Ariel Waissbein
Ariel Waissbein
Affiliation inconnue
Adresse e-mail validée de
Citée par
Citée par
Establishing and enforcing security and privacy policies in web-based applications
A Futoransky, A Waissbein, DB Tiscornia, E Gutesman
US Patent 7,831,995, 2010
Deformation techniques for efficient polynomial equation solving
J Heintz, T Krick, S Puddu, J Sabia, A Waissbein
journal of complexity 16 (1), 70-109, 2000
On the time–space complexity of geometric elimination procedures
J Heintz, G Matera, A Waissbein
Applicable Algebra in Engineering, Communication and Computing 11 (4), 239-296, 2001
Security framework for protecting rights in computer software
A Futoransky, CES Yamada, DA Bendersky, L Notarfrancesco, ...
US Patent 7,549,147, 2009
System and method for providing application penetration testing
AGS Testa, GG Richarte, FF Russ, DM Kelyacoubian, A Futoransky, ...
US Patent 8,484,738, 2013
Deformation techniques for sparse systems
G Jeronimo, G Matera, P Solerno, A Waissbein
Foundations of Computational Mathematics 9 (1), 1-50, 2009
A dynamic technique for enhancing the security and privacy of web applications
A Futoransky, E Gutesman, A Waissbein
Proc. Black Hat USA, 2007
System and method for providing automated computer security compromise as a service
A Futoransky, AE Calvo, FRF Russ, JL Obes, A Waissbein, AJ Frydman, ...
US Patent 9,183,397, 2015
Foundations and applications for secure triggers
A Futoransky, E Kargieman, C Sarraute, A Waissbein
ACM Transactions on Information and System Security (TISSEC) 9 (1), 94-112, 2006
Establishing and enforcing security and privacy policies in web-based applications
A Waissbein, A Futoransky, DB Tiscornia, ED Gutesman
US Patent 8,146,135, 2012
Polynomial equation solving by lifting procedures for ramified fibers
A Bompadre, G Matera, R Wachenchauzer, A Waissbein
Theoretical computer science 315 (2-3), 335-369, 2004
Advanced software protection now
D Bendersky, A Futoransky, L Notarfrancesco, C Sarraute, A Waissbein
arXiv preprint arXiv:1006.2356, 2010
The ND2DB Attack: Database Content Extraction Using Timing Attacks on the Indexing Algorithms.
A Futoransky, D Saura, A Waissbein
WOOT, 2007
Wavelets and semi–algebraic sets
L Lehmann, A Waissbein
Proceedings of WAIT, 2001
Inverting bijective polynomial maps over finite fields
A Cafure, G Matera, A Waissbein
2006 IEEE Information Theory Workshop-ITW'06 Punta del Este, 27-31, 2006
The impact of predicting attacker tools in security risk assessments
E Gutesman, A Waissbein
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
Secure exchange of digital goods in a decentralized data marketplace
A Futoransky, C Sarraute, A Waissbein, D Fernandez, M Travizano, ...
arXiv preprint arXiv:1907.12625, 2019
Robust algorithms for generalized Pham systems
E Dratman, G Matera, A Waissbein
computational complexity 18 (1), 105-154, 2009
Enforcing Privacy in Web Applications.
A Futoransky, A Waissbein
PST, 2005
Timing attacks for recovering private entries from database engines
A Futoransky, D Saura, A Waissbein
BlackHat USA, 2007
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20