Bar-Ilan

Results: 227



#Item
91Network architecture / Domain Name System Security Extensions / DNS spoofing / Name server / Root name server / Extension mechanisms for DNS / Denial-of-service attack / Anycast / Load balancing / Internet / Computing / Domain name system

Fragmentation Considered Poisonous arXiv:1205.4011v1 [cs.CR] 17 May 2012 Amir Herzberg† and Haya Shulman‡ Dept. of Computer Science, Bar Ilan University

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-05-23 11:56:51
92

Bar-Ilan University Theoretical concepts and application of a Rotating disk electrode (RDE) and Rotating Ring disk electrode

Add to Reading List

Source URL: www.inrep.co.il

Language: English - Date: 2014-10-27 06:02:21
    93

    Do blog citations correlate with a higher number of future citations? Research blogs as a potential source for alternative metrics1 Hadas Shema*, Judit Bar-Ilan* and Mike Thelwall** *; dassysh@gm

    Add to Reading List

    Source URL: www.scit.wlv.ac.uk

    Language: English - Date: 2013-06-20 11:39:52
      94Human behavior / Revised NEO Personality Inventory / Big Five personality traits / Trait theory / Technology acceptance model / Social networking service / Facebook / Social media / Neuroticism / Personality traits / Personality / Mind

      Factors Affecting the Adoption of Facebook by Information Professionals Noa Aharony Department of Information Science Bar-Ilan University, Israel

      Add to Reading List

      Source URL: www.asis.org

      Language: English - Date: 2014-07-19 18:51:51
      95

      Approximate Parameterized Matching CARMIT HAZAY AND MOSHE LEWENSTEIN Bar-Ilan University AND DINA SOKOL

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-09-16 05:40:32
        96String matching algorithms / Analysis of algorithms / Donald Knuth / Knuth–Morris–Pratt algorithm / String searching algorithm / Matching / Time complexity / Suffix tree / Theoretical computer science / Computational complexity theory / Applied mathematics

        Approximate Parameterized Matching CARMIT HAZAY AND MOSHE LEWENSTEIN Bar-Ilan University AND DINA SOKOL

        Add to Reading List

        Source URL: www.eng.biu.ac.il

        Language: English - Date: 2014-09-16 05:40:32
        97Digital signature / RSA / Random oracle / Commitment scheme / Cryptographic protocol / Model theory / XTR / Cryptography / Public-key cryptography / Blind signature

        Concurrently-Secure Blind Signatures without Random Oracles or Setup Assumptions? Carmit Hazay1 , Jonathan Katz2 , Chiu-Yuen Koo2 , and Yehuda Lindell1 1 Bar-Ilan University.

        Add to Reading List

        Source URL: www.eng.biu.ac.il

        Language: English - Date: 2014-09-16 08:30:47
        98

        Off-Path Attacking the Web Yossi Gilad and Amir Herzberg Computer Science Department, Bar Ilan University WOOT’12 presentation

        Add to Reading List

        Source URL: www.usenix.org

        - Date: 2014-02-27 22:49:53
          99

          An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Benny Pinkas University of Haifa Yehuda Lindell, Bar-Ilan University

          Add to Reading List

          Source URL: www.iacr.org

          - Date: 2007-06-12 08:51:42
            100

            Brigitta R. Schvarcz & Susan Rothstein Bar-Ilan University Hungarian classifier constructions and the mass/count distinction 1. The problem: Hungarian poses a problem for theories of mass/count . It has individuating cla

            Add to Reading List

            Source URL: media.leidenuniv.nl

            Language: English - Date: 2015-03-03 10:26:03
              UPDATE