Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Avishai Wool
@article{DBLP:journals/pomacs/SilvaCW24, author = {Neil Ortiz Silva and Alvaro A. C{\'{a}}rdenas and Avishai Wool}, title = {{SCADA} World: An Exploration of the Diversity in Power Grid Networks}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {8}, number = {1}, pages = {10:1--10:32}, year = {2024}, url = {https://doi.org/10.1145/3639036}, doi = {10.1145/3639036}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pomacs/SilvaCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/SilvaCW23, author = {Neil Ortiz Silva and Alvaro A. C{\'{a}}rdenas and Avishai Wool}, title = {A Taxonomy of Industrial Control Protocols and Networks in the Power Grid}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {6}, pages = {21--27}, year = {2023}, url = {https://doi.org/10.1109/MCOM.001.2200574}, doi = {10.1109/MCOM.001.2200574}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/SilvaCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/KomissarovVW23, author = {Rony Komissarov and Sharon Vaisman and Avishai Wool}, title = {Spoofing attacks against vehicular {FMCW} radar}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {4}, pages = {473--484}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00321-5}, doi = {10.1007/S13389-023-00321-5}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jce/KomissarovVW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-05423, author = {Tomer Avrahami and Ofer Amrani and Avishai Wool}, title = {Let's shake on it: Extracting secure shared keys from Wi-Fi {CSI}}, journal = {CoRR}, volume = {abs/2307.05423}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.05423}, doi = {10.48550/ARXIV.2307.05423}, eprinttype = {arXiv}, eprint = {2307.05423}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-05423.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/DavidW22, author = {Liron David and Avishai Wool}, title = {Rank estimation with bounded error via exponential sampling}, journal = {J. Cryptogr. Eng.}, volume = {12}, number = {2}, pages = {151--168}, year = {2022}, url = {https://doi.org/10.1007/s13389-021-00269-4}, doi = {10.1007/S13389-021-00269-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/DavidW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DavidW22, author = {Liron David and Avishai Wool}, title = {PESrank: An Explainable online password strength estimator}, journal = {J. Comput. Secur.}, volume = {30}, number = {6}, pages = {877--901}, year = {2022}, url = {https://doi.org/10.3233/JCS-210166}, doi = {10.3233/JCS-210166}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DavidW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShakevskyRW22, author = {Alon Shakevsky and Eyal Ronen and Avishai Wool}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {251--268}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/shakevsky}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/ShakevskyRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/EngelbergW22, author = {Aviv Engelberg and Avishai Wool}, editor = {Yuan Hong and Lingyu Wang}, title = {Classification of Encrypted IoT Traffic despite Padding and Shaping}, booktitle = {Proceedings of the 21st Workshop on Privacy in the Electronic Society, WPES2022, Los Angeles, CA, USA, 7 November 2022}, pages = {1--13}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3559613.3563191}, doi = {10.1145/3559613.3563191}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/EngelbergW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShakevskyRW22, author = {Alon Shakevsky and Eyal Ronen and Avishai Wool}, title = {Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2022}, url = {https://eprint.iacr.org/2022/208}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ShakevskyRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KomissarovW21, author = {Rony Komissarov and Avishai Wool}, editor = {Chip{-}Hong Chang and Ulrich R{\"{u}}hrmair and Stefan Katzenbeisser and Debdeep Mukhopadhyay}, title = {Spoofing Attacks Against Vehicular {FMCW} Radar}, booktitle = {ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, Virtual Event, Republic of Korea, 19 November 2021}, pages = {91--97}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474376.3487283}, doi = {10.1145/3474376.3487283}, timestamp = {Thu, 11 Nov 2021 09:27:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KomissarovW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZuberiW21, author = {Eldad Zuberi and Avishai Wool}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Characterizing {GPU} Overclocking Faults}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {110--130}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_6}, doi = {10.1007/978-3-030-88418-5\_6}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZuberiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DavidW21, author = {Liron David and Avishai Wool}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {An Explainable Online Password Strength Estimator}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12972}, pages = {285--304}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88418-5\_14}, doi = {10.1007/978-3-030-88418-5\_14}, timestamp = {Thu, 30 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DavidW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-13318, author = {Rony Komissarov and Avishai Wool}, title = {Spoofing Attacks Against Vehicular {FMCW} Radar}, journal = {CoRR}, volume = {abs/2104.13318}, year = {2021}, url = {https://arxiv.org/abs/2104.13318}, eprinttype = {arXiv}, eprint = {2104.13318}, timestamp = {Tue, 04 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-13318.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-11188, author = {Aviv Engelberg and Avishai Wool}, title = {Classification of Encrypted IoT Traffic Despite Padding and Shaping}, journal = {CoRR}, volume = {abs/2110.11188}, year = {2021}, url = {https://arxiv.org/abs/2110.11188}, eprinttype = {arXiv}, eprint = {2110.11188}, timestamp = {Thu, 28 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-11188.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidW21, author = {Liron David and Avishai Wool}, title = {Rank Estimation with Bounded Error via Exponential Sampling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {313}, year = {2021}, url = {https://eprint.iacr.org/2021/313}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ItkinW20, author = {Eyal Itkin and Avishai Wool}, title = {A Security Analysis and Revised Security Extension for the Precision Time Protocol}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {1}, pages = {22--34}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2017.2748583}, doi = {10.1109/TDSC.2017.2748583}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ItkinW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MarkevichW20, author = {Nimrod Gilboa Markevich and Avishai Wool}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Hardware Fingerprinting for the {ARINC} 429 Avionic Bus}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {42--62}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_3}, doi = {10.1007/978-3-030-59013-0\_3}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MarkevichW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-12456, author = {Nimrod Gilboa Markevich and Avishai Wool}, title = {Hardware Fingerprinting for the {ARINC} 429 Avionic Bus}, journal = {CoRR}, volume = {abs/2003.12456}, year = {2020}, url = {https://arxiv.org/abs/2003.12456}, eprinttype = {arXiv}, eprint = {2003.12456}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-12456.