Establishing and enforcing security and privacy policies in web-based applications A Futoransky, A Waissbein, DB Tiscornia, E Gutesman US Patent 7,831,995, 2010 | 128 | 2010 |
Deformation techniques for efficient polynomial equation solving J Heintz, T Krick, S Puddu, J Sabia, A Waissbein journal of complexity 16 (1), 70-109, 2000 | 83 | 2000 |
On the time–space complexity of geometric elimination procedures J Heintz, G Matera, A Waissbein Applicable Algebra in Engineering, Communication and Computing 11, 239-296, 2001 | 62 | 2001 |
System and method for providing automated computer security compromise as a service A Futoransky, AE Calvo, FRF Russ, JL Obes, A Waissbein, AJ Frydman, ... US Patent 9,183,397, 2015 | 51 | 2015 |
System and method for providing application penetration testing AGS Testa, GG Richarte, FF Russ, DM Kelyacoubian, A Futoransky, ... US Patent 8,484,738, 2013 | 51 | 2013 |
Security framework for protecting rights in computer software A Futoransky, CES Yamada, DA Bendersky, L Notarfrancesco, ... US Patent 7,549,147, 2009 | 49 | 2009 |
Deformation techniques for sparse systems G Jeronimo, G Matera, P Solerno, A Waissbein Foundations of Computational Mathematics 9 (1), 1-50, 2009 | 43 | 2009 |
A dynamic technique for enhancing the security and privacy of web applications A Futoransky, E Gutesman, A Waissbein Proc. Black Hat USA, 2007 | 37 | 2007 |
Foundations and applications for secure triggers A Futoransky, E Kargieman, C Sarraute, A Waissbein ACM Transactions on Information and System Security (TISSEC) 9 (1), 94-112, 2006 | 24 | 2006 |
Establishing and enforcing security and privacy policies in web-based applications A Waissbein, A Futoransky, DB Tiscornia, ED Gutesman US Patent 8,146,135, 2012 | 22 | 2012 |
The ND2DB Attack: Database Content Extraction Using Timing Attacks on the Indexing Algorithms. A Futoransky, D Saura, A Waissbein WOOT, 2007 | 15 | 2007 |
Polynomial equation solving by lifting procedures for ramified fibers A Bompadre, G Matera, R Wachenchauzer, A Waissbein Theoretical computer science 315 (2-3), 335-369, 2004 | 13 | 2004 |
Advanced software protection now D Bendersky, A Futoransky, L Notarfrancesco, C Sarraute, A Waissbein arXiv preprint arXiv:1006.2356, 2010 | 10 | 2010 |
Inverting bijective polynomial maps over finite fields A Cafure, G Matera, A Waissbein 2006 IEEE Information Theory Workshop-ITW'06 Punta del Este, 27-31, 2006 | 10 | 2006 |
The impact of predicting attacker tools in security risk assessments E Gutesman, A Waissbein Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 8 | 2010 |
Fair and decentralized exchange of digital goods A Futoransky, C Sarraute, D Fernandez, M Travizano, A Waissbein arXiv preprint arXiv:2002.09689, 2020 | 7 | 2020 |
Wavelets and semi–algebraic sets L Lehmann, A Waissbein Proceedings of WAIT, 2001 | 7 | 2001 |
Secure exchange of digital goods in a decentralized data marketplace A Futoransky, C Sarraute, A Waissbein, D Fernandez, M Travizano, ... arXiv preprint arXiv:1907.12625, 2019 | 5 | 2019 |
WibsonTree: Efficiently Preserving Seller's Privacy in a Decentralized Data Marketplace A Futoransky, C Sarraute, A Waissbein, M Travizano, D Fernandez arXiv preprint arXiv:2002.03810, 2020 | 4 | 2020 |
Robust algorithms for generalized Pham systems E Dratman, G Matera, A Waissbein computational complexity 18 (1), 105-154, 2009 | 4 | 2009 |