default search action
Yossi Gilad
Person information
- affiliation: The Hebrew University of Jerusalem, Israel
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Elkana Tovey, Jonathan Weiss, Yossi Gilad:
Distributed PIR: Scaling Private Messaging via the Users' Machines. CCS 2024: 1967-1981 - [c26]Lei Yang, Yossi Gilad, Mohammad Alizadeh:
Practical Rateless Set Reconciliation. SIGCOMM 2024: 595-612 - [i18]Lei Yang, Yossi Gilad, Mohammad Alizadeh:
Practical Rateless Set Reconciliation. CoRR abs/2402.02668 (2024) - [i17]Elkana Tovey, Jonathan Weiss, Yossi Gilad:
Distributed PIR: Scaling Private Messaging via the Users' Machines. IACR Cryptol. ePrint Arch. 2024: 978 (2024) - 2023
- [c25]Moshe Kol, Amit Klein, Yossi Gilad:
Device Tracking via Linux's New TCP Source Port Selection Algorithm. USENIX Security Symposium 2023: 6167-6183 - [e1]Yosef Moatti, Ofer Biran, Yossi Gilad, Dejan Kostic:
Proceedings of the 16th ACM International Conference on Systems and Storage, SYSTOR 2023, Haifa, Israel, June 5-7, 2023. ACM 2023, ISBN 978-1-4503-9962-3 [contents] - 2022
- [c24]Ludovic Barman, Moshe Kol, David Lazar, Yossi Gilad, Nickolai Zeldovich:
Groove: Flexible Metadata-Private Messaging. OSDI 2022: 735-750 - [c23]Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad:
Twilight: A Differentially Private Payment Channel Network. USENIX Security Symposium 2022: 555-570 - [c22]Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich:
Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies. USENIX Security Symposium 2022: 4237-4254 - [i16]Lei Yang, Yossi Gilad, Mohammad Alizadeh:
Coded Transaction Broadcasting for High-throughput Blockchains. CoRR abs/2205.01797 (2022) - [i15]Moshe Kol, Amit Klein, Yossi Gilad:
Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version). CoRR abs/2209.12993 (2022) - [i14]Maya Dotan, Saar Tochner, Aviv Zohar, Yossi Gilad:
Twilight: A Differentially Private Payment Channel Network. IACR Cryptol. ePrint Arch. 2022: 136 (2022) - [i13]Yossi Gilad, Sharon Goldberg, Kotikalapudi Sriram, Job Snijders, Ben Maddison:
The Use of maxLength in the Resource Public Key Infrastructure (RPKI). RFC 9319: 1-13 (2022) - 2020
- [c21]Jonathan Weiss, Albert Kwon, Yossi Gilad:
Proving Server Faults: RPCs for Distributed Systems in Byzantine Networks. HotNets 2020: 74-80 - [c20]Tomas Hlavacek, Ítalo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, Haya Schulmann:
DISCO: Sidestepping RPKI's Deployment Barriers. NDSS 2020 - [i12]Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, Nickolai Zeldovich:
Aardvark: A Concurrent Authenticated Dictionary with Short Proofs. IACR Cryptol. ePrint Arch. 2020: 975 (2020)
2010 – 2019
- 2019
- [j6]Yossi Gilad:
Metadata-private communication for the 99%. Commun. ACM 62(9): 86-93 (2019) - [c19]Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich:
Vault: Fast Bootstrapping for the Algorand Cryptocurrency. NDSS 2019 - [c18]David Lazar, Yossi Gilad, Nickolai Zeldovich:
Yodel: strong metadata security for voice calls. SOSP 2019: 211-224 - 2018
- [c17]Yossi Gilad, Tomas Hlavacek, Amir Herzberg, Michael Schapira, Haya Schulmann:
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security. HotNets 2018: 57-63 - [c16]Mo Dong, Tong Meng, Doron Zarchy, Engin Arslan, Yossi Gilad, Brighten Godfrey, Michael Schapira:
PCC Vivace: Online-Learning Congestion Control. NSDI 2018: 343-356 - [c15]David Lazar, Yossi Gilad, Nickolai Zeldovich:
Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis. OSDI 2018: 711-725 - [c14]Sarah Scheffler, Sean Smith, Yossi Gilad, Sharon Goldberg:
The Unintended Consequences of Email Spam Prevention. PAM 2018: 158-169 - [i11]Derek Leung, Adam Suhl, Yossi Gilad, Nickolai Zeldovich:
