Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time S Dolev, N Gilboa, M Kopeetsky Proceedings of the 2010 ACM Symposium on Applied Computing, 1460-1465, 2010 | 24 | 2010 |
RFID authentication efficient proactive information security within computational security S Dolev, M Kopeetsky, A Shamir Theory of Computing Systems 48 (1), 132-149, 2011 | 20 | 2011 |
Efficient private multi-party computations of trust in the presence of curious and malicious users S Dolev, N Gilboa, M Kopeetsky Journal of Trust Management 1, 1-21, 2014 | 18 | 2014 |
Method, apparatus and product for RFID authentication S Dolev, M Kopeetsky, A Shamir US Patent 8,332,645, 2012 | 14 | 2012 |
Secure communication for RFIDs proactive information security within computational security S Dolev, M Kopeetsky Symposium on Self-Stabilizing Systems, 290-303, 2006 | 11 | 2006 |
Information security for sensors by overwhelming random sequences and permutations S Dolev, N Gilboa, M Kopeetsky, G Persiano, PG Spirakis Ad hoc networks 12, 193-200, 2014 | 6* | 2014 |
Lempel-Ziv-welch compression algorithm with exponential decay S Frenkel, M Kopeetsky, R Molotkovski 2016 Second International Symposium on Stochastic Models in Reliability …, 2016 | 5 | 2016 |
Entropy adaptive on-line compression S Dolev, S Frenkel, M Kopeetsky 2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014 | 4 | 2014 |
Low overhead RFID security S Dolev, M Kopeetsky, T Clouser, M Nesterenko RFID Handbook, 589-602, 2017 | 3 | 2017 |
Method for attribute based broadcast encryption with permanent revocation S Dolev, N Gilboa, M Kopeetsky US Patent 9,413,528, 2016 | 3 | 2016 |
Permanent revocation in attribute based broadcast encryption S Dolev, N Gilboa, M Kopeetsky 2012 International Conference on Cyber Security, 203-208, 2012 | 3 | 2012 |
Computing trust anonymously in the presence of curious users S Dolev, N Gilboa, M Kopeetsky Proceedings of the international symposium on stochastic models in …, 2010 | 3 | 2010 |
Brief announcement: Entropy adaptive on-line compression S Dolev, S Frenkel, M Kopeetsky Stabilization, Safety and Security of Distributed Systems, 366-368, 2014 | 2 | 2014 |
Anonymous transactions in computer networks S Dolev, M Kopeetsky Symposium on Self-Stabilizing Systems, 297-310, 2009 | 2 | 2009 |
Influence of ATM/IP traffic on power transients in optical networks M Kopeetsky, Y Ben-Ezra, B Lembrikov Journal of Optical Networking 4 (2), 82-91, 2005 | 2 | 2005 |
Analysis of Cell Delineation protocol in ATM network M Kopeetsky 21st IEEE Convention of the Electrical and Electronic Engineers in Israel …, 2000 | 2 | 2000 |
Performance improvement of Lempel–Ziv–Welch compression algorithm SL Frenkel, M Kopeetsky, R Molotkovski, P Borovsky Информатика и её применения 9 (4), 78-84, 2015 | 1 | 2015 |
Exploiting simultaneous usage of different wireless interfaces for security and mobility S Dolev, IH Shtacher, B Shapira, Y Elovici, G Messalem, D Mimran, ... Second International Conference on Future Generation Communication …, 2013 | 1 | 2013 |
Anonymous transactions in computer networks S Dolev, M Kopeetsky ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2), 1-14, 2012 | 1 | 2012 |
Poster: attribute based broadcast encryption with permanent revocation S Dolev, N Gilboa, M Kopeetsky Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 1 | 2011 |