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TippenhauerW19, author = {Nils Ole Tippenhauer and Avishai Wool}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {{CPS-SPC} 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2695--2696}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3353549}, doi = {10.1145/3319535.3353549}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TippenhauerW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/DavidW19, author = {Liron David and Avishai Wool}, editor = {Ilia Polian and Marc St{\"{o}}ttinger}, title = {Fast Analytical Rank Estimation}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, {COSADE} 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11421}, pages = {168--190}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-16350-1\_10}, doi = {10.1007/978-3-030-16350-1\_10}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/DavidW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DavidW19, author = {Liron David and Avishai Wool}, editor = {Mitsuru Matsui}, title = {Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {330--349}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_17}, doi = {10.1007/978-3-030-12612-4\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DavidW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/FaisalCW19, author = {Mustafa Amir Faisal and Alvaro A. C{\'{a}}rdenas and Avishai Wool}, editor = {Cristina Alcaraz}, title = {Profiling Communications in Industrial {IP} Networks: Model Complexity and Anomaly Detection}, booktitle = {Security and Privacy Trends in the Industrial Internet of Things}, pages = {139--160}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12330-7\_7}, doi = {10.1007/978-3-030-12330-7\_7}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/19/FaisalCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-02551, author = {Liron David and Avishai Wool}, title = {Context Aware Password Guessability via Multi-Dimensional Rank Estimation}, journal = {CoRR}, volume = {abs/1912.02551}, year = {2019}, url = {http://arxiv.org/abs/1912.02551}, eprinttype = {arXiv}, eprint = {1912.02551}, timestamp = {Thu, 02 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-02551.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MarkmanWC18, author = {Chen Markman and Avishai Wool and Alvaro A. C{\'{a}}rdenas}, editor = {David Lie and Mohammad Mannan}, title = {Temporal Phase Shifts in {SCADA} Networks}, booktitle = {Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018}, pages = {84--89}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264888.3264898}, doi = {10.1145/3264888.3264898}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MarkmanWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LapidW18, author = {Ben Lapid and Avishai Wool}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {175--196}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_9}, doi = {10.1007/978-3-319-99073-6\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LapidW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FledelW18, author = {Dor Fledel and Avishai Wool}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {193--215}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_9}, doi = {10.1007/978-3-030-10970-7\_9}, timestamp = {Wed, 25 Sep 2019 18:08:16 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/FledelW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LapidW18, author = {Ben Lapid and Avishai Wool}, editor = {Carlos Cid and Michael J. Jacobson Jr.}, title = {Cache-Attacks on the {ARM} TrustZone Implementations of {AES-256} and {AES-256-GCM} via GPU-Based Analysis}, booktitle = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11349}, pages = {235--256}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-10970-7\_11}, doi = {10.1007/978-3-030-10970-7\_11}, timestamp = {Wed, 16 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/LapidW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-05068, author = {Chen Markman and Avishai Wool and Alvaro A. C{\'{a}}rdenas}, title = {Temporal Phase Shifts in {SCADA} Networks}, journal = {CoRR}, volume = {abs/1808.05068}, year = {2018}, url = {http://arxiv.org/abs/1808.05068}, eprinttype = {arXiv}, eprint = {1808.05068}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-05068.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FledelW18, author = {Dor Fledel and Avishai Wool}, title = {Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2018}, url = {https://eprint.iacr.org/2018/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FledelW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidW18, author = {Liron David and Avishai Wool}, title = {PRank: Fast Analytical Rank Estimation via Pareto Distributions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {550}, year = {2018}, url = {https://eprint.iacr.org/2018/550}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LapidW18, author = {Ben Lapid and Avishai Wool}, title = {Cache-Attacks on the {ARM} TrustZone implementations of {AES-256} and {AES-256-GCM} via GPU-based analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2018}, url = {https://eprint.iacr.org/2018/621}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LapidW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidW18a, author = {Liron David and Avishai Wool}, title = {Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {867}, year = {2018}, url = {https://eprint.iacr.org/2018/867}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/KleinmannW17, author = {Amit Kleinmann and Avishai Wool}, title = {Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {8}, number = {4}, pages = {55:1--55:21}, year = {2017}, url = {https://doi.org/10.1145/3011018}, doi = {10.1145/3011018}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tist/KleinmannW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/MarkovitzW17, author = {Moti Markovitz and Avishai Wool}, title = {Field classification, modeling and anomaly detection in unknown {CAN} bus networks}, journal = {Veh. Commun.}, volume = {9}, pages = {43--52}, year = {2017}, url = {https://doi.org/10.1016/j.vehcom.2017.02.005}, doi = {10.1016/J.VEHCOM.2017.02.005}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vcomm/MarkovitzW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MarkmanWC17, author = {Chen Markman and Avishai Wool and Alvaro A. C{\'{a}}rdenas}, editor = {Bhavani Thuraisingham and Rakesh B. Bobba and Awais Rashid}, title = {A New Burst-DFA model for {SCADA} Anomaly Detection}, booktitle = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, Dallas, TX, USA, November 3, 2017}, pages = {1--12}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140241.3140245}, doi = {10.1145/3140241.3140245}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MarkmanWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DavidW17, author = {Liron David and Avishai Wool}, editor = {Helena Handschuh}, title = {A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {311--327}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_18}, doi = {10.1007/978-3-319-52153-4\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DavidW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KleinmannAWTBL17, author = {Amit Kleinmann and Ori Amichay and Avishai Wool and David Tenenbaum and Ofer Bar and Leonid Lev}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Stealthy Deception Attacks Against {SCADA} Systems}, booktitle = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, pages = {93--109}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72817-9\_7}, doi = {10.1007/978-3-319-72817-9\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KleinmannAWTBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/CarmonSW17, author = {Elad Carmon and Jean{-}Pierre Seifert and Avishai Wool}, title = {Photonic side channel attacks against {RSA}}, booktitle = {2017 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017}, pages = {74--78}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HST.2017.7951801}, doi = {10.1109/HST.2017.7951801}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/CarmonSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KleinmannAWTBL17, author = {Amit Kleinmann and Ori Amichay and Avishai Wool and David Tenenbaum and Ofer Bar and Leonid Lev}, title = {Stealthy Deception Attacks Against {SCADA} Systems}, journal = {CoRR}, volume = {abs/1706.09303}, year = {2017}, url = {http://arxiv.org/abs/1706.09303}, eprinttype = {arXiv}, eprint = {1706.09303}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KleinmannAWTBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarmonSW17, author = {Elad Carmon and Jean{-}Pierre Seifert and Avishai Wool}, title = {Photonic Side Channel Attacks Against {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {108}, year = {2017}, url = {http://eprint.iacr.org/2017/108}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarmonSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/constraints/OrenW16, author = {Yossef Oren and Avishai Wool}, title = {Side-channel cryptographic attacks using pseudo-boolean optimization}, journal = {Constraints An Int. J.