Yossi

Results: 141



#Item
11  Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-22 02:35:33
2/nas/dft/ire/yossi/RiskLensPaper/Paper/Figures/uncon_corr.eps

/nas/dft/ire/yossi/RiskLensPaper/Paper/Figures/uncon_corr.eps

Add to Reading List

Source URL: www.twosigma.com

Language: English - Date: 2018-10-04 15:27:11
3Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL  ABSTRACT

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL ABSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
4Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL  ABSTRACT

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL ABSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
    5Min-cost Matching with Delays Itai Ashlagi  Yossi Azar

    Min-cost Matching with Delays Itai Ashlagi Yossi Azar

    Add to Reading List

    Source URL: www.tik.ee.ethz.ch

    Language: English - Date: 2018-05-04 09:19:10
      6Collaborate With Strangers to Find Own Preferences∗ Extended Abstract Baruch Awerbuch† Yossi Azar‡

      Collaborate With Strangers to Find Own Preferences∗ Extended Abstract Baruch Awerbuch† Yossi Azar‡

      Add to Reading List

      Source URL: www.markrtuttle.com

      Language: English - Date: 2007-04-26 00:00:00
        7Website-Targeted False Content Injection by Network Operators  arXiv:1602.07128v1 [cs.CR] 23 Feb 2016 Gabi Nakibly1,3 , Jaime Schcolnik2 , and Yossi Rubin3 1 Computer Science Department, Technion, Haifa, Israel

        Website-Targeted False Content Injection by Network Operators arXiv:1602.07128v1 [cs.CR] 23 Feb 2016 Gabi Nakibly1,3 , Jaime Schcolnik2 , and Yossi Rubin3 1 Computer Science Department, Technion, Haifa, Israel

        Add to Reading List

        Source URL: arxiv.org

        Language: English - Date: 2016-02-23 20:52:48
        8One Hop for RPKI, One Giant Leap for BGP Security Avichai Cohen Yossi Gilad  The Hebrew University of

        One Hop for RPKI, One Giant Leap for BGP Security Avichai Cohen Yossi Gilad The Hebrew University of

        Add to Reading List

        Source URL: conferences.sigcomm.org

        - Date: 2015-10-30 12:23:54
          9Oracle Complexity of Second-Order Methods for Finite-Sum Problems  Yossi Arjevani 1 Ohad Shamir 1 Abstract

          Oracle Complexity of Second-Order Methods for Finite-Sum Problems Yossi Arjevani 1 Ohad Shamir 1 Abstract

          Add to Reading List

          Source URL: proceedings.mlr.press

          - Date: 2018-02-06 15:06:57
            10How to Phone Home with Someone Else’s Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz and Yossi Oren Faculty of Engineering Sciences,

            How to Phone Home with Someone Else’s Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz and Yossi Oren Faculty of Engineering Sciences,

            Add to Reading List

            Source URL: iss.oy.ne.ro