Crumbling Walls: A Class of Practical and Efficient Quorum Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 1995, pp:120-129 [Conf]
  26. David Peleg, Avishai Wool
    How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 1996, pp:290-299 [Conf]
  27. Danny Nebenzahl, Avishai Wool
    Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:225-240 [Conf]
  28. Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool
    Firmato: A Novel Firewall Management Toolkit. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:17-31 [Conf]
  29. Alain J. Mayer, Avishai Wool, Elisha Ziskind
    Fang: A Firewall Analysis Engine. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:177-187 [Conf]
  30. Noam Kogan, Yuval Shavitt, Avishai Wool
    A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:225-235 [Conf]
  31. David Peleg, Gideon Schechtman, Avishai Wool
    Randomized Approximation of Bounded Multicovering Problems. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 1997, v:18, n:1, pp:44-66 [Journal]
  32. Avishai Wool
    Why security standards sometimes fail. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:12, pp:144- [Journal]
  33. Yueyue Song, Avishai Wool, Bülent Yener
    Combinatorial design of multi-ring networks with combined routing and flow control. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:2, pp:247-267 [Journal]
  34. Avishai Wool
    The use and usability of direction-based filtering in firewalls. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:6, pp:459-468 [Journal]
  35. Avishai Wool
    A Quantitative Study of Firewall Configuration Errors. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:6, pp:62-67 [Journal]
  36. Dahlia Malkhi, Michael K. Reiter, Avishai Wool
    The Load and Availability of Byzantine Quorum Systems [Citation Graph (0, 0)][DBLP]
    CoRR, 1999, v:0, n:, pp:- [Journal]
  37. Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks
    Optimal layouts on a chain ATM network. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1998, v:83, n:1-3, pp:157-178 [Journal]
  38. David Peleg, Avishai Wool
    The Availability of Crumbling Wall Quorum Systems. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1997, v:74, n:1, pp:69-83 [Journal]
  39. Avishai Wool
    Quorum Systems in Replicated Databases: Science or Fiction? [Citation Graph (0, 30)][DBLP]
    IEEE Data Eng. Bull., 1998, v:21, n:4, pp:3-11 [Journal]
  40. Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright
    Probabilistic Quorum Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2001, v:170, n:2, pp:184-206 [Journal]
  41. David Peleg, Avishai Wool
    The Availability of Quorum Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1995, v:123, n:2, pp:210-223 [Journal]
  42. Alain J. Mayer, Avishai Wool, Elisha Ziskind
    Offline firewall analysis. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:3, pp:125-144 [Journal]
  43. Dahlia Malkhi, Michael K. Reiter, Avishai Wool
    The Load and Availability of Byzantine Quorum Systems. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2000, v:29, n:6, pp:1889-1906 [Journal]
  44. David Peleg, Avishai Wool
    How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2002, v:15, n:3, pp:416-433 [Journal]
  45. Danny Nebenzahl, Shmuel Sagiv, Avishai Wool
    Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:78-90 [Journal]
  46. Avishai Wool
    Key management for encrypted broadcast. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:2, pp:107-134 [Journal]
  47. Noam Kogan, Yuval Shavitt, Avishai Wool
    A practical revocation scheme for broadcast encryption using smartcards. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:3, pp:325-351 [Journal]
  48. Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool
    Firmato: A novel firewall management toolkit. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2004, v:22, n:4, pp:381-420 [Journal]
  49. Michel Abdalla, Yuval Shavitt, Avishai Wool
    Key management for restricted multicast using broadcast encryption. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2000, v:8, n:4, pp:443-454 [Journal]
  50. Moni Naor, Avishai Wool
    Access Control and Signatures via Quorum Secret Sharing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1998, v:9, n:9, pp:909-922 [Journal]
  51. Avishai Wool
    Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2005, v:11, n:6, pp:677-686 [Journal]
  52. Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool
    Finding a Dense-Core in Jellyfish Graphs. [Citation Graph (0, 0)][DBLP]
    WAW, 2007, pp:29-40 [Conf]
  53. Sagy Bar, Mira Gonen, Avishai Wool
    A geographic directed preferential internet topology model. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:14, pp:4174-4188 [Journal]
  54. Reuven Cohen, Mira Gonen, Avishai Wool
    Bounding the Bias of Tree-Like Sampling in IP Topologies [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  55. Sagy Bar, Mira Gonen, Avishai Wool
    A Geographic Directed Preferential Internet Topology Model [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  56. Algebraic Side-Channel Analysis in the Presence of Errors. [Citation Graph (, )][DBLP]


  57. Remote Algorithmic Complexity Attacks against Randomized Hash Tables. [Citation Graph (, )][DBLP]


  58. Toward securing untrusted storage without public-key operations. [Citation Graph (, )][DBLP]


  59. Finding a dense-core in Jellyfish graphs. [Citation Graph (, )][DBLP]


  60. Firewall Configuration Errors Revisited [Citation Graph (, )][DBLP]


Search in 5.233secs, Finished in 5.235secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002