Author image not provided
 Shlomi Dolev

Authors:
Add personal information
Professional ACM Member badge
  Affiliation history
Bibliometrics: publication history
Average citations per article7.37
Citation Count1,680
Publication count228
Publication years1991-2017
Available for download61
Average downloads per article260.02
Downloads (cumulative)15,861
Downloads (12 Months)742
Downloads (6 Weeks)86
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


233 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 233
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1
May 2018 Acta Informatica: Volume 55 Issue 3, May 2018
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Given a large set of measurement data, in order to identify a simple function that captures the essence of the data, we suggest representing the data by an abstract function, in particular by polynomials. We interpolate the datapoints to define a polynomial that would represent the data succinctly. The interpolation ...
Keywords: Big data, Data aggregation, Data interpolation, Representation, Sampling

2
November 2017 Wireless Networks: Volume 23 Issue 8, November 2017
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Since energy efficiency, high bandwidth, and low transmission delay are challenging issues in mobile networks, due to resource constraints, there is a great importance in designing of new communication methods. In particular, lossless data compression may provide high performance under constrained resources. In this paper we present a novel on-line ...
Keywords: Entropy, On-line compression, Compression ratio, Wireless network

3 published by ACM
July 2017 PODC '17: Proceedings of the ACM Symposium on Principles of Distributed Computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 63,   Downloads (Overall): 102

Full text available: PDFPDF
Self-stabilization refers to the ability of systems to recover after temporal violations of conditions required for their correct operation. Such violations may lead the system to an arbitrary state from which it should automatically recover. Today, beyond recovering functionality, there is a need to recover security and confidentiality guarantees as ...
Keywords: secure multi-party computation, security and privacy, self-stabilization

4
May 2017 Wireless Networks: Volume 23 Issue 4, May 2017
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Modern vehicles are proficient in establishing a spontaneous connection over a wireless radio channel, synchronizing actions and information. Security infrastructure is most important in such a sensitive scope of vehicle communication for coordinating actions and avoiding accidents on the road. One of the first security issues that need to be ...
Keywords: Certificate authority, Dynamic attributes, Static attributes, Security, Vehicle networks

5 published by ACM
December 2016 Middleware Posters and Demos '16: Proceedings of the Posters and Demos Session of the 17th International Middleware Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 15,   Downloads (Overall): 41

Full text available: PDFPDF
Keywords: Self-stabilization, fault-tolerance, reconfiguration

6 published by ACM
December 2016 ACM Transactions on Knowledge Discovery from Data (TKDD): Volume 11 Issue 2, December 2016
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 45,   Downloads (Overall): 144

Full text available: PDFPDF
A MapReduce algorithm can be described by a mapping schema , which assigns inputs to a set of reducers, such that for each required output there exists a reducer that receives all the inputs participating in the computation of this output. Reducers have a capacity that limits the sets of ...
Keywords: Distributed computing, MapReduce algorithms, and reducer capacity and communication cost trade-off, mapping schema, reducer capacity

7
November 2016 Computer Communications: Volume 93 Issue C, November 2016
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

We provide a single round (per party) protocol for the Authenticated Key Exchange (AKE) among peer parties.Physically Unclonable Functions (PUF) have been used to provide auxiliary optical channel communication for the peer vehicle location binding.We emphasize the need of location binding property vs non-forwardable authentication with respect to security applications ...
Keywords: Authentication, Optical channel, Wireless radio channel, Certificate, Challenge response pairs, Verification

8
August 2016 Proceedings of the 10th International Conference on Security and Cryptography for Networks - Volume 9841
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

In standard Secret Sharing SS a dealer shares a secret s among n parties such that an adversary corrupting no more than t parties does not learn s, while any $$t+1$$ parties can efficiently recover s. Over a long period of time all parties may be corrupted and the threshold ...

9 published by ACM
July 2016 PODC '16: Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 33,   Downloads (Overall): 122

Full text available: PDFPDF
In a secret sharing scheme a dealer shares a secret s among n parties such that an adversary corrupting up to t parties does not learn s , while any t +1 parties can efficiently recover s . Over a long period of time all parties may be corrupted thus ...
Keywords: dishonest majority, non-robust secret sharing, proac- tive secret sharing, proactive security, secret sharing

10
July 2016 Theoretical Computer Science: Volume 636 Issue C, July 2016
Publisher: Elsevier Science Publishers Ltd.
Bibliometrics:
Citation Count: 0

In the field of information security, the best way of protecting the privacy of the participants is to keep silent. Consider two, not necessarily identical, powerful computers or computer-grids connected by a unidirectional communication link that should transfer a long stream of information in the presence of a listening adversary ...
Keywords: Unidirectional encryption, Combinatorial optimization problems

11
May 2016 Neural Networks: Volume 77 Issue C, May 2016
Publisher: Elsevier Science Ltd.
Bibliometrics:
Citation Count: 0

The holographic conceptual approach to cognitive processes in the human brain suggests that, in some parts of the brain, each part of the memory (a neuron or a group of neurons) contains some information regarding the entire data.In Dolev and Frenkel (2010, 2012) we demonstrated how to encode data in ...
Keywords: Holographic memory, Neural computation, Neural networks, Walsh-Hadamard

12
April 2016 Wireless Networks: Volume 22 Issue 3, April 2016
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Vehicular networks are used to coordinate actions among vehicles in traffic by the use of wireless transceivers (pairs of transmitters and receivers). Unfortunately, the wireless communication among vehicles is vulnerable to security threats that may lead to very serious safety hazards. In this work, we propose a viable solution for ...
Keywords: Man-in-the-Middle attack, Security, Vehicle networks

13
September 2015 NCA '15: Proceedings of the 2015 IEEE 14th International Symposium on Network Computing and Applications (NCA)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Software-Defined Networking (SDN) decouples the control and data planes, enabling limitless possibilities for implementing services and applications on top of the network abstraction layer. The centralized controller provides a real-time view of the entire underlying network infrastructure and therefore, management of the agile network becomes more simplified. This flexibility requires ...

14
September 2015 NCA '15: Proceedings of the 2015 IEEE 14th International Symposium on Network Computing and Applications (NCA)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Modern vehicles are configured to exchange warning messages through IEEE 1609 Dedicated Short Range Communication (DSRC) over IEEE 802.11p Wireless Access in Vehicular Environment (WAVE). Essentially, these warning messages must associate an authentication factor such that the verifier authenticates the message origin via visual binding. Interestingly, the existing vehicle communication ...

15
September 2015 ALGOCLOUD 2015: Revised Selected Papers of the First International Workshop on Algorithmic Aspects of Cloud Computing - Volume 9511
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

This paper presents searchable secret shares SSS, a novel method to search and collect statistics about private information quickly without retrieving secretly shared data, which is stored in public clouds separately. The new capabilities of SSS serve as a base for a newly defined SSS database SSSDB with reduced communication ...

16
September 2015 ALGOCLOUD 2015: Revised Selected Papers of the First International Workshop on Algorithmic Aspects of Cloud Computing - Volume 9511
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

The computations over RAM are preferred over computations with circuits or Turing machines. Secure and private RAM executions become more and more important in the scope avoiding information leakage when executing programs over a single computer as well as over the clouds. In this paper, we propose a distributed scheme ...
Keywords: Shamir secret sharing, Information theoretic secure, Random access machine

17
September 2015 Natural Computing: an international journal: Volume 14 Issue 3, September 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0


18
September 2015 Natural Computing: an international journal: Volume 14 Issue 3, September 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

In this paper we explore the utility of compressive sensing for object signature generation in the optical domain. In the data acquisition stage we use laser scanning to obtain a small (sub-Nyquist) number of points of an object's boundary. This is used to construct the signature, thereby enabling object identification, ...
Keywords: Compressive sensing, Digital signal processing, Object signature, Shape representation, Optical superComputing, Optical signal processing

19
September 2015 Natural Computing: an international journal: Volume 14 Issue 3, September 2015
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 0

We present a holography based optical architecture that computes Kronecker product of two given binary matrices in a single (configuration) step. We demonstrate the use of the holography capability to enlarge the input of size $$n$$n into the size $$n^2$$n2 in one step, in contrast to the traditional optical copying ...
Keywords: Holography, Interferometry, Optical computing, Binary optics, Tensor product, Real-time holography

20
August 2015 Proceedings of the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems - Volume 9212
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

We introduce a functional encryption scheme based on the security of bilinear maps for the class of languages accepted by extended automata. In such an automaton, n DFAs, each with at most q states, are linked in a cascade such that the first DFA receives the input to the system ...
Keywords: Functional encryption



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us