}, volume = {21}, number = {4}, pages = {616--645}, year = {2016}, url = {https://doi.org/10.1007/s10601-015-9237-3}, doi = {10.1007/S10601-015-9237-3}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/constraints/OrenW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KleinmannW16, author = {Amit Kleinmann and Avishai Wool}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Alvaro A. C{\'{a}}rdenas and Rakesh B. Bobba}, title = {Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded {SCADA} via Spectral Analysis}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016}, pages = {1--12}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994487.2994490}, doi = {10.1145/2994487.2994490}, timestamp = {Sat, 09 Apr 2022 12:37:26 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KleinmannW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KanonovW16, author = {Uri Kanonov and Avishai Wool}, editor = {Long Lu and Mohammad Mannan}, title = {Secure Containers in Android: The Samsung {KNOX} Case Study}, booktitle = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {3--12}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2994470}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KanonovW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/FaisalCW16, author = {Mustafa Faisal and Alvaro A. C{\'{a}}rdenas and Avishai Wool}, title = {Modeling Modbus {TCP} for intrusion detection}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {386--390}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860524}, doi = {10.1109/CNS.2016.7860524}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/FaisalCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/CarmonSW16, author = {Elad Carmon and Jean{-}Pierre Seifert and Avishai Wool}, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Simple Photonic Emission Attack with Reduced Data Complexity}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, pages = {35--51}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0\_3}, doi = {10.1007/978-3-319-43283-0\_3}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/CarmonSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ItkinW16, author = {Eyal Itkin and Avishai Wool}, title = {A Security Analysis and Revised Security Extension for the Precision Time Protocol}, journal = {CoRR}, volume = {abs/1603.00707}, year = {2016}, url = {http://arxiv.org/abs/1603.00707}, eprinttype = {arXiv}, eprint = {1603.00707}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ItkinW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KanonovW16, author = {Uri Kanonov and Avishai Wool}, title = {Secure Containers in Android: the Samsung {KNOX} Case Study}, journal = {CoRR}, volume = {abs/1605.08567}, year = {2016}, url = {http://arxiv.org/abs/1605.08567}, eprinttype = {arXiv}, eprint = {1605.08567}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KanonovW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KleinmannW16, author = {Amit Kleinmann and Avishai Wool}, title = {Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems}, journal = {CoRR}, volume = {abs/1607.07489}, year = {2016}, url = {http://arxiv.org/abs/1607.07489}, eprinttype = {arXiv}, eprint = {1607.07489}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KleinmannW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ErezW15, author = {Noam Erez and Avishai Wool}, title = {Control variable classification, modeling and anomaly detection in Modbus/TCP {SCADA} systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {10}, pages = {59--70}, year = {2015}, url = {https://doi.org/10.1016/j.ijcip.2015.05.001}, doi = {10.1016/J.IJCIP.2015.05.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ErezW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArbitLOW15, author = {Alex Arbit and Yoel Livne and Yossef Oren and Avishai Wool}, title = {Implementing public-key cryptography on passive {RFID} tags is practical}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {85--99}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0236-y}, doi = {10.1007/S10207-014-0236-Y}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ArbitLOW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/TzurAW15, author = {Asaf Tzur and Ofer Amrani and Avishai Wool}, title = {Direction Finding of rogue Wi-Fi access points using an off-the-shelf {MIMO-OFDM} receiver}, journal = {Phys. Commun.}, volume = {17}, pages = {149--164}, year = {2015}, url = {https://doi.org/10.1016/j.phycom.2015.08.010}, doi = {10.1016/J.PHYCOM.2015.08.010}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/phycomm/TzurAW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KleinmannW15, author = {Amit Kleinmann and Avishai Wool}, editor = {Erich Rome and Marianthi Theocharidou and Stephen D. Wolthusen}, title = {A Statechart-Based Anomaly Detection Model for Multi-Threaded {SCADA} Systems}, booktitle = {Critical Information Infrastructures Security - 10th International Conference, {CRITIS} 2015, Berlin, Germany, October 5-7, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9578}, pages = {132--144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-33331-1\_11}, doi = {10.1007/978-3-319-33331-1\_11}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/critis/KleinmannW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarmonSW15, author = {Elad Carmon and Jean{-}Pierre Seifert and Avishai Wool}, title = {Simple Photonic Emission Attack with Reduced Data Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1206}, year = {2015}, url = {http://eprint.iacr.org/2015/1206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarmonSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidW15, author = {Liron David and Avishai Wool}, title = {A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1236}, year = {2015}, url = {http://eprint.iacr.org/2015/1236}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/KleinmannW14, author = {Amit Kleinmann and Avishai Wool}, title = {Accurate Modeling of The Siemens {S7} {SCADA} Protocol For Intrusion Detection And Digital Forensic}, journal = {J. Digit. Forensics Secur. Law}, volume = {9}, number = {2}, pages = {37--50}, year = {2014}, url = {https://doi.org/10.15394/jdfsl.2014.1169}, doi = {10.15394/JDFSL.2014.1169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/KleinmannW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/ArbitOW14, author = {Alex Arbit and Yossef Oren and Avishai Wool}, title = {A Secure Supply-Chain {RFID} System that Respects Your Privacy}, journal = {{IEEE} Pervasive Comput.}, volume = {13}, number = {2}, pages = {52--60}, year = {2014}, url = {https://doi.org/10.1109/MPRV.2014.22}, doi = {10.1109/MPRV.2014.22}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/ArbitOW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrenWW14, author = {Yossef Oren and Ofir Weisse and Avishai Wool}, editor = {Lejla Batina and Matthew Robshaw}, title = {A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {17--34}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_2}, doi = {10.1007/978-3-662-44709-3\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrenWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/GoldenbergW13, author = {Niv Goldenberg and Avishai Wool}, title = {Accurate modeling of Modbus/TCP for intrusion detection in {SCADA} systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {6}, number = {2}, pages = {63--75}, year = {2013}, url = {https://doi.org/10.1016/j.ijcip.2013.05.001}, doi = {10.1016/J.IJCIP.2013.05.001}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/GoldenbergW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/OrenSW13, author = {Yossef Oren and Dvir Schirman and Avishai Wool}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Range Extension Attacks on Contactless Smart Cards}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {646--663}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_36}, doi = {10.1007/978-3-642-40203-6\_36}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/OrenSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/OrenWW13, author = {Yossef Oren and Ofir Weisse and Avishai Wool}, editor = {Ruby B. Lee and Weidong Shi}, title = {Practical template-algebraic side channel attacks with extremely low data complexity}, booktitle = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013}, pages = {7}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2487726.2487733}, doi = {10.1145/2487726.2487733}, timestamp = {Fri, 09 Jul 2021 15:51:20 +0200}, biburl = {https://dblp.org/rec/conf/isca/OrenWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/SamorodnitzkyTW13, author = {Ory Samorodnitzky and Eran Tromer and Avishai Wool}, title = {Analyzing Unique-Bid Auction Sites for Fun and Profit}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/analyzing-unique-bid-auction-sites-fun-and-profit}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/SamorodnitzkyTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrenRSW12, author = {Yossef Oren and Mathieu Renauld and Fran{\c{c}}ois{-}Xavier Standaert and Avishai Wool}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {140--154}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_9}, doi = {10.1007/978-3-642-33027-8\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrenRSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrenW12, author = {Yossef Oren and Avishai Wool}, title = {Tolerant Algebraic Side-Channel Analysis of {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2012}, url = {http://eprint.iacr.org/2012/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrenW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/DoronW11, author = {Ehud Doron and Avishai Wool}, title = {{WDA:} {A} Web farm Distributed Denial Of Service attack attenuator}, journal = {Comput. Networks}, volume = {55}, number = {5}, pages = {1037--1051}, year = {2011}, url = {https://doi.org/10.1016/j.comnet.2010.05.001}, doi = {10.1016/J.COMNET.2010.05.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/DoronW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RovniaginW11, author = {Dmitry Rovniagin and Avishai Wool}, title = {The Geometric Efficient Matching Algorithm for Firewalls}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {1}, pages = {147--159}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2009.28}, doi = {10.1109/TDSC.2009.28}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RovniaginW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SheetritW11, author = {Idan Sheetrit and Avishai Wool}, title = {Cryptanalysis of KeeLoq code-hopping using a Single {FPGA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {242}, year = {2011}, url = {http://eprint.iacr.org/2011/242}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SheetritW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Wool10, author = {Avishai Wool}, title = {Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese}, journal = {{IEEE} Internet Comput.}, volume = {14}, number = {4}, pages = {58--65}, year = {2010}, url = {https://doi.org/10.1109/MIC.2010.29}, doi = {10.1109/MIC.2010.29}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Wool10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OrenKPW10, author = {Yossef Oren and Mario Kirschbaum and Thomas Popp and Avishai Wool}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Algebraic Side-Channel Analysis in the Presence of Errors}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {428--442}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_29}, doi = {10.1007/978-3-642-15031-9\_29}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/OrenKPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GeronW09, author = {Erel Geron and Avishai Wool}, title = {{CRUST:} cryptographic remote untrusted storage without public keys}, journal = {Int. J. Inf. Sec.}, volume = {8}, number = {5}, pages = {357--377}, year = {2009}, url = {https://doi.org/10.1007/s10207-009-0081-6}, doi = {10.1007/S10207-009-0081-6}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GeronW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0911-1240, author = {Avishai Wool}, title = {Firewall Configuration Errors Revisited}, journal = {CoRR}, volume = {abs/0911.1240}, year = {2009}, url = {http://arxiv.org/abs/0911.1240}, eprinttype = {arXiv}, eprint = {0911.1240}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0911-1240.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrenW09, author = {Yossef Oren and Avishai Wool}, title = {Attacks on RFID-Based Electronic Voting Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2009}, url = {http://eprint.iacr.org/2009/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrenW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GonenRWW08, author = {Mira Gonen and Dana Ron and Udi Weinsberg and Avishai Wool}, title = {Finding a dense-core in Jellyfish graphs}, journal = {Comput. Networks}, volume = {52}, number = {15}, pages = {2831--2841}, year = {2008}, url = {https://doi.org/10.1016/j.comnet.2008.06.005}, doi = {10.1016/J.COMNET.2008.06.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GonenRWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nhm/CohenGW08, author = {Reuven Cohen and Mira Gonen and Avishai Wool}, title = {Bounding the bias of tree-like sampling in {IP} topologies}, journal = {Networks Heterog. Media}, volume = {3}, number = {2}, pages = {323--332}, year = {2008}, url = {https://doi.org/10.3934/nhm.2008.3.323}, doi = {10.3934/NHM.2008.3.323}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nhm/CohenGW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BarGW07, author = {Sagy Bar and Mira Gonen and Avishai Wool}, title = {A geographic directed preferential internet topology model}, journal = {Comput. Networks}, volume = {51}, number = {14}, pages = {4174--4188}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2007.04.021}, doi = {10.1016/J.COMNET.2007.04.021}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BarGW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Bar-YosefW07, author = {Noa Bar{-}Yosef and Avishai Wool}, editor = {Joaquim Filipe and Mohammad S. Obaidat}, title = {Remote Algorithmic Complexity Attacks against Randomized Hash Tables}, booktitle = {E-business and Telecommunications - 4th International Conference, {ICETE} 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {23}, pages = {162--174}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88653-2\_12}, doi = {10.1007/978-3-540-88653-2\_12}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/Bar-YosefW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Bar-YosefW07, author = {Noa Bar{-}Yosef and Avishai Wool}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {Remote Algorithmic Complexity Attacks against Randomized Hash Tables}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {117--124}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Bar-YosefW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sisw/GeronW07, author = {Erel Geron and Avishai Wool}, title = {{CRUST:} Cryptographic Remote Untrusted Storage without Public Keys}, booktitle = {Fourth International {IEEE} Security in Storage Workshop, {SISW} 2007, San Diego, California, USA, September 27, 2007}, pages = {3--14}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SISW.2007.9}, doi = {10.1109/SISW.2007.