Avishai Wool
Avishai Wool
Professor of Computer Engineering, Tel Aviv University
Verified email at eng.tau.ac.il - Homepage
Cited by
Cited by
Firmato: A novel firewall management toolkit
Y Bartal, A Mayer, K Nissim, A Wool
ACM Transactions on Computer Systems (TOCS) 22 (4), 381-420, 2004
A quantitative study of firewall configuration errors
A Wool
Computer 37 (6), 62-67, 2004
Offline firewall analysis
A Mayer, A Wool, E Ziskind
International Journal of Information Security 5 (3), 125-144, 2006
Picking virtual pockets using relay attacks on contactless smartcard
Z Kfir, A Wool
First International Conference on Security and Privacy for Emerging Areas in …, 2005
The load, capacity and availability of quorum systems.
M Naor, A Wool
SIAM J. Computing 27 (2), 423-447, 1998
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
N Goldenberg, A Wool
international journal of critical infrastructure protection 6 (2), 63-75, 2013
Cracking the bluetooth pin
Y Shaked, A Wool
Proceedings of the 3rd international conference on Mobile systems …, 2005
Probabilistic quorum systems
D Malkhi, MK Reiter, A Wool, RN Wright
Information and Computation 170 (2), 184-206, 2001
Key management for encrypted broadcast
A Wool
ACM Transactions on Information and System Security (TISSEC) 3 (2), 107-134, 2000
Computational experience with approximation algorithms for the set covering problem
T Grossman, A Wool
European Journal of Operational Research 101 (1), 81-92, 1997
The availability of quorum systems
D Peleg, A Wool
Information and Computation 123 (2), 210-223, 1995
Long-lived broadcast encryption
J Garay, J Staddon, A Wool
Advances in Cryptology—CRYPTO 2000, 333-352, 2000
Replication, consistency, and practicality: are these mutually exclusive?
T Anderson, Y Breitbart, HF Korth, A Wool
Proceedings of the 1998 ACM SIGMOD international conference on Management of …, 1998
Dictionary attacks using keyboard acoustic emanations
Y Berger, A Wool, A Yeredor
Proceedings of the 13th ACM conference on Computer and communications …, 2006
Architecting the lumeta firewall analyzer
A Wool
Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, 7-7, 2001
Key management for restricted multicast using broadcast encryption
M Abdalla, Y Shavitt, A Wool
Networking, IEEE/ACM Transactions on 8 (4), 443-454, 2000
Computing the unmeasured: An algebraic approach to Internet mapping
Y Shavitt, X Sun, A Wool, B Yener
IEEE Journal on Selected Areas in Communications 22 (1), 67-78, 2004
Crumbling walls: A class of practical and efficient quorum systems
D Peleg, A Wool
Distributed Computing 10 (2), 87-97, 1997
How to build a low-cost, extended-range RFID skimmer.
I Kirschenbaum, A Wool
15th USENIX Security Symposium, 43-57, 2006
Access control and signatures via quorum secret sharing
M Naor, A Wool
Parallel and Distributed Systems, IEEE Transactions on 9 (9), 909-922, 1998
The system can't perform the operation now. Try again later.
Articles 1–20