Goel, Ashish

Micah Adler , William A Aiello , Reuven Bar-Yehuda , Yair Bartal
Journal of Algorithms 55 204 -204

2005
Competitive Queue Policies

William A Aiello , Yishay Mansour , S Rajagopolan , Adi Rosen

Method and apparatus for enhanced security in a broadband telephony network

William A Aiello , Steven Michael Bellovin , Charles Robert Kalmanek Jr , William Todd Marshall

23
2006
Reverse firewall with self-provisioning

William A Aiello , Charles Robert Kalmanek Jr , William J Leighton III , Patrick McDaniel

270
2013
Reverse firewall with self-provisioning

William A Aiello , Charles Robert Kalmanek Jr , William J Leighton III , Patrick McDaniel

1
2014
Using smartcards to enable probabilistic transactions on an untrusted device

William A Aiello , Aviel D Rubin , Martin J Strauss

31
2005
Using smartcards to enable probabilistic transaction on an untrusted device

William A Aiello , Aviel D Rubin , Martin J Strauss

30
2002
Pseudo-random generator

William A Aiello , Sivaramakrishnan Rajagopalan , Ramarathnam Venkatesan

68
1996
Pseudo-random generator

William A Aiello , Ramarathnam Venkatesan

51
1995
Method and apparatus for generating secure hash functions

William A Aiello , Ramarathnam Venkatesan

38
1999
Using smartcards to enable probabilistic transactions on an untrusted device

William A Aiello , Aviel Q Rubin , Martin J Strauss

37
2013
JOURNAL OF COMPUTER AND SYSTEM SClENCES 42, 399 (1991)

WILLIAM AIELLO , ERIC BACH , RICHARD BEIGEL , MANFRED BROY

1991
Dai, JG 556 Dailianas, A. 1391 Das, S. 3 Dasen, M. 1137

Y Afek , WA Aiello , IF Akyildiz , C Albuquerque

Cryptographically secure pseudo-random bit generator for fast and secure encryption

William Anthony Aiello , Sivaramakrishnam Rajagopalan , Ramarathnam Venkatesan

33
2000
Pseudo-random generator

William Anthony Aiello , Ramarathnam Venkatesan

32
1998
Proofs Knowledge, and Oracles: Three Complexity Results for Interactive Proofs and Zero-knowledge

William Anthony Aiello
Laboratory for Computer Science, Massachusetts Institute of Technology

1989
Herbert west: deanonymizer

William Aiello , Andrew Warfield , Mihir Nanavati , Nathan Taylor
usenix conference on hot topics in security 6 -6

18
2011
Enterprise Security: A Community of Interest Based Approach.

William Aiello , Patrick D. McDaniel , Jacobus E. van der Merwe , Oliver Spatscheck
network and distributed system security symposium

85
2006
Foiling birthday attacks in length-doubling transformations: benes: a non-reversible alternative to feistel

William Aiello , Ramarathnam Venkatesan
theory and application of cryptographic techniques 307 -320

66
1996