dblp.uni-trier.dewww.uni-trier.de

Avishai Wool

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
58EEMira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool: Finding a dense-core in Jellyfish graphs. Computer Networks 52(15): 2831-2841 (2008)
2007
57EEMira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool: Finding a Dense-Core in Jellyfish Graphs. WAW 2007: 29-40
56EESagy Bar, Mira Gonen, Avishai Wool: A geographic directed preferential internet topology model. Computer Networks 51(14): 4174-4188 (2007)
2006
55EEYigael Berger, Avishai Wool, Arie Yeredor: Dictionary attacks using keyboard acoustic emanations. ACM Conference on Computer and Communications Security 2006: 245-254
54EEYaniv Shaked, Avishai Wool: Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. ISC 2006: 187-202
53EENoam Kogan, Yuval Shavitt, Avishai Wool: A practical revocation scheme for broadcast encryption using smartcards. ACM Trans. Inf. Syst. Secur. 9(3): 325-351 (2006)
52EEReuven Cohen, Mira Gonen, Avishai Wool: Bounding the Bias of Tree-Like Sampling in IP Topologies CoRR abs/cs/0611157: (2006)
51EEDanny Nebenzahl, Shmuel Sagiv, Avishai Wool: Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. IEEE Trans. Dependable Sec. Comput. 3(1): 78-90 (2006)
50EEAlain J. Mayer, Avishai Wool, Elisha Ziskind: Offline firewall analysis. Int. J. Inf. Sec. 5(3): 125-144 (2006)
2005
49EESagy Bar, Sagy Bar, Mira Gonen, Avishai Wool: A Geographic Directed Preferential Internet Topology Model. MASCOTS 2005: 325-328
48EEYaniv Shaked, Avishai Wool: Cracking the Bluetooth PIN. MobiSys 2005: 39-50
47EEDalit Naor, Amir Shenhav, Avishai Wool: Toward securing untrusted storage without public-key operations. StorageSS 2005: 51-56
46EESagy Bar, Mira Gonen, Avishai Wool: A Geographic Directed Preferential Internet Topology Model CoRR abs/cs/0502061: (2005)
45EEAvishai Wool: Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. Wireless Networks 11(6): 677-686 (2005)
2004
44EESagy Bar, Mira Gonen, Avishai Wool: An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract. PAM 2004: 53-62
43 Danny Nebenzahl, Avishai Wool: Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks. SEC 2004: 225-240
42EEYair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool: Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4): 381-420 (2004)
41EEAvishai Wool: The use and usability of direction-based filtering in firewalls. Computers & Security 23(6): 459-468 (2004)
40EEAvishai Wool: A Quantitative Study of Firewall Configuration Errors. IEEE Computer 37(6): 62-67 (2004)
39EEYuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener: Computing the unmeasured: an algebraic approach to Internet mapping. IEEE Journal on Selected Areas in Communications 22(1): 67-78 (2004)
2003
38EENoam Kogan, Yuval Shavitt, Avishai Wool: A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. IEEE Symposium on Security and Privacy 2003: 225-235
37EEYueyue Song, Avishai Wool, Bülent Yener: Combinatorial design of multi-ring networks with combined routing and flow control. Computer Networks 41(2): 247-267 (2003)
2002
36EEAvishai Wool: Why security standards sometimes fail. Commun. ACM 45(12): 144 (2002)
35EEDavid Peleg, Avishai Wool: How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems. SIAM J. Discrete Math. 15(3): 416-433 (2002)
2001
34EEYuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener: Computing the Unmeasured: An Algebraic Approach to Internet Mapping. INFOCOM 2001: 1646-1654
33 Avishai Wool: How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. LISA 2001
32EEDahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001)
2000
31EEJuan A. Garay, Jessica Staddon, Avishai Wool: Long-Lived Broadcast Encryption. CRYPTO 2000: 333-352
30EEAlain J. Mayer, Avishai Wool, Elisha Ziskind: Fang: A Firewall Analysis Engine. IEEE Symposium on Security and Privacy 2000: 177-187
29EEAvishai Wool: Key management for encrypted broadcast. ACM Trans. Inf. Syst. Secur. 3(2): 107-134 (2000)
28EEMichel Abdalla, Yuval Shavitt, Avishai Wool: Key management for restricted multicast using broadcast encryption. IEEE/ACM Trans. Netw. 8(4): 443-454 (2000)
27 Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems. SIAM J. Comput. 29(6): 1889-1906 (2000)
1999
26EEMichel Abdalla, Yuval Shavitt, Avishai Wool: Towards Making Broadcast Encryption Practical. Financial Cryptography 1999: 140-157
25EEYair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool: Firmato: A Novel Firewall Management Toolkit. IEEE Symposium on Security and Privacy 1999: 17-31
24EEDahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems CoRR cs.DC/9908011: (1999)
1998
23EEEran Gabber, Avishai Wool: How to Prove Where You Are: Tracking the Location of Customer Equipment. ACM Conference on Computer and Communications Security 1998: 142-149
22EEAvishai Wool: Key Management for Encrypted broadcast. ACM Conference on Computer and Communications Security 1998: 7-16
21EEDonald Beaver, Avishai Wool: Quorum-Based Secure Multi-party Computation. EUROCRYPT 1998: 375-390
20EEDahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Byzantine Quorum Systems. PODC 1998: 321
19EETodd A. Anderson, Yuri Breitbart, Henry F. Korth, Avishai Wool: Replication, Consistency, and Practicality: Are These Mutually Exclusive? SIGMOD Conference 1998: 484-495
18EEOrnan Ori Gerstel, Avishai Wool, Shmuel Zaks: Optimal layouts on a chain ATM network. Discrete Applied Mathematics 83(1-3): 157-178 (1998)
17EEAvishai Wool: Quorum Systems in Replicated Databases: Science or Fiction? IEEE Data Eng. Bull. 21(4): 3-11 (1998)
16EEMoni Naor, Avishai Wool: Access Control and Signatures via Quorum Secret Sharing. IEEE Trans. Parallel Distrib. Syst. 9(9): 909-922 (1998)
15EEYair Amir, Avishai Wool: Optimal Availability Quorum Systems: Theory and Practice. Inf. Process. Lett. 65(5): 223-228 (1998)
14 Moni Naor, Avishai Wool: The Load, Capacity, and Availability of Quorum Systems. SIAM J. Comput. 27(2): 423-447 (1998)
1997
13 Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems. PODC 1997: 249-257
12 David Peleg, Gideon Schechtman, Avishai Wool: Randomized Approximation of Bounded Multicovering Problems. Algorithmica 18(1): 44-66 (1997)
11EEDavid Peleg, Avishai Wool: The Availability of Crumbling Wall Quorum Systems. Discrete Applied Mathematics 74(1): 69-83 (1997)
10 David Peleg, Avishai Wool: Crumbling Walls: A Class of Practical and Efficient Quorum Systems. Distributed Computing 10(2): 87-97 (1997)
1996
9EEMoni Naor, Avishai Wool: Access Control and Signatures via Quorum Secret Sharing. ACM Conference on Computer and Communications Security 1996: 157-168
8 Yair Amir, Avishai Wool: Evaluating Quorum Systems over the Internet. FTCS 1996: 26-35
7 David Peleg, Avishai Wool: How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract). PODC 1996: 290-299
6 Yair Amir, Avishai Wool: Evaluating Quorum Systems Over the Internet (Abstract). PODC 1996: 344
1995
5 Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks: Optimal Layouts on a Chain ATM Network (Extended Abstract). ESA 1995: 508-522
4 David Peleg, Avishai Wool: Crumbling Walls: A Class of Practical and Efficient Quorum Systems (Extended Abstract). PODC 1995: 120-129
3 David Peleg, Avishai Wool: The Availability of Quorum Systems. Inf. Comput. 123(2): 210-223 (1995)
1994
2 Moni Naor, Avishai Wool: The Load, Capacity and Availability of Quorum Systems FOCS 1994: 214-225
1993
1 David Peleg, Gideon Schechtman, Avishai Wool: Approximating Bounded 0-1 Integer Linear Programs. ISTCS 1993: 69-77

Coauthor Index

1Michel Abdalla [26] [28]
2Yair Amir [6] [8] [15]
3Todd A. Anderson [19]
4Sagy Bar [44] [46] [49] [56]
5Yair Bartal [25] [42]
6Donald Beaver [21]
7Yigael Berger [55]
8Yuri Breitbart [19]
9Reuven Cohen [52]
10Eran Gabber [23]
11Juan A. Garay [31]
12Ornan Ori Gerstel [5] [18]
13Mira Gonen [44] [46] [49] [52] [56] [57] [58]
14Noam Kogan [38] [53]
15Henry F. Korth [19]
16Dahlia Malkhi (Dalia Malki) [13] [20] [24] [27] [32]
17Alain J. Mayer [25] [30] [42] [50]
18Dalit Naor [47]
19Moni Naor [2] [9] [14] [16]
20Danny Nebenzahl [43] [51]
21Kobbi Nissim [25] [42]
22David Peleg [1] [3] [4] [7] [10] [11] [12] [35]
23Michael K. Reiter [13] [20] [24] [27] [32]
24Dana Ron [57] [58]
25Shmuel Sagiv (Mooly Sagiv) [51]
26Gideon Schechtman [1] [12]
27Yaniv Shaked [48] [54]
28Yuval Shavitt [26] [28] [34] [38] [39] [53]
29Amir Shenhav [47]
30Yueyue Song [37]
31Jessica Staddon [31]
32Xiaodong Sun [34] [39]
33Udi Weinsberg [57] [58]
34Rebecca N. Wright [20] [32]
35Bülent Yener [34] [37] [39]
36Arie Yeredor [55]
37Shmuel Zaks [5] [18]
38Elisha Ziskind [30] [50]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)