Search results for: Avishai Wool
Vehicular Communications > 2017 > 9 > C > 43-52
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2000 > Traitor Tracing and Broadcast Encryption > 333-352
IFIP — The International Federation for Information Processing > Security and Protection in Information Processing Systems > 225-240
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems, CHES 2010 > Side-Channel Attacks and Countermeasures II > 428-442
Lecture Notes in Computer Science > Passive and Active Network Measurement > Session 2: Network Optimization > 53-62
Communications in Computer and Information Science > E-business and Telecommunications > Part II: SECRYPT > 162-174
IFIP — The International Federation for Information Processing > Security and Protection in Information Processing Systems > 225-240
Constraints > 2016 > 21 > 4 > 616-645
Physical Communication > 2015 > 17 > C > 149-164
International Journal of Information Security > 2015 > 14 > 1 > 85-99
IEEE Pervasive Computing > 2014 > 13 > 2 > 52 - 60