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sisw/GeronW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waw/GonenRWW07, author = {Mira Gonen and Dana Ron and Udi Weinsberg and Avishai Wool}, editor = {Anthony Bonato and Fan R. K. Chung}, title = {Finding a Dense-Core in Jellyfish Graphs}, booktitle = {Algorithms and Models for the Web-Graph, 5th International Workshop, {WAW} 2007, San Diego, CA, USA, December 11-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4863}, pages = {29--40}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77004-6\_3}, doi = {10.1007/978-3-540-77004-6\_3}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/waw/GonenRWW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GeronW07, author = {Erel Geron and Avishai Wool}, title = {{CRUST:} Cryptographic Remote Untrusted Storage without Public Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2007}, url = {http://eprint.iacr.org/2007/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GeronW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/MayerWZ06, author = {Alain J. Mayer and Avishai Wool and Elisha Ziskind}, title = {Offline firewall analysis}, journal = {Int. J. Inf. Sec.}, volume = {5}, number = {3}, pages = {125--144}, year = {2006}, url = {https://doi.org/10.1007/s10207-005-0074-z}, doi = {10.1007/S10207-005-0074-Z}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/MayerWZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NebenzahlSW06, author = {Danny Nebenzahl and Shmuel Sagiv and Avishai Wool}, title = {Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {1}, pages = {78--90}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.14}, doi = {10.1109/TDSC.2006.14}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NebenzahlSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KoganSW06, author = {Noam Kogan and Yuval Shavitt and Avishai Wool}, title = {A practical revocation scheme for broadcast encryption using smartcards}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {3}, pages = {325--351}, year = {2006}, url = {https://doi.org/10.1145/1178618.1178622}, doi = {10.1145/1178618.1178622}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KoganSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BergerWY06, author = {Yigael Berger and Avishai Wool and Arie Yeredor}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Dictionary attacks using keyboard acoustic emanations}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {245--254}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180436}, doi = {10.1145/1180405.1180436}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BergerWY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ShakedW06, author = {Yaniv Shaked and Avishai Wool}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Cryptanalysis of the Bluetooth \emph{E}\({}_{\mbox{\emph{0}}}\) Cipher Using OBDD's}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {187--202}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_14}, doi = {10.1007/11836810\_14}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/ShakedW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KirschenbaumW06, author = {Ilan Kirschenbaum and Avishai Wool}, editor = {Angelos D. Keromytis}, title = {How to Build a Low-Cost, Extended-Range {RFID} Skimmer}, booktitle = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006}, publisher = {{USENIX} Association}, year = {2006}, url = {https://www.usenix.org/conference/15th-usenix-security-symposium/how-build-low-cost-extended-range-rfid-skimmer}, timestamp = {Mon, 01 Feb 2021 08:43:12 +0100}, biburl = {https://dblp.org/rec/conf/uss/KirschenbaumW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0611157, author = {Reuven Cohen and Mira Gonen and Avishai Wool}, title = {Bounding the Bias of Tree-Like Sampling in {IP} Topologies}, journal = {CoRR}, volume = {abs/cs/0611157}, year = {2006}, url = {http://arxiv.org/abs/cs/0611157}, eprinttype = {arXiv}, eprint = {cs/0611157}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0611157.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KirschenbaumW06, author = {Ilan Kirschenbaum and Avishai Wool}, title = {How to Build a Low-Cost, Extended-Range {RFID} Skimmer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2006}, url = {http://eprint.iacr.org/2006/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KirschenbaumW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShakedW06, author = {Yaniv Shaked and Avishai Wool}, title = {Cryptanalysis of the Bluetooth {E0} Cipher using OBDD's}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {72}, year = {2006}, url = {http://eprint.iacr.org/2006/072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShakedW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/Wool05, author = {Avishai Wool}, title = {Lightweight Key Management for {IEEE} 802.11 Wireless LANs with Key Refresh and Host Revocation}, journal = {Wirel. Networks}, volume = {11}, number = {6}, pages = {677--686}, year = {2005}, url = {https://doi.org/10.1007/s11276-005-3522-9}, doi = {10.1007/S11276-005-3522-9}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/Wool05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/BarBGW05, author = {Sagy Bar and Mira Gonen and Avishai Wool}, title = {A Geographic Directed Preferential Internet Topology Model}, booktitle = {13th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems {(MASCOTS} 2005), 27-29 September 2005, Atlanta, GA, {USA}}, pages = {325--328}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MASCOTS.2005.5}, doi = {10.1109/MASCOTS.2005.5}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/BarBGW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisys/ShakedW05, author = {Yaniv Shaked and Avishai Wool}, editor = {Kang G. Shin and David Kotz and Brian D. Noble}, title = {Cracking the Bluetooth {PIN}}, booktitle = {Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005, Seattle, Washington, USA, June 6-8, 2005}, pages = {39--50}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1067170.1067176}, doi = {10.1145/1067170.1067176}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisys/ShakedW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KfirW05, author = {Ziv Kfir and Avishai Wool}, title = {Picking Virtual Pockets using Relay Attacks on Contactless Smartcard}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {47--58}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.32}, doi = {10.1109/SECURECOMM.2005.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KfirW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LevyW05, author = {Ophir Levy and Avishai Wool}, title = {Uniform Framework for Cryptanalysis of the Bluetooth E{\unicode{8320}} Cipher}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {365--373}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.1}, doi = {10.1109/SECURECOMM.2005.1}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/LevyW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/storagess/NaorSW05, author = {Dalit Naor and Amir Shenhav and Avishai Wool}, editor = {Vijay Atluri and Pierangela Samarati and William Yurcik and Larry Brumbaugh and Yuanyuan Zhou}, title = {Toward securing untrusted storage without public-key operations}, booktitle = {Proceedings of the 2005 {ACM} Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005}, pages = {51--56}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103780.1103788}, doi = {10.1145/1103780.1103788}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/storagess/NaorSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0502061, author = {Sagy Bar and Mira Gonen and Avishai Wool}, title = {A Geographic Directed Preferential Internet Topology Model}, journal = {CoRR}, volume = {abs/cs/0502061}, year = {2005}, url = {http://arxiv.org/abs/cs/0502061}, eprinttype = {arXiv}, eprint = {cs/0502061}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0502061.