default search action
Avishai Wool
Person information
- affiliation: Tel Aviv University, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Neil Ortiz Silva, Alvaro A. Cárdenas, Avishai Wool:
SCADA World: An Exploration of the Diversity in Power Grid Networks. Proc. ACM Meas. Anal. Comput. Syst. 8(1): 10:1-10:32 (2024) - [c65]Neil Ortiz Silva, Alvaro A. Cárdenas, Avishai Wool:
SCADA World: An Exploration of the Diversity in Power Grid Networks. SIGMETRICS/Performance (Abstracts) 2024: 13-14 - [i36]Raja Giryes, Lior Shafir, Avishai Wool:
A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection. CoRR abs/2405.07232 (2024) - [i35]Assaf Morag, Liron David, Eran Toch, Avishai Wool:
Improving Users' Passwords with DPAR: a Data-driven Password Recommendation System. CoRR abs/2406.03423 (2024) - [i34]Dror Peri, Avishai Wool:
STOP! Camera Spoofing via the in-Vehicle IP Network. CoRR abs/2410.05417 (2024) - 2023
- [j48]Neil Ortiz Silva, Alvaro A. Cárdenas, Avishai Wool:
A Taxonomy of Industrial Control Protocols and Networks in the Power Grid. IEEE Commun. Mag. 61(6): 21-27 (2023) - [j47]Rony Komissarov, Sharon Vaisman, Avishai Wool:
Spoofing attacks against vehicular FMCW radar. J. Cryptogr. Eng. 13(4): 473-484 (2023) - [i33]Tomer Avrahami, Ofer Amrani, Avishai Wool:
Let's shake on it: Extracting secure shared keys from Wi-Fi CSI. CoRR abs/2307.05423 (2023) - 2022
- [j46]Liron David, Avishai Wool:
Rank estimation with bounded error via exponential sampling. J. Cryptogr. Eng. 12(2): 151-168 (2022) - [j45]Liron David, Avishai Wool:
PESrank: An Explainable online password strength estimator. J. Comput. Secur. 30(6): 877-901 (2022) - [c64]Alon Shakevsky, Eyal Ronen, Avishai Wool:
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. USENIX Security Symposium 2022: 251-268 - [c63]Aviv Engelberg, Avishai Wool:
Classification of Encrypted IoT Traffic despite Padding and Shaping. WPES@CCS 2022: 1-13 - [i32]Alon Shakevsky, Eyal Ronen, Avishai Wool:
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. IACR Cryptol. ePrint Arch. 2022: 208 (2022) - 2021
- [c62]Rony Komissarov, Avishai Wool:
Spoofing Attacks Against Vehicular FMCW Radar. ASHES@CCS 2021: 91-97 - [c61]Eldad Zuberi, Avishai Wool:
Characterizing GPU Overclocking Faults. ESORICS (1) 2021: 110-130 - [c60]Liron David, Avishai Wool:
An Explainable Online Password Strength Estimator. ESORICS (1) 2021: 285-304 - [i31]Rony Komissarov, Avishai Wool:
Spoofing Attacks Against Vehicular FMCW Radar. CoRR abs/2104.13318 (2021) - [i30]Aviv Engelberg, Avishai Wool:
Classification of Encrypted IoT Traffic Despite Padding and Shaping. CoRR abs/2110.11188 (2021) - [i29]Liron David, Avishai Wool:
Rank Estimation with Bounded Error via Exponential Sampling. IACR Cryptol. ePrint Arch. 2021: 313 (2021) - 2020
- [j44]Eyal Itkin, Avishai Wool:
A Security Analysis and Revised Security Extension for the Precision Time Protocol. IEEE Trans. Dependable Secur. Comput. 17(1): 22-34 (2020) - [c59]Nimrod Gilboa Markevich, Avishai Wool:
Hardware Fingerprinting for the ARINC 429 Avionic Bus. ESORICS (2) 2020: 42-62 - [i28]Nimrod Gilboa Markevich, Avishai Wool:
Hardware Fingerprinting for the ARINC 429 Avionic Bus. CoRR abs/2003.12456 (2020)
2010 – 2019
- 2019
- [c58]Nils Ole Tippenhauer, Avishai Wool:
CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy. CCS 2019: 2695-2696 - [c57]Liron David, Avishai Wool:
Fast Analytical Rank Estimation. COSADE 2019: 168-190 - [c56]Liron David, Avishai Wool:
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling. CT-RSA 2019: 330-349 - [p1]Mustafa Amir Faisal, Alvaro A. Cárdenas, Avishai Wool:
Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detection. Security and Privacy Trends in the Industrial Internet of Thing 2019: 139-160 - [i27]Liron David, Avishai Wool:
Context Aware Password Guessability via Multi-Dimensional Rank Estimation. CoRR abs/1912.02551 (2019) - 2018
- [c55]Chen Markman, Avishai Wool, Alvaro A. Cárdenas:
Temporal Phase Shifts in SCADA Networks. CPS-SPC@CCS 2018: 84-89 - [c54]Ben Lapid, Avishai Wool:
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet. ESORICS (1) 2018: 175-196 - [c53]Dor Fledel, Avishai Wool:
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock. SAC 2018: 193-215 - [c52]Ben Lapid, Avishai Wool:
Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis. SAC 2018: 235-256 - [i26]Chen Markman, Avishai Wool, Alvaro A. Cárdenas:
Temporal Phase Shifts in SCADA Networks. CoRR abs/1808.05068 (2018) - [i25]Dor Fledel, Avishai Wool:
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock. IACR Cryptol. ePrint Arch. 2018: 317 (2018) - [i24]Liron David, Avishai Wool:
PRank: Fast Analytical Rank Estimation via Pareto Distributions. IACR Cryptol. ePrint Arch. 2018: 550 (2018) - [i23]Ben Lapid, Avishai Wool:
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis. IACR Cryptol. ePrint Arch. 2018: 621 (2018) - [i22]Liron David, Avishai Wool:
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling. IACR Cryptol. ePrint Arch. 2018: 867 (2018) - 2017
- [j43]Amit Kleinmann, Avishai Wool:
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems. ACM Trans. Intell. Syst. Technol. 8(4): 55:1-55:21 (2017) - [j42]Moti Markovitz, Avishai Wool:
Field classification, modeling and anomaly detection in unknown CAN bus networks. Veh. Commun. 9: 43-52 (2017) - [c51]Chen Markman, Avishai Wool, Alvaro A. Cárdenas:
A New Burst-DFA model for SCADA Anomaly Detection. CPS-SPC@CCS 2017: 1-12 - [c50]Liron David, Avishai Wool:
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks. CT-RSA 2017: 311-327 - [c49]Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev:
Stealthy Deception Attacks Against SCADA Systems. CyberICPS/SECPRE@ESORICS 2017: 93-109 - [c48]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic side channel attacks against RSA. HOST 2017: 74-78 - [i21]Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev:
Stealthy Deception Attacks Against SCADA Systems. CoRR abs/1706.09303 (2017) - [i20]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic Side Channel Attacks Against RSA. IACR Cryptol. ePrint Arch. 2017: 108 (2017) - 2016
- [j41]Yossef Oren, Avishai Wool:
Side-channel cryptographic attacks using pseudo-boolean optimization. Constraints An Int. J. 21(4): 616-645 (2016) - [c47]Amit Kleinmann, Avishai Wool:
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis. CPS-SPC@CCS 2016: 1-12 - [c46]Uri Kanonov, Avishai Wool:
Secure Containers in Android: The Samsung KNOX Case Study. SPSM@CCS 2016: 3-12 - [c45]Mustafa Faisal, Alvaro A. Cárdenas, Avishai Wool:
Modeling Modbus TCP for intrusion detection. CNS 2016: 386-390 - [c44]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Simple Photonic Emission Attack with Reduced Data Complexity. COSADE 2016: 35-51 - [i19]Eyal Itkin, Avishai Wool:
A Security Analysis and Revised Security Extension for the Precision Time Protocol. CoRR abs/1603.00707 (2016) - [i18]Uri Kanonov, Avishai Wool:
Secure Containers in Android: the Samsung KNOX Case Study. CoRR abs/1605.08567 (2016) - [i17]Amit Kleinmann, Avishai Wool:
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems. CoRR abs/1607.07489 (2016) - 2015
- [j40]Noam Erez, Avishai Wool:
Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems. Int. J. Crit. Infrastructure Prot. 10: 59-70 (2015) - [j39]Alex Arbit, Yoel Livne, Yossef Oren, Avishai Wool:
Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Sec. 14(1): 85-99 (2015) - [j38]Asaf Tzur, Ofer Amrani, Avishai Wool:
Direction Finding of rogue Wi-Fi access points using an off-the-shelf MIMO-OFDM receiver. Phys. Commun. 17: 149-164 (2015) - [c43]Amit Kleinmann, Avishai Wool:
A Statechart-Based Anomaly Detection Model for Multi-Threaded SCADA Systems. CRITIS 2015: 132-144 - [i16]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Simple Photonic Emission Attack with Reduced Data Complexity. IACR Cryptol. ePrint Arch. 2015: 1206 (2015) - [i15]Liron David, Avishai Wool:
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 1236 (2015) - 2014
- [j37]Amit Kleinmann, Avishai Wool:
Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic. J. Digit. Forensics Secur. Law 9(2): 37-50 (2014) - [j36]Alex Arbit, Yossef Oren, Avishai Wool:
A Secure Supply-Chain RFID System that Respects Your Privacy. IEEE Pervasive Comput. 13(2): 52-60 (2014) - [c42]Yossef Oren, Ofir Weisse, Avishai Wool:
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks. CHES 2014: 17-34 - 2013
- [j35]Niv Goldenberg, Avishai Wool:
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int. J. Crit. Infrastructure Prot. 6(2): 63-75 (2013) - [c41]Yossef Oren, Dvir Schirman, Avishai Wool:
Range Extension Attacks on Contactless Smart Cards. ESORICS 2013: 646-663 - [c40]Yossef Oren, Ofir Weisse, Avishai Wool:
Practical template-algebraic side channel attacks with extremely low data complexity. HASP@ISCA 2013: 7 - [c39]Ory Samorodnitzky, Eran Tromer, Avishai Wool:
Analyzing Unique-Bid Auction Sites for Fun and Profit. NDSS 2013 - 2012
- [c38]Yossef Oren, Mathieu Renauld, François-Xavier Standaert, Avishai Wool:
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model. CHES 2012: 140-154 - [i14]Yossef Oren, Avishai Wool:
Tolerant Algebraic Side-Channel Analysis of AES. IACR Cryptol. ePrint Arch. 2012: 92 (2012) - 2011
- [j34]Ehud Doron, Avishai Wool:
WDA: A Web farm Distributed Denial Of Service attack attenuator. Comput. Networks 55(5): 1037-1051 (2011) - [j33]Dmitry Rovniagin, Avishai Wool:
The Geometric Efficient Matching Algorithm for Firewalls. IEEE Trans. Dependable Secur. Comput. 8(1): 147-159 (2011) - [i13]Idan Sheetrit, Avishai Wool:
Cryptanalysis of KeeLoq code-hopping using a Single FPGA. IACR Cryptol. ePrint Arch. 2011: 242 (2011) - 2010
- [j32]Avishai Wool:
Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese. IEEE Internet Comput. 14(4): 58-65 (2010) - [c37]Yossef Oren, Mario Kirschbaum, Thomas Popp, Avishai Wool:
Algebraic Side-Channel Analysis in the Presence of Errors. CHES 2010: 428-442
2000 – 2009
- 2009
- [j31]Erel Geron, Avishai Wool:
CRUST: cryptographic remote untrusted storage without public keys. Int. J. Inf. Sec. 8(5): 357-377 (2009) - [i12]Avishai Wool:
Firewall Configuration Errors Revisited. CoRR abs/0911.1240 (2009) - [i11]Yossef Oren, Avishai Wool:
Attacks on RFID-Based Electronic Voting Systems. IACR Cryptol. ePrint Arch. 2009: 422 (2009) - 2008
- [j30]Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool:
Finding a dense-core in Jellyfish graphs. Comput. Networks 52(15): 2831-2841 (2008) - [j29]Reuven Cohen, Mira Gonen, Avishai Wool:
Bounding the bias of tree-like sampling in IP topologies. Networks Heterog. Media 3(2): 323-332 (2008) - 2007
- [j28]Sagy Bar, Mira Gonen, Avishai Wool:
A geographic directed preferential internet topology model. Comput. Networks 51(14): 4174-4188 (2007) - [c36]Noa Bar-Yosef, Avishai Wool:
Remote Algorithmic Complexity Attacks against Randomized Hash Tables. ICETE (Selected Papers) 2007: 162-174 - [c35]Noa Bar-Yosef, Avishai Wool:
Remote Algorithmic Complexity Attacks against Randomized Hash Tables. SECRYPT 2007: 117-124 - [c34]Erel Geron, Avishai Wool:
CRUST: Cryptographic Remote Untrusted Storage without Public Keys. IEEE Security in Storage Workshop 2007: 3-14 - [c33]Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool:
Finding a Dense-Core in Jellyfish Graphs. WAW 2007: 29-40 - [i10]Erel Geron, Avishai Wool:
CRUST: Cryptographic Remote Untrusted Storage without Public Keys. IACR Cryptol. ePrint Arch. 2007: 267 (2007) - 2006
- [j27]Alain J. Mayer, Avishai Wool, Elisha Ziskind:
Offline firewall analysis. Int. J. Inf. Sec. 5(3): 125-144 (2006) - [j26]Danny Nebenzahl, Shmuel Sagiv, Avishai Wool:
Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. IEEE Trans. Dependable Secur. Comput. 3(1): 78-90 (2006) - [j25]Noam Kogan, Yuval Shavitt, Avishai Wool:
A practical revocation scheme for broadcast encryption using smartcards. ACM Trans. Inf. Syst. Secur. 9(3): 325-351 (2006) - [c32]Yigael Berger, Avishai Wool, Arie Yeredor:
Dictionary attacks using keyboard acoustic emanations. CCS 2006: 245-254 - [c31]Yaniv Shaked, Avishai Wool:
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. ISC 2006: 187-202 - [c30]Ilan Kirschenbaum, Avishai Wool:
How to Build a Low-Cost, Extended-Range RFID Skimmer. USENIX Security Symposium 2006 - [i9]Reuven Cohen, Mira Gonen, Avishai Wool:
Bounding the Bias of Tree-Like Sampling in IP Topologies. CoRR abs/cs/0611157 (2006) - [i8]Ilan Kirschenbaum, Avishai Wool:
How to Build a Low-Cost, Extended-Range RFID Skimmer. IACR Cryptol. ePrint Arch. 2006: 54 (2006) - [i7]Yaniv Shaked, Avishai Wool:
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's. IACR Cryptol. ePrint Arch. 2006: 72 (2006) - 2005
- [j24]Avishai Wool:
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. Wirel. Networks 11(6): 677-686 (2005) - [c29]Sagy Bar, Mira Gonen, Avishai Wool:
A Geographic Directed Preferential Internet Topology Model. MASCOTS 2005: 325-328 - [c28]Yaniv Shaked, Avishai Wool:
Cracking the Bluetooth PIN. MobiSys 2005: 39-50 - [c27]Ziv Kfir, Avishai Wool:
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard. SecureComm 2005: 47-58 - [c26]Ophir Levy, Avishai Wool:
Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher. SecureComm 2005: 365-373 - [c25]Dalit Naor, Amir Shenhav, Avishai Wool:
Toward securing untrusted storage without public-key operations. StorageSS 2005: 51-56 - [i6]Sagy Bar, Mira Gonen, Avishai Wool:
A Geographic Directed Preferential Internet Topology Model. CoRR abs/cs/0502061 (2005) - [i5]Ziv Kfir, Avishai Wool:
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. IACR Cryptol. ePrint Arch. 2005: 52 (2005) - [i4]Ophir Levy, Avishai Wool:
A Uniform Framework for Cryptanalysis of the Bluetooth E0 Cipher. IACR Cryptol. ePrint Arch. 2005: 107 (2005) - [i3]Dalit Naor, Amir Shenhav, Avishai Wool:
One-Time Signatures Revisited: Have They Become Practical? IACR Cryptol. ePrint Arch. 2005: 442 (2005) - 2004
- [j23]Avishai Wool:
The use and usability of direction-based filtering in firewalls. Comput. Secur. 23(6): 459-468 (2004) - [j22]Avishai Wool:
A Quantitative Study of Firewall Configuration Errors. Computer 37(6): 62-67 (2004) - [j21]Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener:
Computing the unmeasured: an algebraic approach to Internet mapping. IEEE J. Sel. Areas Commun. 22(1): 67-78 (2004) - [j20]Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool:
Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4): 381-420 (2004) - [j19]Avishai Wool:
A note on the fragility of the "Michael" message integrity code. IEEE Trans. Wirel. Commun. 3(5): 1459-1462 (2004) - [c24]Sagy Bar, Mira Gonen, Avishai Wool:
An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract. PAM 2004: 53-62 - [c23]Danny Nebenzahl, Avishai Wool:
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks. SEC 2004: 225-240 - 2003
- [j18]Yueyue Song, Avishai Wool, Bülent Yener:
Combinatorial design of multi-ring networks with combined routing and flow control. Comput. Networks 41(2): 247-267 (2003) - [c22]Noam Kogan, Yuval Shavitt, Avishai Wool:
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. S&P 2003: 225-235 - 2002
- [j17]Avishai Wool:
Why security standards sometimes fail. Commun. ACM 45(12): 144 (2002) - [j16]David Peleg, Avishai Wool:
How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems. SIAM J. Discret. Math. 15(3): 416-433 (2002) - [j15]Avishai Wool:
Combating the Perils of Port 80 at the Firewall. login Usenix Mag. 27(4) (2002) - 2001
- [j14]Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright:
Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001) - [c21]Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener:
Computing the Unmeasured: An Algebraic Approach to Internet Mapping. INFOCOM 2001: 1646-1654 - [c20]Avishai Wool:
How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. LISA 2001 - [c19]Avishai Wool:
Architecting the Lumeta Firewall Analyzer. USENIX Security Symposium 2001 - 2000
- [j13]Dahlia Malkhi, Michael K. Reiter, Avishai Wool:
The Load and Availability of Byzantine Quorum Systems. SIAM J. Comput. 29(6): 1889-1906 (2000) - [j12]Avishai Wool:
Key management for encrypted broadcast. ACM Trans. Inf. Syst. Secur. 3(2): 107-134 (2000) - [j11]Michel Abdalla, Yuval Shavitt, Avishai Wool:
Key management for restricted multicast using broadcast encryption. IEEE/ACM Trans. Netw. 8(4): 443-454 (2000) - [c18]Juan A. Garay, Jessica Staddon, Avishai Wool:
Long-Lived Broadcast Encryption. CRYPTO 2000: 333-352 - [c17]Alain J. Mayer, Avishai Wool, Elisha Ziskind:
Fang: A Firewall Analysis Engine. S&P 2000: 177-187
1990 – 1999
- 1999
- [j10]Eran Gabber, Avishai Wool:
On location-restricted services. IEEE Netw. 13(6): 44-52 (1999) - [c16]Michel Abdalla, Yuval Shavitt, Avishai Wool:
Towards Making Broadcast Encryption Practical. Financial Cryptography 1999: 140-157 - [c15]Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool:
Firmato: A Novel Firewall Management Toolkit. S&P 1999: 17-31 - [i2]Dahlia Malkhi, Michael K. Reiter, Avishai Wool:
The Load and Availability of Byzantine Quorum Systems. CoRR cs.DC/9908011 (1999) - 1998
- [j9]Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks:
Optimal layouts on a chain ATM network. Discret. Appl. Math. 83(1-3): 157-178 (1998) - [j8]Avishai Wool:
Quorum Systems in Replicated Databases: Science or Fiction? IEEE Data Eng. Bull. 21(4): 3-11 (1998) - [j7]Yair Amir, Avishai Wool:
Optimal Availability Quorum Systems: Theory and Practice. Inf. Process. Lett. 65(5): 223-228 (1998) - [j6]Moni Naor, Avishai Wool:
The Load, Capacity, and Availability of Quorum Systems. SIAM J. Comput. 27(2): 423-447 (1998) - [j5]Moni Naor, Avishai Wool:
Access Control and Signatures via Quorum Secret Sharing. IEEE Trans. Parallel Distributed Syst. 9(9): 909-922 (1998) - [c14]Avishai Wool:
Key Management for Encrypted broadcast. CCS 1998: 7-16 - [c13]Eran Gabber, Avishai Wool:
How to Prove Where You Are: Tracking the Location of Customer Equipment. CCS 1998: 142-149 - [c12]Donald Beaver, Avishai Wool:
Quorum-Based Secure Multi-party Computation. EUROCRYPT 1998: 375-390 - [c11]Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright:
Probabilistic Byzantine Quorum Systems. PODC 1998: 321 - [c10]Todd A. Anderson, Yuri Breitbart, Henry F. Korth, Avishai Wool:
Replication, Consistency, and Practicality: Are These Mutually Exclusive? SIGMOD Conference 1998: 484-495 - 1997
- [j4]David Peleg, Gideon Schechtman, Avishai Wool:
Randomized Approximation of Bounded Multicovering Problems. Algorithmica 18(1): 44-66 (1997) - [j3]David Peleg, Avishai Wool:
The Availability of Crumbling Wall Quorum Systems. Discret. Appl. Math. 74(1): 69-83 (1997) - [j2]David Peleg, Avishai Wool:
Crumbling Walls: A Class of Practical and Efficient Quorum Systems. Distributed Comput. 10(2): 87-97 (1997) - [c9]Dahlia Malkhi, Michael K. Reiter, Avishai Wool:
The Load and Availability of Byzantine Quorum Systems. PODC 1997: 249-257 - 1996
- [c8]Moni Naor, Avishai Wool:
Access Control and Signatures via Quorum Secret Sharing. CCS 1996: 157-168 - [c7]Yair Amir, Avishai Wool:
Evaluating Quorum Systems over the Internet. FTCS 1996: 26-35 - [c6]David Peleg, Avishai Wool:
How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract). PODC 1996: 290-299 - [c5]Yair Amir, Avishai Wool:
Evaluating Quorum Systems Over the Internet (Abstract). PODC 1996: 344 - [i1]Moni Naor, Avishai Wool:
Access Control and Signatures via Quorum Secret Sharing. IACR Cryptol. ePrint Arch. 1996: 8 (1996) - 1995
- [j1]David Peleg, Avishai Wool:
The Availability of Quorum Systems. Inf. Comput. 123(2): 210-223 (1995) - [c4]Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks:
Optimal Layouts on a Chain ATM Network (Extended Abstract). ESA 1995: 508-522 - [c3]David Peleg, Avishai Wool:
Crumbling Walls: A Class of Practical and Efficient Quorum Systems (Extended Abstract). PODC 1995: 120-129 - 1994
- [c2]Moni Naor, Avishai Wool:
The Load, Capacity and Availability of Quorum Systems. FOCS 1994: 214-225 - 1993
- [c1]David Peleg, Gideon Schechtman, Avishai Wool:
Approximating Bounded 0-1 Integer Linear Programs. ISTCS 1993: 69-77
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint