Follow
Marina Kopeetsky
Marina Kopeetsky
Senior lecturer, Department of Software Engineering, Shamoon College of Engineering
Verified email at sce.ac.il - Homepage
Title
Cited by
Cited by
Year
Computing multi-party trust privately: in O(n) time units sending one (possibly large) message at a time
S Dolev, N Gilboa, M Kopeetsky
Proceedings of the 2010 ACM Symposium on Applied Computing, 1460-1465, 2010
232010
RFID authentication efficient proactive information security within computational security
S Dolev, M Kopeetsky, A Shamir
Theory of Computing Systems 48 (1), 132-149, 2011
202011
Efficient private multi-party computations of trust in the presence of curious and malicious users
S Dolev, N Gilboa, M Kopeetsky
Journal of Trust Management 1, 1-21, 2014
172014
Method, apparatus and product for RFID authentication
S Dolev, M Kopeetsky, A Shamir
US Patent 8,332,645, 2012
132012
Secure communication for RFIDs proactive information security within computational security
S Dolev, M Kopeetsky
Symposium on Self-Stabilizing Systems, 290-303, 2006
112006
Information security for sensors by overwhelming random sequences and permutations
S Dolev, N Gilboa, M Kopeetsky, G Persiano, PG Spirakis
Ad hoc networks 12, 193-200, 2014
6*2014
Lempel-Ziv-welch compression algorithm with exponential decay
S Frenkel, M Kopeetsky, R Molotkovski
2016 Second International Symposium on Stochastic Models in Reliability …, 2016
52016
Entropy adaptive on-line compression
S Dolev, S Frenkel, M Kopeetsky
2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014
42014
Permanent revocation in attribute based broadcast encryption
S Dolev, N Gilboa, M Kopeetsky
2012 International Conference on Cyber Security, 203-208, 2012
42012
Low overhead RFID security
S Dolev, M Kopeetsky, T Clouser, M Nesterenko
RFID Handbook, 589-602, 2017
32017
Method for attribute based broadcast encryption with permanent revocation
S Dolev, N Gilboa, M Kopeetsky
US Patent 9,413,528, 2016
32016
Computing trust anonymously in the presence of curious users
S Dolev, N Gilboa, M Kopeetsky
Proceedings of the international symposium on stochastic models in …, 2010
32010
Brief announcement: Entropy adaptive on-line compression
S Dolev, S Frenkel, M Kopeetsky
Stabilization, Safety and Security of Distributed Systems, 366-368, 2014
22014
Anonymous transactions in computer networks
S Dolev, M Kopeetsky
Symposium on Self-Stabilizing Systems, 297-310, 2009
22009
Influence of ATM/IP traffic on power transients in optical networks
M Kopeetsky, Y Ben-Ezra, B Lembrikov
Journal of Optical Networking 4 (2), 82-91, 2005
22005
Analysis of Cell Delineation protocol in ATM network
M Kopeetsky
21st IEEE Convention of the Electrical and Electronic Engineers in Israel …, 2000
22000
Performance improvement of Lempel–Ziv–Welch compression algorithm
SL Frenkel, M Kopeetsky, R Molotkovski, P Borovsky
Информатика и её применения 9 (4), 78-84, 2015
12015
Exploiting simultaneous usage of different wireless interfaces for security and mobility
S Dolev, IH Shtacher, B Shapira, Y Elovici, G Messalem, D Mimran, ...
Second International Conference on Future Generation Communication …, 2013
12013
Anonymous transactions in computer networks
S Dolev, M Kopeetsky
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2), 1-14, 2012
12012
Poster: attribute based broadcast encryption with permanent revocation
S Dolev, N Gilboa, M Kopeetsky
Proceedings of the 18th ACM conference on Computer and communications …, 2011
12011
The system can't perform the operation now. Try again later.
Articles 1–20