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KfirW05, author = {Ziv Kfir and Avishai Wool}, title = {Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2005}, url = {http://eprint.iacr.org/2005/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KfirW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LevyW05, author = {Ophir Levy and Avishai Wool}, title = {A Uniform Framework for Cryptanalysis of the Bluetooth E\({}_{\mbox{0}}\) Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2005}, url = {http://eprint.iacr.org/2005/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LevyW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorSW05, author = {Dalit Naor and Amir Shenhav and Avishai Wool}, title = {One-Time Signatures Revisited: Have They Become Practical?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2005}, url = {http://eprint.iacr.org/2005/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Wool04, author = {Avishai Wool}, title = {The use and usability of direction-based filtering in firewalls}, journal = {Comput. Secur.}, volume = {23}, number = {6}, pages = {459--468}, year = {2004}, url = {https://doi.org/10.1016/j.cose.2004.02.003}, doi = {10.1016/J.COSE.2004.02.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Wool04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Wool04, author = {Avishai Wool}, title = {A Quantitative Study of Firewall Configuration Errors}, journal = {Computer}, volume = {37}, number = {6}, pages = {62--67}, year = {2004}, url = {https://doi.org/10.1109/MC.2004.2}, doi = {10.1109/MC.2004.2}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Wool04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ShavittSWY04, author = {Yuval Shavitt and Xiaodong Sun and Avishai Wool and B{\"{u}}lent Yener}, title = {Computing the unmeasured: an algebraic approach to Internet mapping}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {22}, number = {1}, pages = {67--78}, year = {2004}, url = {https://doi.org/10.1109/JSAC.2003.818796}, doi = {10.1109/JSAC.2003.818796}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ShavittSWY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/BartalMNW04, author = {Yair Bartal and Alain J. Mayer and Kobbi Nissim and Avishai Wool}, title = {\emph{Firmato}: {A} novel firewall management toolkit}, journal = {{ACM} Trans. Comput. Syst.}, volume = {22}, number = {4}, pages = {381--420}, year = {2004}, url = {https://doi.org/10.1145/1035582.1035583}, doi = {10.1145/1035582.1035583}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/BartalMNW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/Wool04, author = {Avishai Wool}, title = {A note on the fragility of the "Michael" message integrity code}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {3}, number = {5}, pages = {1459--1462}, year = {2004}, url = {https://doi.org/10.1109/TWC.2004.833470}, doi = {10.1109/TWC.2004.833470}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/Wool04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pam/BarGW04, author = {Sagy Bar and Mira Gonen and Avishai Wool}, editor = {Chadi Barakat and Ian Pratt}, title = {An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract}, booktitle = {Passive and Active Network Measurement, 5th International Workshop, {PAM} 2004, Antibes Juan-les-Pins, France, April 19-20, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3015}, pages = {53--62}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24668-8\_6}, doi = {10.1007/978-3-540-24668-8\_6}, timestamp = {Fri, 09 Apr 2021 18:47:18 +0200}, biburl = {https://dblp.org/rec/conf/pam/BarGW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NebenzahlW04, author = {Danny Nebenzahl and Avishai Wool}, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks}, booktitle = {Security and Protection in Information Processing Systems, {IFIP} 18th WorldComputer Congress, {TC11} 19th International Information Security Conference, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {147}, pages = {225--240}, publisher = {Kluwer / Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8143-X\_15}, doi = {10.1007/1-4020-8143-X\_15}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/NebenzahlW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/SongWY03, author = {Yueyue Song and Avishai Wool and B{\"{u}}lent Yener}, title = {Combinatorial design of multi-ring networks with combined routing and flow control}, journal = {Comput. Networks}, volume = {41}, number = {2}, pages = {247--267}, year = {2003}, url = {https://doi.org/10.1016/S1389-1286(02)00395-X}, doi = {10.1016/S1389-1286(02)00395-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/SongWY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KoganSW03, author = {Noam Kogan and Yuval Shavitt and Avishai Wool}, title = {A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards}, booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, pages = {225--235}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199339}, doi = {10.1109/SECPRI.2003.1199339}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/KoganSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Wool02, author = {Avishai Wool}, title = {Why security standards sometimes fail}, journal = {Commun. {ACM}}, volume = {45}, number = {12}, pages = {144}, year = {2002}, url = {https://doi.org/10.1145/585597.585626}, doi = {10.1145/585597.585626}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Wool02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/PelegW02, author = {David Peleg and Avishai Wool}, title = {How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems}, journal = {{SIAM} J. Discret. Math.}, volume = {15}, number = {3}, pages = {416--433}, year = {2002}, url = {https://doi.org/10.1137/S0895480198343819}, doi = {10.1137/S0895480198343819}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/PelegW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Wool02, author = {Avishai Wool}, title = {Combating the Perils of Port 80 at the Firewall}, journal = {login Usenix Mag.}, volume = {27}, number = {4}, year = {2002}, url = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/combating-perils-port-80-firewall}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Wool02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/MalkhiRWW01, author = {Dahlia Malkhi and Michael K. Reiter and Avishai Wool and Rebecca N. Wright}, title = {Probabilistic Quorum Systems}, journal = {Inf. Comput.}, volume = {170}, number = {2}, pages = {184--206}, year = {2001}, url = {https://doi.org/10.1006/inco.2001.3054}, doi = {10.1006/INCO.2001.3054}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/MalkhiRWW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShavittSWY01, author = {Yuval Shavitt and Xiaodong Sun and Avishai Wool and B{\"{u}}lent Yener}, title = {Computing the Unmeasured: An Algebraic Approach to Internet Mapping}, booktitle = {Proceedings {IEEE} {INFOCOM} 2001, The Conference on Computer Communications, Twentieth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Twenty years into the communications odyssey, Anchorage, Alaska, USA, April 22-26, 2001}, pages = {1646--1654}, publisher = {{IEEE} Comptuer Society}, year = {2001}, url = {https://doi.org/10.1109/INFCOM.2001.916661}, doi = {10.1109/INFCOM.2001.916661}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ShavittSWY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/Wool01, author = {Avishai Wool}, editor = {Mark Burgess}, title = {How Not to Configure Your Firewall: {A} Field Guide to Common Firewall Configurations}, booktitle = {Proceedings of the 15th Conference on Systems Administration {(LISA} 2001), San Diego, California, USA, December 2-7, 2001}, publisher = {{USENIX}}, year = {2001}, timestamp = {Wed, 04 Jul 2018 13:06:35 +0200}, biburl = {https://dblp.org/rec/conf/lisa/Wool01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Wool01, author = {Avishai Wool}, editor = {Dan S. Wallach}, title = {Architecting the Lumeta Firewall Analyzer}, booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington, D.C., {USA}}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/publications/library/proceedings/sec01/wool.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Wool01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/MalkhiRW00, author = {Dahlia Malkhi and Michael K. Reiter and Avishai Wool}, title = {The Load and Availability of Byzantine Quorum Systems}, journal = {{SIAM} J. Comput.}, volume = {29}, number = {6}, pages = {1889--1906}, year = {2000}, url = {https://doi.org/10.1137/S0097539797325235}, doi = {10.1137/S0097539797325235}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/MalkhiRW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Wool00, author = {Avishai Wool}, title = {Key management for encrypted broadcast}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {2}, pages = {107--134}, year = {2000}, url = {https://doi.org/10.1145/354876.354879}, doi = {10.1145/354876.354879}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Wool00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/AbdallaSW00, author = {Michel Abdalla and Yuval Shavitt and Avishai Wool}, title = {Key management for restricted multicast using broadcast encryption}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {8}, number = {4}, pages = {443--454}, year = {2000}, url = {https://doi.org/10.1109/90.865073}, doi = {10.1109/90.865073}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/AbdallaSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GaraySW00, author = {Juan A. Garay and Jessica Staddon and Avishai Wool}, editor = {Mihir Bellare}, title = {Long-Lived Broadcast Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {333--352}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_21}, doi = {10.1007/3-540-44598-6\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GaraySW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MayerWZ00, author = {Alain J. Mayer and Avishai Wool and Elisha Ziskind}, title = {Fang: {A} Firewall Analysis Engine}, booktitle = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000}, pages = {177--187}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SECPRI.2000.848455}, doi = {10.1109/SECPRI.2000.848455}, timestamp = {Thu, 21 Sep 2023 15:57:29 +0200}, biburl = {https://dblp.org/rec/conf/sp/MayerWZ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/GabberW99, author = {Eran Gabber and Avishai Wool}, title = {On location-restricted services}, journal = {{IEEE} Netw.}, volume = {13}, number = {6}, pages = {44--52}, year = {1999}, url = {https://doi.org/10.1109/65.806988}, doi = {10.1109/65.806988}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/GabberW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AbdallaSW99, author = {Michel Abdalla and Yuval Shavitt and Avishai Wool}, editor = {Matthew K. Franklin}, title = {Towards Making Broadcast Encryption Practical}, booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1648}, pages = {140--157}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48390-X\_11}, doi = {10.1007/3-540-48390-X\_11}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AbdallaSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BartalMNW99, author = {Yair Bartal and Alain J. Mayer and Kobbi Nissim and Avishai Wool}, title = {Firmato: {A} Novel Firewall Management Toolkit}, booktitle = {1999 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 9-12, 1999}, pages = {17--31}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/SECPRI.1999.766714}, doi = {10.1109/SECPRI.1999.766714}, timestamp = {Thu, 21 Sep 2023 15:57:37 +0200}, biburl = {https://dblp.org/rec/conf/sp/BartalMNW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-DC-9908011, author = {Dahlia Malkhi and Michael K. Reiter and Avishai Wool}, title = {The Load and Availability of Byzantine Quorum Systems}, journal = {CoRR}, volume = {cs.DC/9908011}, year = {1999}, url = {https://arxiv.org/abs/cs/9908011}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-DC-9908011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/GerstelWZ98, author = {Ornan Ori Gerstel and Avishai Wool and Shmuel Zaks}, title = {Optimal layouts on a chain {ATM} network}, journal = {Discret. Appl. Math.}, volume = {83}, number = {1-3}, pages = {157--178}, year = {1998}, url = {https://doi.org/10.1016/S0166-218X(98)80002-4}, doi = {10.1016/S0166-218X(98)80002-4}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/GerstelWZ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/Wool98, author = {Avishai Wool}, title = {Quorum Systems in Replicated Databases: Science or Fiction?}, journal = {{IEEE} Data Eng. Bull.}, volume = {21}, number = {4}, pages = {3--11}, year = {1998}, url = {http://sites.computer.org/debull/98dec/wool.ps}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/debu/Wool98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/AmirW98, author = {Yair Amir and Avishai Wool}, title = {Optimal Availability Quorum Systems: Theory and Practice}, journal = {Inf. Process. Lett.}, volume = {65}, number = {5}, pages = {223--228}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(98)00017-9}, doi = {10.1016/S0020-0190(98)00017-9}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/AmirW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/NaorW98, author = {Moni Naor and Avishai Wool}, title = {The Load, Capacity, and Availability of Quorum Systems}, journal = {{SIAM} J. Comput.}, volume = {27}, number = {2}, pages = {423--447}, year = {1998}, url = {https://doi.org/10.1137/S0097539795281232}, doi = {10.1137/S0097539795281232}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/NaorW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/NaorW98, author = {Moni Naor and Avishai Wool}, title = {Access Control and Signatures via Quorum Secret Sharing}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {9}, number = {9}, pages = {909--922}, year = {1998}, url = {https://doi.org/10.1109/71.722223}, doi = {10.1109/71.722223}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/NaorW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Wool98, author = {Avishai Wool}, editor = {Li Gong and Michael K. Reiter}, title = {Key Management for Encrypted broadcast}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {7--16}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288096}, doi = {10.1145/288090.288096}, timestamp = {Tue, 10 Nov 2020 20:00:11 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Wool98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GabberW98, author = {Eran Gabber and Avishai Wool}, editor = {Li Gong and Michael K. Reiter}, title = {How to Prove Where You Are: Tracking the Location of Customer Equipment}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {142--149}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288121}, doi = {10.1145/288090.288121}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GabberW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BeaverW98, author = {Donald Beaver and Avishai Wool}, editor = {Kaisa Nyberg}, title = {Quorum-Based Secure Multi-party Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {375--390}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054140}, doi = {10.1007/BFB0054140}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BeaverW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/MalkhiRWW98, author = {Dahlia Malkhi and Michael K. Reiter and Avishai Wool and Rebecca N. Wright}, editor = {Brian A. Coan and Yehuda Afek}, title = {Probabilistic Byzantine Quorum Systems}, booktitle = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June 28 - July 2, 1998}, pages = {321}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/277697.277781}, doi = {10.1145/277697.277781}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/MalkhiRWW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/AndersonBKW98, author = {Todd A. Anderson and Yuri Breitbart and Henry F. Korth and Avishai Wool}, editor = {Laura M. Haas and Ashutosh Tiwary}, title = {Replication, Consistency, and Practicality: Are These Mutually Exclusive?}, booktitle = {{SIGMOD} 1998, Proceedings {ACM} {SIGMOD} International Conference on Management of Data, June 2-4, 1998, Seattle, Washington, {USA}}, pages = {484--495}, publisher = {{ACM} Press}, year = {1998}, url = {https://doi.org/10.1145/276304.276347}, doi = {10.1145/276304.276347}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/AndersonBKW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/PelegSW97, author = {David Peleg and Gideon Schechtman and Avishai Wool}, title = {Randomized Approximation of Bounded Multicovering Problems}, journal = {Algorithmica}, volume = {18}, number = {1}, pages = {44--66}, year = {1997}, url = {https://doi.org/10.1007/BF02523687}, doi = {10.1007/BF02523687}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/PelegSW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/PelegW97, author = {David Peleg and Avishai Wool}, title = {The Availability of Crumbling Wall Quorum Systems}, journal = {Discret. Appl. Math.}, volume = {74}, number = {1}, pages = {69--83}, year = {1997}, url = {https://doi.org/10.1016/S0166-218X(96)00016-9}, doi = {10.1016/S0166-218X(96)00016-9}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/PelegW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/PelegW97, author = {David Peleg and Avishai Wool}, title = {Crumbling Walls: {A} Class of Practical and Efficient Quorum Systems}, journal = {Distributed Comput.}, volume = {10}, number = {2}, pages = {87--97}, year = {1997}, url = {https://doi.org/10.1007/s004460050027}, doi = {10.1007/S004460050027}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/PelegW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/MalkhiRW97, author = {Dahlia Malkhi and Michael K. Reiter and Avishai Wool}, editor = {James E. Burns and Hagit Attiya}, title = {The Load and Availability of Byzantine Quorum Systems}, booktitle = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles of Distributed Computing, Santa Barbara, California, USA, August 21-24, 1997}, pages = {249--257}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/259380.259450}, doi = {10.1145/259380.259450}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/MalkhiRW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaorW96, author = {Moni Naor and Avishai Wool}, editor = {Li Gong and Jacques Stearn}, title = {Access Control and Signatures via Quorum Secret Sharing}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {157--168}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238209}, doi = {10.1145/238168.238209}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaorW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ftcs/AmirW96, author = {Yair Amir and Avishai Wool}, title = {Evaluating Quorum Systems over the Internet}, booktitle = {Digest of Papers: FTCS-26, The Twenty-Sixth Annual International Symposium on Fault-Tolerant Computing, Sendai, Japan, June 25-27, 1996}, pages = {26--35}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/FTCS.1996.534591}, doi = {10.1109/FTCS.1996.534591}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ftcs/AmirW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/PelegW96, author = {David Peleg and Avishai Wool}, editor = {James E. Burns and Yoram Moses}, title = {How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract)}, booktitle = {Proceedings of the Fifteenth Annual {ACM} Symposium on Principles of Distributed Computing, Philadelphia, Pennsylvania, USA, May 23-26, 1996}, pages = {290--299}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/248052.248112}, doi = {10.1145/248052.248112}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/PelegW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/AmirW96, author = {Yair Amir and Avishai Wool}, editor = {James E. Burns and Yoram Moses}, title = {Evaluating Quorum Systems Over the Internet (Abstract)}, booktitle = {Proceedings of the Fifteenth Annual {ACM} Symposium on Principles of Distributed Computing, Philadelphia, Pennsylvania, USA, May 23-26, 1996}, pages = {344}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/248052.248125}, doi = {10.1145/248052.248125}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/AmirW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaorW96, author = {Moni Naor and Avishai Wool}, title = {Access Control and Signatures via Quorum Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {1996}, url = {http://eprint.iacr.org/1996/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaorW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/PelegW95, author = {David Peleg and Avishai Wool}, title = {The Availability of Quorum Systems}, journal = {Inf. Comput.}, volume = {123}, number = {2}, pages = {210--223}, year = {1995}, url = {https://doi.org/10.1006/inco.1995.1169}, doi = {10.1006/INCO.1995.1169}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/PelegW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esa/GerstelWZ95, author = {Ornan Ori Gerstel and Avishai Wool and Shmuel Zaks}, editor = {Paul G. Spirakis}, title = {Optimal Layouts on a Chain {ATM} Network (Extended Abstract)}, booktitle = {Algorithms - {ESA} '95, Third Annual European Symposium, Corfu, Greece, September 25-27, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {979}, pages = {508--522}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60313-1\_167}, doi = {10.1007/3-540-60313-1\_167}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/esa/GerstelWZ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/PelegW95, author = {David Peleg and Avishai Wool}, editor = {James H. Anderson}, title = {Crumbling Walls: {A} Class of Practical and Efficient Quorum Systems (Extended Abstract)}, booktitle = {Proceedings of the Fourteenth Annual {ACM} Symposium on Principles of Distributed Computing, Ottawa, Ontario, Canada, August 20-23, 1995}, pages = {120--129}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/224964.224978}, doi = {10.1145/224964.224978}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/PelegW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/NaorW94, author = {Moni Naor and Avishai Wool}, title = {The Load, Capacity and Availability of Quorum Systems}, booktitle = {35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994}, pages = {214--225}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/SFCS.1994.365692}, doi = {10.1109/SFCS.1994.365692}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/NaorW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/istcs/PelegSW93, author = {David Peleg and Gideon Schechtman and Avishai Wool}, title = {Approximating Bounded 0-1 Integer Linear Programs}, booktitle = {Second Israel Symposium on Theory of Computing Systems, {ISTCS} 1993, Natanya, Israel, June 7-9, 1993, Proceedings}, pages = {69--77}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/ISTCS.1993.253482}, doi = {10.1109/ISTCS.1993.253482}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/istcs/PelegSW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.