Gilad

Results: 199



#Item
1Internet / Computing / Cyberwarfare / Internet security / Computer network security / Internet Standards / Internet protocols / Transmission Control Protocol / Denial-of-service attack / TCP reset attack / IP address spoofing / Internet protocol suite

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-22 02:35:33
2Cryptocurrencies / Cryptography / Bitcoin / Computing / Decentralization / Economy / Alternative currencies / Proof-of-stake / Blockchain / Cryptographic hash function / Consensus / Sortition

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL ABSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
3

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL ABSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
    4

    APPLICATIONS OF HOMOMORPHIC ENCRYPTION David Archer, Lily Chen, Jung Hee Cheon, Ran Gilad-Bachrach, Roger A. Hallman, Zhicong Huang, Xiaoqian Jiang, Ranjit Kumaresan, Bradley A. Malin, Heidi Sofia, Yongsoo Song, Shuang W

    Add to Reading List

    Source URL: homomorphicencryption.org

    Language: English - Date: 2017-08-08 14:29:13
      5

      Working Paper : PEACE FOR SEEDS Topic: Land Settlement Sponsors (in alphabetical order): Gilad Erdan, Yechiel Letier, Zeev- Yair Jabotinsk Limor Livnat Efraim Even, Habib Signatories: Safi Rivlin, Prosper Azot, Karen Ba

      Add to Reading List

      Source URL: www.ruair.org

      Language: English - Date: 2013-01-23 01:02:37
        6

        SYMMETRY-BASED MITOSIS DETECTION IN TIME-LAPSE MICROSCOPY Topaz Gilad  Mark-Anthony Bray†

        Add to Reading List

        Source URL: www.ee.bgu.ac.il

        Language: English - Date: 2015-11-04 03:04:07
          7

          One Hop for RPKI, One Giant Leap for BGP Security Avichai Cohen Yossi Gilad The Hebrew University of

          Add to Reading List

          Source URL: conferences.sigcomm.org

          - Date: 2015-10-30 12:23:54
            8

            Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2015-07-29 01:21:17
              9

              Pluggable Type Systems Gilad Bracha Copyright Gilad Bracha

              Add to Reading List

              Source URL: bracha.org

              - Date: 2004-10-17 22:47:03
                10

                Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations Gilad Asharov∗ Moni Naor†

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-03-07 02:09:32
                  UPDATE