Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Dolev, Shlomi
add a person with the name Dolev, Shlomi
 

Other publications of authors with the same name

Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets., , and . IACR Cryptology ePrint Archive, (2019)Crash Resilient Communication in Dynamic Networks., and . IEEE Trans. Computers, 46 (1): 14-26 (1997)Self-Stabilizing Microprocessor: Analyzing and Overcoming Soft Errors., and . IEEE Trans. Computers, 55 (4): 385-399 (2006)Perennial secure multi-party computation of universal Turing machine., , , , and . Theor. Comput. Sci., (2019)RT oblivious erasure correcting., , and . IEEE/ACM Trans. Netw., 15 (6): 1321-1332 (2007)Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors., , , and . CSCML, volume 10879 of Lecture Notes in Computer Science, page 84-100. Springer, (2018)Information security for sensors by overwhelming random sequences and permutations., , , , and . Ad Hoc Networks, (2014)Baked-Potato Routing., , and . J. Algorithms, 30 (2): 379-399 (1999)Combinatorial Optimization Using Electro-Optical Vector by Matrix Multiplication Architecture., , , and . OSC, volume 5882 of Lecture Notes in Computer Science, page 130-143. Springer, (2009)Compressive Sensing of Object-Signature., , , and . OSC, volume 6748 of Lecture Notes in Computer Science, page 63-77. Springer, (2010)