Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yossi Oren (יוסי אורן)Senior Lecturer (≝Assistant Professor) at Ben Gurion University's Cyber Security Research CenterVerified email at bgu.ac.il
David PelegProfessor of Computer Science, Weizmann InstituteVerified email at weizmann.ac.il
Yuval ShavittTel Aviv UniversityVerified email at eng.tau.ac.il
Dahlia malkhiNoviVerified email at fb.com
Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
Mira GonenAriel University ,Senior LecturerVerified email at ariel.ac.il
Bülent YenerProfessor of Computer Science, Director of Data Science Research Center RPIVerified email at cs.rpi.edu
Liron DavidTel Aviv UniversityVerified email at post.tau.ac.il
Kobbi NissimDept. of Computer Science (Georgetown)Verified email at georgetown.edu
Amit KleinmannTel-Aviv UniversityVerified email at post.tau.ac.il
Moni NaorProfessor of Computer Science, Weizmann Institute of ScienceVerified email at weizmann.ac.il
Rebecca N. WrightBarnard CollegeVerified email at barnard.edu
Jessica StaddonGoogleVerified email at google.com
Juan GarayProfessor, Texas A&M University, Computer Science & EngineeringVerified email at TAMU.EDU
Dalit NaorSchool of Computer Science, Academic College of Tel-Aviv YaffoVerified email at mta.ac.il
Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Arie YeredorProfessor, School of Electrical Engineering, Tel-Aviv UniversityVerified email at eng.tau.ac.il
Hank KorthProfessor of Computer Science, Lehigh UniversityVerified email at lehigh.edu
Todd A. AndersonResearch Scientist, Intel LabsVerified email at intel.com
Follow
Avishai Wool
Professor of Computer Engineering, Tel Aviv University
Verified email at eng.tau.ac.il - Homepage