Follow
Ariel Waissbein
Ariel Waissbein
CoinFabrik, BitTrap, UNDEF
Verified email at bittrap.com
Title
Cited by
Cited by
Year
Establishing and enforcing security and privacy policies in web-based applications
A Futoransky, A Waissbein, DB Tiscornia, E Gutesman
US Patent 7,831,995, 2010
1282010
Deformation techniques for efficient polynomial equation solving
J Heintz, T Krick, S Puddu, J Sabia, A Waissbein
journal of complexity 16 (1), 70-109, 2000
822000
On the time–space complexity of geometric elimination procedures
J Heintz, G Matera, A Waissbein
Applicable Algebra in Engineering, Communication and Computing 11, 239-296, 2001
592001
System and method for providing automated computer security compromise as a service
A Futoransky, AE Calvo, FRF Russ, JL Obes, A Waissbein, AJ Frydman, ...
US Patent 9,183,397, 2015
502015
System and method for providing application penetration testing
AGS Testa, GG Richarte, FF Russ, DM Kelyacoubian, A Futoransky, ...
US Patent 8,484,738, 2013
502013
Security framework for protecting rights in computer software
A Futoransky, CES Yamada, DA Bendersky, L Notarfrancesco, ...
US Patent 7,549,147, 2009
482009
Deformation techniques for sparse systems
G Jeronimo, G Matera, P Solerno, A Waissbein
Foundations of Computational Mathematics 9 (1), 1-50, 2009
432009
A dynamic technique for enhancing the security and privacy of web applications
A Futoransky, E Gutesman, A Waissbein
Proc. Black Hat USA, 2007
372007
Foundations and applications for secure triggers
A Futoransky, E Kargieman, C Sarraute, A Waissbein
ACM Transactions on Information and System Security (TISSEC) 9 (1), 94-112, 2006
242006
Establishing and enforcing security and privacy policies in web-based applications
A Waissbein, A Futoransky, DB Tiscornia, ED Gutesman
US Patent 8,146,135, 2012
222012
The ND2DB Attack: Database Content Extraction Using Timing Attacks on the Indexing Algorithms.
A Futoransky, D Saura, A Waissbein
WOOT, 2007
142007
Polynomial equation solving by lifting procedures for ramified fibers
A Bompadre, G Matera, R Wachenchauzer, A Waissbein
Theoretical computer science 315 (2-3), 335-369, 2004
132004
Advanced software protection now
D Bendersky, A Futoransky, L Notarfrancesco, C Sarraute, A Waissbein
arXiv preprint arXiv:1006.2356, 2010
102010
Inverting bijective polynomial maps over finite fields
A Cafure, G Matera, A Waissbein
2006 IEEE Information Theory Workshop-ITW'06 Punta del Este, 27-31, 2006
92006
The impact of predicting attacker tools in security risk assessments
E Gutesman, A Waissbein
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
82010
Fair and decentralized exchange of digital goods
A Futoransky, C Sarraute, D Fernandez, M Travizano, A Waissbein
arXiv preprint arXiv:2002.09689, 2020
72020
Wavelets and semi–algebraic sets
L Lehmann, A Waissbein
Proceedings of WAIT, 2001
72001
Secure exchange of digital goods in a decentralized data marketplace
A Futoransky, C Sarraute, A Waissbein, D Fernandez, M Travizano, ...
arXiv preprint arXiv:1907.12625, 2019
52019
WibsonTree: Efficiently Preserving Seller's Privacy in a Decentralized Data Marketplace
A Futoransky, C Sarraute, A Waissbein, M Travizano, D Fernandez
arXiv preprint arXiv:2002.03810, 2020
42020
Robust algorithms for generalized Pham systems
E Dratman, G Matera, A Waissbein
computational complexity 18 (1), 105-154, 2009
42009
The system can't perform the operation now. Try again later.
Articles 1–20