Yossi

Results: 141



#Item
1Internet / Computing / Cyberwarfare / Internet security / Computer network security / Internet Standards / Internet protocols / Transmission Control Protocol / Denial-of-service attack / TCP reset attack / IP address spoofing / Internet protocol suite

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-22 02:35:33
2Economy / Finance / Money / Financial risk modeling / Actuarial science / Financial markets / Financial risk / Investment management / Portfolio optimization / Asset allocation / Asset classes / Market risk

/nas/dft/ire/yossi/RiskLensPaper/Paper/Figures/uncon_corr.eps

Add to Reading List

Source URL: www.twosigma.com

Language: English - Date: 2018-10-04 15:27:11
3Cryptocurrencies / Cryptography / Bitcoin / Computing / Decentralization / Economy / Alternative currencies / Proof-of-stake / Blockchain / Cryptographic hash function / Consensus / Sortition

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL ABSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
4

Algorand: Scaling Byzantine Agreements for Cryptocurrencies Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich MIT CSAIL ABSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
    5

    Min-cost Matching with Delays Itai Ashlagi Yossi Azar

    Add to Reading List

    Source URL: www.tik.ee.ethz.ch

    Language: English - Date: 2018-05-04 09:19:10
      6

      Collaborate With Strangers to Find Own Preferences∗ Extended Abstract Baruch Awerbuch† Yossi Azar‡

      Add to Reading List

      Source URL: www.markrtuttle.com

      Language: English - Date: 2007-04-26 00:00:00
        7Computer network security / Computer security / Cyberwarfare / Computing / Packet injection / Transmission Control Protocol / Computer network / TCP reset attack / Stateful firewall

        Website-Targeted False Content Injection by Network Operators arXiv:1602.07128v1 [cs.CR] 23 Feb 2016 Gabi Nakibly1,3 , Jaime Schcolnik2 , and Yossi Rubin3 1 Computer Science Department, Technion, Haifa, Israel

        Add to Reading List

        Source URL: arxiv.org

        Language: English - Date: 2016-02-23 20:52:48
        8

        One Hop for RPKI, One Giant Leap for BGP Security Avichai Cohen Yossi Gilad The Hebrew University of

        Add to Reading List

        Source URL: conferences.sigcomm.org

        - Date: 2015-10-30 12:23:54
          9

          Oracle Complexity of Second-Order Methods for Finite-Sum Problems Yossi Arjevani 1 Ohad Shamir 1 Abstract

          Add to Reading List

          Source URL: proceedings.mlr.press

          - Date: 2018-02-06 15:06:57
            10

            How to Phone Home with Someone Else’s Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz and Yossi Oren Faculty of Engineering Sciences,

            Add to Reading List

            Source URL: iss.oy.ne.ro

              UPDATE