William Aiello
William Aiello
Professor of Computer Science, University of British Columbia
Verified email at
Cited by
Cited by
A random graph model for massive graphs
W Aiello, F Chung, L Lu
Proceedings of the thirty-second annual ACM symposium on Theory of computing …, 2000
Random evolution in massive graphs
W Aiello, F Chung, L Lu
Handbook of massive data sets, 97-122, 2002
Working around BGP: an incremental approach to improving security and accuracy in interdomain routing.
G Goodell, W Aiello, T Griffin, J Ioannidis, PD McDaniel, AD Rubin
NDSS 23, 156, 2003
Just fast keying: Key agreement in a hostile internet
W Aiello, SM Bellovin, M Blaze, R Canetti, J Ioannidis, AD Keromytis, ...
ACM Transactions on Information and System Security (TISSEC) 7 (2), 242-273, 2004
Protecting consumer privacy from electric load monitoring
S McLaughlin, P McDaniel, W Aiello
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Reverse firewall with self-provisioning
WA Aiello, CR Kalmanek Jr, WJ Leighton III, P McDaniel, S Sen, ...
US Patent 8,453,227, 2013
Fast digital identity revocation
W Aiello, S Lodha, R Ostrovsky
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
Breaking up is hard to do: security and functionality in a commodity hypervisor
P Colp, M Nanavati, J Zhu, W Aiello, G Coker, T Deegan, P Loscocco, ...
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
Shuffler: fast and deployable continuous code {re-randomization}
D Williams-King, G Gobieski, K Williams-King, JP Blake, X Yuan, P Colp, ...
12th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2016
Origin authentication in interdomain routing
W Aiello, J Ioannidis, P McDaniel
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Competitive queue policies for differentiated services
WA Aiello, Y Mansour, S Rajagopolan, A Rosén
Journal of Algorithms 55 (2), 113-141, 2005
System having filtering/monitoring of secure connections
W Aiello, S Bellovin, E Crandall, A Kaplan, D Kormann, A Rubin, ...
US Patent App. 10/322,189, 2004
Statistical zero-knowledge languages can be recognized in two rounds
W Aiello, J Hastad
Journal of Computer and System Sciences 42 (3), 327-345, 1991
Configuration management at massive scale: System design and experience
W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ...
IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009
Adaptive packet routing for bursty adversarial traffic
W Aiello, E Kushilevitz, R Ostrovsky, A Rosén
Proceedings of the thirtieth annual ACM symposium on Theory of computing …, 1998
Method for efficiently revoking digital identities
W Aiello, S Lodha, R Ostrovsky
US Patent 6,397,329, 2002
A spatial web graph model with local influence regions
W Aiello, A Bonato, C Cooper, J Janssen, P Prałat
Internet Mathematics 5 (1-2), 175-196, 2008
Approximate load balancing on dynamic and asynchronous networks
W Aiello, B Awerbuch, B Maggs, S Rao
Proceedings of the twenty-fifth annual ACM symposium on theory of computing …, 1993
Analysis of communities of interest in data networks
W Aiello, C Kalmanek, P McDaniel, S Sen, O Spatscheck, ...
Passive and Active Network Measurement: 6th International Workshop, PAM 2005 …, 2005
Foiling birthday attacks in length-doubling transformations: Benes: a non-reversible alternative to Feistel
W Aiello, R Venkatesan
International Conference on the Theory and Applications of Cryptographic …, 1996
The system can't perform the operation now. Try again later.
Articles 1–20