2009 | ||
---|---|---|
61 | Avishai Wool: Firewall Configuration Errors Revisited CoRR abs/0911.1240: (2009) | |
60 | Erel Geron, Avishai Wool: CRUST: cryptographic remote untrusted storage without public keys. Int. J. Inf. Sec. 8(5): 357-377 (2009) | |
2008 | ||
59 | Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool: Finding a dense-core in Jellyfish graphs. Computer Networks 52(15): 2831-2841 (2008) | |
2007 | ||
58 | Noa Bar-Yosef, Avishai Wool: Remote Algorithmic Complexity Attacks against Randomized Hash Tables. SECRYPT 2007: 117-124 | |
57 | Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool: Finding a Dense-Core in Jellyfish Graphs. WAW 2007: 29-40 | |
56 | Sagy Bar, Mira Gonen, Avishai Wool: A geographic directed preferential internet topology model. Computer Networks 51(14): 4174-4188 (2007) | |
2006 | ||
55 | Yigael Berger, Avishai Wool, Arie Yeredor: Dictionary attacks using keyboard acoustic emanations. ACM Conference on Computer and Communications Security 2006: 245-254 | |
54 | Yaniv Shaked, Avishai Wool: Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. ISC 2006: 187-202 | |
53 | Noam Kogan, Yuval Shavitt, Avishai Wool: A practical revocation scheme for broadcast encryption using smartcards. ACM Trans. Inf. Syst. Secur. 9(3): 325-351 (2006) | |
52 | Reuven Cohen, Mira Gonen, Avishai Wool: Bounding the Bias of Tree-Like Sampling in IP Topologies CoRR abs/cs/0611157: (2006) | |
51 | Danny Nebenzahl, Shmuel Sagiv, Avishai Wool: Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. IEEE Trans. Dependable Sec. Comput. 3(1): 78-90 (2006) | |
50 | Alain J. Mayer, Avishai Wool, Elisha Ziskind: Offline firewall analysis. Int. J. Inf. Sec. 5(3): 125-144 (2006) | |
2005 | ||
49 | Sagy Bar, Mira Gonen, Avishai Wool: A Geographic Directed Preferential Internet Topology Model. MASCOTS 2005: 325-328 | |
48 | Yaniv Shaked, Avishai Wool: Cracking the Bluetooth PIN. MobiSys 2005: 39-50 | |
47 | Dalit Naor, Amir Shenhav, Avishai Wool: Toward securing untrusted storage without public-key operations. StorageSS 2005: 51-56 | |
46 | Sagy Bar, Mira Gonen, Avishai Wool: A Geographic Directed Preferential Internet Topology Model CoRR abs/cs/0502061: (2005) | |
45 | Avishai Wool: Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. Wireless Networks 11(6): 677-686 (2005) | |
2004 | ||
44 | Sagy Bar, Mira Gonen, Avishai Wool: An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract. PAM 2004: 53-62 | |
43 | Danny Nebenzahl, Avishai Wool: Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks. SEC 2004: 225-240 | |
42 | Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool: Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4): 381-420 (2004) | |
41 | Avishai Wool: The use and usability of direction-based filtering in firewalls. Computers & Security 23(6): 459-468 (2004) | |
40 | Avishai Wool: A Quantitative Study of Firewall Configuration Errors. IEEE Computer 37(6): 62-67 (2004) | |
39 | Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener: Computing the unmeasured: an algebraic approach to Internet mapping. IEEE Journal on Selected Areas in Communications 22(1): 67-78 (2004) | |
2003 | ||
38 | Noam Kogan, Yuval Shavitt, Avishai Wool: A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. IEEE Symposium on Security and Privacy 2003: 225-235 | |
37 | Yueyue Song, Avishai Wool, Bülent Yener: Combinatorial design of multi-ring networks with combined routing and flow control. Computer Networks 41(2): 247-267 (2003) | |
2002 | ||
36 | Avishai Wool: Why security standards sometimes fail. Commun. ACM 45(12): 144 (2002) | |
35 | David Peleg, Avishai Wool: How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems. SIAM J. Discrete Math. 15(3): 416-433 (2002) | |
2001 | ||
34 | Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener: Computing the Unmeasured: An Algebraic Approach to Internet Mapping. INFOCOM 2001: 1646-1654 | |
33 | Avishai Wool: How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. LISA 2001 | |
32 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001) | |
2000 | ||
31 | Juan A. Garay, Jessica Staddon, Avishai Wool: Long-Lived Broadcast Encryption. CRYPTO 2000: 333-352 | |
30 | Alain J. Mayer, Avishai Wool, Elisha Ziskind: Fang: A Firewall Analysis Engine. IEEE Symposium on Security and Privacy 2000: 177-187 | |
29 | Avishai Wool: Key management for encrypted broadcast. ACM Trans. Inf. Syst. Secur. 3(2): 107-134 (2000) | |
28 | Michel Abdalla, Yuval Shavitt, Avishai Wool: Key management for restricted multicast using broadcast encryption. IEEE/ACM Trans. Netw. 8(4): 443-454 (2000) | |
27 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems. SIAM J. Comput. 29(6): 1889-1906 (2000) | |
1999 | ||
26 | Michel Abdalla, Yuval Shavitt, Avishai Wool: Towards Making Broadcast Encryption Practical. Financial Cryptography 1999: 140-157 | |
25 | Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool: Firmato: A Novel Firewall Management Toolkit. IEEE Symposium on Security and Privacy 1999: 17-31 | |
24 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems CoRR cs.DC/9908011: (1999) | |
1998 | ||
23 | Eran Gabber, Avishai Wool: How to Prove Where You Are: Tracking the Location of Customer Equipment. ACM Conference on Computer and Communications Security 1998: 142-149 | |
22 | Avishai Wool: Key Management for Encrypted broadcast. ACM Conference on Computer and Communications Security 1998: 7-16 | |
21 | Donald Beaver, Avishai Wool: Quorum-Based Secure Multi-party Computation. EUROCRYPT 1998: 375-390 | |
20 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Byzantine Quorum Systems. PODC 1998: 321 | |
19 | Todd A. Anderson, Yuri Breitbart, Henry F. Korth, Avishai Wool: Replication, Consistency, and Practicality: Are These Mutually Exclusive? SIGMOD Conference 1998: 484-495 | |
18 | Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks: Optimal layouts on a chain ATM network. Discrete Applied Mathematics 83(1-3): 157-178 (1998) | |
17 | Avishai Wool: Quorum Systems in Replicated Databases: Science or Fiction? IEEE Data Eng. Bull. 21(4): 3-11 (1998) | |
16 | Moni Naor, Avishai Wool: Access Control and Signatures via Quorum Secret Sharing. IEEE Trans. Parallel Distrib. Syst. 9(9): 909-922 (1998) | |
15 | Yair Amir, Avishai Wool: Optimal Availability Quorum Systems: Theory and Practice. Inf. Process. Lett. 65(5): 223-228 (1998) | |
14 | Moni Naor, Avishai Wool: The Load, Capacity, and Availability of Quorum Systems. SIAM J. Comput. 27(2): 423-447 (1998) | |
1997 | ||
13 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems. PODC 1997: 249-257 | |
12 | David Peleg, Gideon Schechtman, Avishai Wool: Randomized Approximation of Bounded Multicovering Problems. Algorithmica 18(1): 44-66 (1997) | |
11 | David Peleg, Avishai Wool: The Availability of Crumbling Wall Quorum Systems. Discrete Applied Mathematics 74(1): 69-83 (1997) | |
10 | David Peleg, Avishai Wool: Crumbling Walls: A Class of Practical and Efficient Quorum Systems. Distributed Computing 10(2): 87-97 (1997) | |
1996 | ||
9 | Moni Naor, Avishai Wool: Access Control and Signatures via Quorum Secret Sharing. ACM Conference on Computer and Communications Security 1996: 157-168 | |
8 | Yair Amir, Avishai Wool: Evaluating Quorum Systems over the Internet. FTCS 1996: 26-35 | |
7 | David Peleg, Avishai Wool: How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract). PODC 1996: 290-299 | |
6 | Yair Amir, Avishai Wool: Evaluating Quorum Systems Over the Internet (Abstract). PODC 1996: 344 | |
1995 | ||
5 | Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks: Optimal Layouts on a Chain ATM Network (Extended Abstract). ESA 1995: 508-522 | |
4 | David Peleg, Avishai Wool: Crumbling Walls: A Class of Practical and Efficient Quorum Systems (Extended Abstract). PODC 1995: 120-129 | |
3 | David Peleg, Avishai Wool: The Availability of Quorum Systems. Inf. Comput. 123(2): 210-223 (1995) | |
1994 | ||
2 | Moni Naor, Avishai Wool: The Load, Capacity and Availability of Quorum Systems FOCS 1994: 214-225 | |
1993 | ||
1 | David Peleg, Gideon Schechtman, Avishai Wool: Approximating Bounded 0-1 Integer Linear Programs. ISTCS 1993: 69-77 |