2008 |
58 | EE | Mira Gonen,
Dana Ron,
Udi Weinsberg,
Avishai Wool:
Finding a dense-core in Jellyfish graphs.
Computer Networks 52(15): 2831-2841 (2008) |
2007 |
57 | EE | Mira Gonen,
Dana Ron,
Udi Weinsberg,
Avishai Wool:
Finding a Dense-Core in Jellyfish Graphs.
WAW 2007: 29-40 |
56 | EE | Sagy Bar,
Mira Gonen,
Avishai Wool:
A geographic directed preferential internet topology model.
Computer Networks 51(14): 4174-4188 (2007) |
2006 |
55 | EE | Yigael Berger,
Avishai Wool,
Arie Yeredor:
Dictionary attacks using keyboard acoustic emanations.
ACM Conference on Computer and Communications Security 2006: 245-254 |
54 | EE | Yaniv Shaked,
Avishai Wool:
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's.
ISC 2006: 187-202 |
53 | EE | Noam Kogan,
Yuval Shavitt,
Avishai Wool:
A practical revocation scheme for broadcast encryption using smartcards.
ACM Trans. Inf. Syst. Secur. 9(3): 325-351 (2006) |
52 | EE | Reuven Cohen,
Mira Gonen,
Avishai Wool:
Bounding the Bias of Tree-Like Sampling in IP Topologies
CoRR abs/cs/0611157: (2006) |
51 | EE | Danny Nebenzahl,
Shmuel Sagiv,
Avishai Wool:
Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks.
IEEE Trans. Dependable Sec. Comput. 3(1): 78-90 (2006) |
50 | EE | Alain J. Mayer,
Avishai Wool,
Elisha Ziskind:
Offline firewall analysis.
Int. J. Inf. Sec. 5(3): 125-144 (2006) |
2005 |
49 | EE | Sagy Bar,
Sagy Bar,
Mira Gonen,
Avishai Wool:
A Geographic Directed Preferential Internet Topology Model.
MASCOTS 2005: 325-328 |
48 | EE | Yaniv Shaked,
Avishai Wool:
Cracking the Bluetooth PIN.
MobiSys 2005: 39-50 |
47 | EE | Dalit Naor,
Amir Shenhav,
Avishai Wool:
Toward securing untrusted storage without public-key operations.
StorageSS 2005: 51-56 |
46 | EE | Sagy Bar,
Mira Gonen,
Avishai Wool:
A Geographic Directed Preferential Internet Topology Model
CoRR abs/cs/0502061: (2005) |
45 | EE | Avishai Wool:
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation.
Wireless Networks 11(6): 677-686 (2005) |
2004 |
44 | EE | Sagy Bar,
Mira Gonen,
Avishai Wool:
An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract.
PAM 2004: 53-62 |
43 | | Danny Nebenzahl,
Avishai Wool:
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks.
SEC 2004: 225-240 |
42 | EE | Yair Bartal,
Alain J. Mayer,
Kobbi Nissim,
Avishai Wool:
Firmato: A novel firewall management toolkit.
ACM Trans. Comput. Syst. 22(4): 381-420 (2004) |
41 | EE | Avishai Wool:
The use and usability of direction-based filtering in firewalls.
Computers & Security 23(6): 459-468 (2004) |
40 | EE | Avishai Wool:
A Quantitative Study of Firewall Configuration Errors.
IEEE Computer 37(6): 62-67 (2004) |
39 | EE | Yuval Shavitt,
Xiaodong Sun,
Avishai Wool,
Bülent Yener:
Computing the unmeasured: an algebraic approach to Internet mapping.
IEEE Journal on Selected Areas in Communications 22(1): 67-78 (2004) |
2003 |
38 | EE | Noam Kogan,
Yuval Shavitt,
Avishai Wool:
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards.
IEEE Symposium on Security and Privacy 2003: 225-235 |
37 | EE | Yueyue Song,
Avishai Wool,
Bülent Yener:
Combinatorial design of multi-ring networks with combined routing and flow control.
Computer Networks 41(2): 247-267 (2003) |
2002 |
36 | EE | Avishai Wool:
Why security standards sometimes fail.
Commun. ACM 45(12): 144 (2002) |
35 | EE | David Peleg,
Avishai Wool:
How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems.
SIAM J. Discrete Math. 15(3): 416-433 (2002) |
2001 |
34 | EE | Yuval Shavitt,
Xiaodong Sun,
Avishai Wool,
Bülent Yener:
Computing the Unmeasured: An Algebraic Approach to Internet Mapping.
INFOCOM 2001: 1646-1654 |
33 | | Avishai Wool:
How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations.
LISA 2001 |
32 | EE | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool,
Rebecca N. Wright:
Probabilistic Quorum Systems.
Inf. Comput. 170(2): 184-206 (2001) |
2000 |
31 | EE | Juan A. Garay,
Jessica Staddon,
Avishai Wool:
Long-Lived Broadcast Encryption.
CRYPTO 2000: 333-352 |
30 | EE | Alain J. Mayer,
Avishai Wool,
Elisha Ziskind:
Fang: A Firewall Analysis Engine.