Vault: Fast Bootstrapping for Cryptocurrencies. IACR Cryptol. ePrint Arch. 2018: 269 (2018) - 2017
- [c13]Yossi Gilad, Omar Sagga, Sharon Goldberg:
MaxLength Considered Harmful to the RPKI. CoNEXT 2017: 101-107 - [c12]Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann:
Are We There Yet? On RPKI's Deployment and Security. NDSS 2017 - [c11]Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich:
Algorand: Scaling Byzantine Agreements for Cryptocurrencies. SOSP 2017: 51-68 - [c10]Nirvan Tyagi, Yossi Gilad, Derek Leung, Matei Zaharia, Nickolai Zeldovich:
Stadium: A Distributed Metadata-Private Messaging System. SOSP 2017: 423-440 - [i10]Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, Nickolai Zeldovich:
Algorand: Scaling Byzantine Agreements for Cryptocurrencies. IACR Cryptol. ePrint Arch. 2017: 454 (2017) - 2016
- [c9]Yossi Gilad, Amir Herzberg, Michael Sudkovitch, Michael Goberman:
CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds. NDSS 2016 - [c8]Avichai Cohen, Yossi Gilad, Amir Herzberg, Michael Schapira:
Jumpstarting BGP Security with Path-End Validation. SIGCOMM 2016: 342-355 - [i9]Nirvan Tyagi, Yossi Gilad, Matei Zaharia, Nickolai Zeldovich:
Stadium: A Distributed Metadata-Private Messaging System. IACR Cryptol. ePrint Arch. 2016: 943 (2016) - [i8]Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann:
Are We There Yet? On RPKI's Deployment and Security. IACR Cryptol. ePrint Arch. 2016: 1010 (2016) - [i7]Yossi Gilad, Omar Sagga, Sharon Goldberg:
MaxLength Considered Harmful to the RPKI. IACR Cryptol. ePrint Arch. 2016: 1015 (2016) - 2015
- [c7]Avichai Cohen, Yossi Gilad, Amir Herzberg, Michael Schapira:
One Hop for RPKI, One Giant Leap for BGP Security. HotNets 2015: 10:1-10:7 - 2014
- [j5]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. IEEE Secur. Priv. 12(5): 68-77 (2014) - [j4]Yossi Gilad, Amir Herzberg, Ari Trachtenberg:
Securing Smartphones: A µTCB Approach. IEEE Pervasive Comput. 13(4): 72-79 (2014) - [j3]Yossi Gilad, Amir Herzberg:
Off-Path TCP Injection Attacks. ACM Trans. Inf. Syst. Secur. 16(4): 13 (2014) - [i6]Yossi Gilad, Amir Herzberg, Ari Trachtenberg:
Securing Smartphones: A Micro-TCB Approach. CoRR abs/1401.7444 (2014) - 2013
- [j2]Yossi Gilad, Amir Herzberg:
Fragmentation Considered Vulnerable. ACM Trans. Inf. Syst. Secur. 15(4): 16:1-16:31 (2013) - [c6]Yossi Gilad, Amir Herzberg:
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI. ESORICS 2013: 255-272 - [c5]Yossi Gilad, Amir Herzberg:
When tolerance causes weakness: the case of injection-friendly browsers. WWW 2013: 435-446 - [i5]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. CoRR abs/1305.0854 (2013) - [i4]Yossi Gilad, Amir Herzberg:
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI. IACR Cryptol. ePrint Arch. 2013: 410 (2013) - [i3]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. IACR Cryptol. ePrint Arch. 2013: 623 (2013) - 2012
- [j1]Yossi Gilad, Amir Herzberg:
LOT: A Defense Against IP Spoofing and Flooding Attacks. ACM Trans. Inf. Syst. Secur. 15(2): 6:1-6:30 (2012) - [c4]Yossi Gilad, Amir Herzberg:
Spying in the Dark: TCP and Tor Traffic Analysis. Privacy Enhancing Technologies 2012: 100-119 - [c3]Yossi Gilad, Amir Herzberg:
Off-Path Attacking the Web. WOOT 2012: 41-52 - [i2]Yossi Gilad, Amir Herzberg:
Off-Path Attacking the Web. CoRR abs/1204.6623 (2012) - [i1]Yossi Gilad, Amir Herzberg:
TCP Injections for Fun and Clogging. CoRR abs/1208.2357 (2012) - 2011
- [c2]Yossi Gilad, Amir Herzberg:
Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments. WOOT 2011: 9-18
2000 – 2009
- 2009
- [c1]Yossi Gilad, Amir Herzberg:
Lightweight Opportunistic Tunneling (LOT). ESORICS 2009: 104-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint