| 2009 | ||
|---|---|---|
| 61 | Avishai Wool: Firewall Configuration Errors Revisited CoRR abs/0911.1240: (2009) | |
| 60 | Erel Geron, Avishai Wool: CRUST: cryptographic remote untrusted storage without public keys. Int. J. Inf. Sec. 8(5): 357-377 (2009) | |
| 2008 | ||
| 59 | Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool: Finding a dense-core in Jellyfish graphs. Computer Networks 52(15): 2831-2841 (2008) | |
| 2007 | ||
| 58 | Noa Bar-Yosef, Avishai Wool: Remote Algorithmic Complexity Attacks against Randomized Hash Tables. SECRYPT 2007: 117-124 | |
| 57 | Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool: Finding a Dense-Core in Jellyfish Graphs. WAW 2007: 29-40 | |
| 56 | Sagy Bar, Mira Gonen, Avishai Wool: A geographic directed preferential internet topology model. Computer Networks 51(14): 4174-4188 (2007) | |
| 2006 | ||
| 55 | Yigael Berger, Avishai Wool, Arie Yeredor: Dictionary attacks using keyboard acoustic emanations. ACM Conference on Computer and Communications Security 2006: 245-254 | |
| 54 | Yaniv Shaked, Avishai Wool: Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. ISC 2006: 187-202 | |
| 53 | Noam Kogan, Yuval Shavitt, Avishai Wool: A practical revocation scheme for broadcast encryption using smartcards. ACM Trans. Inf. Syst. Secur. 9(3): 325-351 (2006) | |
| 52 | Reuven Cohen, Mira Gonen, Avishai Wool: Bounding the Bias of Tree-Like Sampling in IP Topologies CoRR abs/cs/0611157: (2006) | |
| 51 | Danny Nebenzahl, Shmuel Sagiv, Avishai Wool: Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. IEEE Trans. Dependable Sec. Comput. 3(1): 78-90 (2006) | |
| 50 | Alain J. Mayer, Avishai Wool, Elisha Ziskind: Offline firewall analysis. Int. J. Inf. Sec. 5(3): 125-144 (2006) | |
| 2005 | ||
| 49 | Sagy Bar, Mira Gonen, Avishai Wool: A Geographic Directed Preferential Internet Topology Model. MASCOTS 2005: 325-328 | |
| 48 | Yaniv Shaked, Avishai Wool: Cracking the Bluetooth PIN. MobiSys 2005: 39-50 | |
| 47 | Dalit Naor, Amir Shenhav, Avishai Wool: Toward securing untrusted storage without public-key operations. StorageSS 2005: 51-56 | |
| 46 | Sagy Bar, Mira Gonen, Avishai Wool: A Geographic Directed Preferential Internet Topology Model CoRR abs/cs/0502061: (2005) | |
| 45 | Avishai Wool: Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. Wireless Networks 11(6): 677-686 (2005) | |
| 2004 | ||
| 44 | Sagy Bar, Mira Gonen, Avishai Wool: An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract. PAM 2004: 53-62 | |
| 43 | Danny Nebenzahl, Avishai Wool: Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks. SEC 2004: 225-240 | |
| 42 | Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool: Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4): 381-420 (2004) | |
| 41 | Avishai Wool: The use and usability of direction-based filtering in firewalls. Computers & Security 23(6): 459-468 (2004) | |
| 40 | Avishai Wool: A Quantitative Study of Firewall Configuration Errors. IEEE Computer 37(6): 62-67 (2004) | |
| 39 | Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener: Computing the unmeasured: an algebraic approach to Internet mapping. IEEE Journal on Selected Areas in Communications 22(1): 67-78 (2004) | |
| 2003 | ||
| 38 | Noam Kogan, Yuval Shavitt, Avishai Wool: A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. IEEE Symposium on Security and Privacy 2003: 225-235 | |
| 37 | Yueyue Song, Avishai Wool, Bülent Yener: Combinatorial design of multi-ring networks with combined routing and flow control. Computer Networks 41(2): 247-267 (2003) | |
| 2002 | ||
| 36 | Avishai Wool: Why security standards sometimes fail. Commun. ACM 45(12): 144 (2002) | |
| 35 | David Peleg, Avishai Wool: How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems. SIAM J. Discrete Math. 15(3): 416-433 (2002) | |
| 2001 | ||
| 34 | Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener: Computing the Unmeasured: An Algebraic Approach to Internet Mapping. INFOCOM 2001: 1646-1654 | |
| 33 | Avishai Wool: How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. LISA 2001 | |
| 32 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001) | |
| 2000 | ||
| 31 | Juan A. Garay, Jessica Staddon, Avishai Wool: Long-Lived Broadcast Encryption. CRYPTO 2000: 333-352 | |
| 30 | Alain J. Mayer, Avishai Wool, Elisha Ziskind: Fang: A Firewall Analysis Engine. IEEE Symposium on Security and Privacy 2000: 177-187 | |
| 29 | Avishai Wool: Key management for encrypted broadcast. ACM Trans. Inf. Syst. Secur. 3(2): 107-134 (2000) | |
| 28 | Michel Abdalla, Yuval Shavitt, Avishai Wool: Key management for restricted multicast using broadcast encryption. IEEE/ACM Trans. Netw. 8(4): 443-454 (2000) | |
| 27 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems. SIAM J. Comput. 29(6): 1889-1906 (2000) | |
| 1999 | ||
| 26 | Michel Abdalla, Yuval Shavitt, Avishai Wool: Towards Making Broadcast Encryption Practical. Financial Cryptography 1999: 140-157 | |
| 25 | Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool: Firmato: A Novel Firewall Management Toolkit. IEEE Symposium on Security and Privacy 1999: 17-31 | |
| 24 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems CoRR cs.DC/9908011: (1999) | |
| 1998 | ||
| 23 | Eran Gabber, Avishai Wool: How to Prove Where You Are: Tracking the Location of Customer Equipment. ACM Conference on Computer and Communications Security 1998: 142-149 | |
| 22 | Avishai Wool: Key Management for Encrypted broadcast. ACM Conference on Computer and Communications Security 1998: 7-16 | |
| 21 | Donald Beaver, Avishai Wool: Quorum-Based Secure Multi-party Computation. EUROCRYPT 1998: 375-390 | |
| 20 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright: Probabilistic Byzantine Quorum Systems. PODC 1998: 321 | |
| 19 | Todd A. Anderson, Yuri Breitbart, Henry F. Korth, Avishai Wool: Replication, Consistency, and Practicality: Are These Mutually Exclusive? SIGMOD Conference 1998: 484-495 | |
| 18 | Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks: Optimal layouts on a chain ATM network. Discrete Applied Mathematics 83(1-3): 157-178 (1998) | |
| 17 | Avishai Wool: Quorum Systems in Replicated Databases: Science or Fiction? IEEE Data Eng. Bull. 21(4): 3-11 (1998) | |
| 16 | Moni Naor, Avishai Wool: Access Control and Signatures via Quorum Secret Sharing. IEEE Trans. Parallel Distrib. Syst. 9(9): 909-922 (1998) | |
| 15 | Yair Amir, Avishai Wool: Optimal Availability Quorum Systems: Theory and Practice. Inf. Process. Lett. 65(5): 223-228 (1998) | |
| 14 | Moni Naor, Avishai Wool: The Load, Capacity, and Availability of Quorum Systems. SIAM J. Comput. 27(2): 423-447 (1998) | |
| 1997 | ||
| 13 | Dahlia Malkhi, Michael K. Reiter, Avishai Wool: The Load and Availability of Byzantine Quorum Systems. PODC 1997: 249-257 | |
| 12 | David Peleg, Gideon Schechtman, Avishai Wool: Randomized Approximation of Bounded Multicovering Problems. Algorithmica 18(1): 44-66 (1997) | |
| 11 | David Peleg, Avishai Wool: The Availability of Crumbling Wall Quorum Systems. Discrete Applied Mathematics 74(1): 69-83 (1997) | |
| 10 | David Peleg, Avishai Wool: Crumbling Walls: A Class of Practical and Efficient Quorum Systems. Distributed Computing 10(2): 87-97 (1997) | |
| 1996 | ||
| 9 | Moni Naor, Avishai Wool: Access Control and Signatures via Quorum Secret Sharing. ACM Conference on Computer and Communications Security 1996: 157-168 | |
| 8 | Yair Amir, Avishai Wool: Evaluating Quorum Systems over the Internet. FTCS 1996: 26-35 | |
| 7 | David Peleg, Avishai Wool: How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract). PODC 1996: 290-299 | |
| 6 | Yair Amir, Avishai Wool: Evaluating Quorum Systems Over the Internet (Abstract). PODC 1996: 344 | |
| 1995 | ||
| 5 | Ornan Ori Gerstel, Avishai Wool, Shmuel Zaks: Optimal Layouts on a Chain ATM Network (Extended Abstract). ESA 1995: 508-522 | |
| 4 | David Peleg, Avishai Wool: Crumbling Walls: A Class of Practical and Efficient Quorum Systems (Extended Abstract). PODC 1995: 120-129 | |
| 3 | David Peleg, Avishai Wool: The Availability of Quorum Systems. Inf. Comput. 123(2): 210-223 (1995) | |
| 1994 | ||
| 2 | Moni Naor, Avishai Wool: The Load, Capacity and Availability of Quorum Systems FOCS 1994: 214-225 | |
| 1993 | ||
| 1 | David Peleg, Gideon Schechtman, Avishai Wool: Approximating Bounded 0-1 Integer Linear Programs. ISTCS 1993: 69-77 | |