IEEE Symposium on Security and Privacy 2000: 177-187 |
29 | EE | Avishai Wool:
Key management for encrypted broadcast.
ACM Trans. Inf. Syst. Secur. 3(2): 107-134 (2000) |
28 | EE | Michel Abdalla,
Yuval Shavitt,
Avishai Wool:
Key management for restricted multicast using broadcast encryption.
IEEE/ACM Trans. Netw. 8(4): 443-454 (2000) |
27 | | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool:
The Load and Availability of Byzantine Quorum Systems.
SIAM J. Comput. 29(6): 1889-1906 (2000) |
1999 |
26 | EE | Michel Abdalla,
Yuval Shavitt,
Avishai Wool:
Towards Making Broadcast Encryption Practical.
Financial Cryptography 1999: 140-157 |
25 | EE | Yair Bartal,
Alain J. Mayer,
Kobbi Nissim,
Avishai Wool:
Firmato: A Novel Firewall Management Toolkit.
IEEE Symposium on Security and Privacy 1999: 17-31 |
24 | EE | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool:
The Load and Availability of Byzantine Quorum Systems
CoRR cs.DC/9908011: (1999) |
1998 |
23 | EE | Eran Gabber,
Avishai Wool:
How to Prove Where You Are: Tracking the Location of Customer Equipment.
ACM Conference on Computer and Communications Security 1998: 142-149 |
22 | EE | Avishai Wool:
Key Management for Encrypted broadcast.
ACM Conference on Computer and Communications Security 1998: 7-16 |
21 | EE | Donald Beaver,
Avishai Wool:
Quorum-Based Secure Multi-party Computation.
EUROCRYPT 1998: 375-390 |
20 | EE | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool,
Rebecca N. Wright:
Probabilistic Byzantine Quorum Systems.
PODC 1998: 321 |
19 | EE | Todd A. Anderson,
Yuri Breitbart,
Henry F. Korth,
Avishai Wool:
Replication, Consistency, and Practicality: Are These Mutually Exclusive?
SIGMOD Conference 1998: 484-495 |
18 | EE | Ornan Ori Gerstel,
Avishai Wool,
Shmuel Zaks:
Optimal layouts on a chain ATM network.
Discrete Applied Mathematics 83(1-3): 157-178 (1998) |
17 | EE | Avishai Wool:
Quorum Systems in Replicated Databases: Science or Fiction?
IEEE Data Eng. Bull. 21(4): 3-11 (1998) |
16 | EE | Moni Naor,
Avishai Wool:
Access Control and Signatures via Quorum Secret Sharing.
IEEE Trans. Parallel Distrib. Syst. 9(9): 909-922 (1998) |
15 | EE | Yair Amir,
Avishai Wool:
Optimal Availability Quorum Systems: Theory and Practice.
Inf. Process. Lett. 65(5): 223-228 (1998) |
14 | | Moni Naor,
Avishai Wool:
The Load, Capacity, and Availability of Quorum Systems.
SIAM J. Comput. 27(2): 423-447 (1998) |
1997 |
13 | | Dahlia Malkhi,
Michael K. Reiter,
Avishai Wool:
The Load and Availability of Byzantine Quorum Systems.
PODC 1997: 249-257 |
12 | | David Peleg,
Gideon Schechtman,
Avishai Wool:
Randomized Approximation of Bounded Multicovering Problems.
Algorithmica 18(1): 44-66 (1997) |
11 | EE | David Peleg,
Avishai Wool:
The Availability of Crumbling Wall Quorum Systems.
Discrete Applied Mathematics 74(1): 69-83 (1997) |
10 | | David Peleg,
Avishai Wool:
Crumbling Walls: A Class of Practical and Efficient Quorum Systems.
Distributed Computing 10(2): 87-97 (1997) |
1996 |
9 | EE | Moni Naor,
Avishai Wool:
Access Control and Signatures via Quorum Secret Sharing.
ACM Conference on Computer and Communications Security 1996: 157-168 |
8 | | Yair Amir,
Avishai Wool:
Evaluating Quorum Systems over the Internet.
FTCS 1996: 26-35 |
7 | | David Peleg,
Avishai Wool:
How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract).
PODC 1996: 290-299 |
6 | | Yair Amir,
Avishai Wool:
Evaluating Quorum Systems Over the Internet (Abstract).
PODC 1996: 344 |
1995 |
5 | | Ornan Ori Gerstel,
Avishai Wool,
Shmuel Zaks:
Optimal Layouts on a Chain ATM Network (Extended Abstract).
ESA 1995: 508-522 |
4 | | David Peleg,
Avishai Wool:
Crumbling Walls: A Class of Practical and Efficient Quorum Systems (Extended Abstract).
PODC 1995: 120-129 |
3 | | David Peleg,
Avishai Wool:
The Availability of Quorum Systems.
Inf. Comput. 123(2): 210-223 (1995) |
1994 |
2 | | Moni Naor,
Avishai Wool:
The Load, Capacity and Availability of Quorum Systems
FOCS 1994: 214-225 |
1993 |
1 | | David Peleg,
Gideon Schechtman,
Avishai Wool:
Approximating Bounded 0-1 Integer Linear Programs.
ISTCS 1993: 69-77 |