Marina Kopeetsky
Marina Kopeetsky
Senior lecturer, Department of Software Engineering, Shamoon College of Engineering
Dirección de correo verificada de sce.ac.il - Página principal
Título
Citado por
Citado por
Año
RFID authentication efficient proactive information security within computational security
S Dolev, M Kopeetsky, A Shamir
Theory of Computing Systems 48 (1), 132-149, 2011
182011
Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time
S Dolev, N Gilboa, M Kopeetsky
Proceedings of the 2010 ACM Symposium on Applied Computing, 1460-1465, 2010
172010
Efficient private multi-party computations of trust in the presence of curious and malicious users
S Dolev, N Gilboa, M Kopeetsky
Journal of Trust Management 1 (1), 8, 2014
122014
Method, apparatus and product for RFID authentication
S Dolev, M Kopeetsky, A Shamir
US Patent 8,332,645, 2012
112012
Secure communication for RFIDs proactive information security within computational security
S Dolev, M Kopeetsky
Symposium on Self-Stabilizing Systems, 290-303, 2006
92006
Information security for sensors by overwhelming random sequences and permutations
S Dolev, N Gilboa, M Kopeetsky, G Persiano, PG Spirakis
Ad hoc networks 12, 193-200, 2014
6*2014
Permanent revocation in attribute based broadcast encryption
S Dolev, N Gilboa, M Kopeetsky
2012 International Conference on Cyber Security, 203-208, 2012
32012
Computing trust anonymously in the presence of curious users
S Dolev, N Gilboa, M Kopeetsky
Proceedings of the international symposium on stochastic models in …, 2010
32010
Low Overhead RFID Security
S Dolev, M Kopeetsky, T Clouser, M Nesterenko, SA Ahson, M Ilyas
RFID Handbook: Applications, Technology, Security, and Privacy, 589-602, 2008
32008
Entropy adaptive on-line compression
S Dolev, S Frenkel, M Kopeetsky
2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014
22014
Anonymous transactions in computer networks
S Dolev, M Kopeetsky
Symposium on Self-Stabilizing Systems, 297-310, 2009
22009
Influence of ATM/IP traffic on power transients in optical networks
M Kopeetsky, Y Ben-Ezra, B Lembrikov
Journal of Optical Networking 4 (2), 82-91, 2005
22005
Analysis of Cell Delineation protocol in ATM network
M Kopeetsky
21st IEEE Convention of the Electrical and Electronic Engineers in Israel …, 2000
22000
Lempel-Ziv-Welch Compression Algorithm with Exponential Decay
S Frenkel, M Kopeetsky, R Molotkovski
2016 Second International Symposium on Stochastic Models in Reliability …, 2016
12016
Performance improvement of Lempel–Ziv–Welch compression algorithm
SL Frenkel, M Kopeetsky, R Molotkovski, P Borovsky
Информатика и её применения 9 (4), 78-84, 2015
12015
Brief announcement: Entropy adaptive on-line compression
S Dolev, S Frenkel, M Kopeetsky
Stabilization, Safety, and Security of Distributed Systems: 16th …, 2014
12014
Exploiting simultaneous usage of different wireless interfaces for security and mobility
S Dolev, IH Shtacher, B Shapira, Y Elovici, G Messalem, D Mimran, ...
Second International Conference on Future Generation Communication …, 2013
12013
Anonymous transactions in computer networks
S Dolev, M Kopeetsky
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2), 1-14, 2012
12012
Poster: attribute based broadcast encryption with permanent revocation
S Dolev, N Gilboa, M Kopeetsky
Proceedings of the 18th ACM conference on Computer and communications …, 2011
12011
Efficient Private Multi-Party Computations of Trust
S Dolev, N Gilboa, M Kopeetsky
Technical Report 10-02, Ben-Gurion University of the Negev, Beer-Sheva, 2009
12009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20