This article must adhere to the biographies of living persons (BLP) policy, even if it is not a biography, because it contains material about living persons. Contentious material about living persons that is unsourced or poorly sourced must be removed immediately from the article and its talk page, especially if potentially libellous. If such material is repeatedly inserted, or if you have other concerns, please report the issue to this noticeboard.If you are a subject of this article, or acting on behalf of one, and you need help, please see this help page. |
The Wikimedia Foundation's Terms of Use require that editors disclose their "employer, client, and affiliation" with respect to any paid contribution; see WP:PAID. For advice about reviewing paid contributions, see WP:COIRESPONSE.
|
Edit request 1
editThis edit request by an editor with a conflict of interest was declined. |
Please delete COI tag. I declared my COI.
Please add or the following links: "The research directions included multi-physical channels transmission and secret sharing"....
References to cite: Shlomi Dolev, Limor Lahiani, Moti Yung: Secret swarm unit: Reactive k-secret sharing. Ad Hoc Networks 10(7): 1291-1305 (2012) Shlomi Dolev, Idan Heimlich Shtacher, Bracha Shapira, Yuval Elovici, Guy Messalem, Dudu Mimran, Marina Kopeetsky: Exploiting simultaneous usage of different wireless interfaces for security and mobility. FGCT 2013: 21-26
"Prof. Dolev, also exposed Yoav to a research combining multi-physical channel transmission and secret sharing in the scope of software defined network (SDN), as SDN was a research subject of a postdoc in his group." Reference to cite: Shlomi Dolev, Shimrit Tzur-David: SDN-Based Private Interconnection. NCA 2014: 129-136
"Eventually, interacting with Yoav to include authentication considerations, Prof. Dolev suggested schemes based on a novel Overlay Security concept, that is based on the security of existing protocols over (possibly) the same physical network. Overlay security is the heart concept in the innovation DNA of Secret Double Octopus technology. This concept is not tied to software define networks, or only to secret sharing, or to different physical routs. The idea behind Overlay Security is to use the combined security, authenticity and identification of existing logical channels - such as messengers, emails, push tokens - by using them in parallel, so hackers need to break them all to reveal the information sent. This novel concept is used in the first authentication product of Secret Double Octopus, and can certainly serve as the concept for the future quantum safe Internet."
https://aabgu.org/this-cyber-security-startup-has-legs/
- What you wrote above is a mess.
- The COI tag will not removed until this is reviewed by independent editors.
- Please propose the actual content you would like to see added, with citations formatted, etc. Jytdog (talk) 23:25, 12 January 2018 (UTC)
- Maybe this is clearer:
- 1. after this sentence: "The research directions included multi-physical channels transmission and secret sharing", please add the following links: https://doi.org/10.1016/j.adhoc.2012.03.011, https://doi.org/10.1109/FGCT.2013.6767181
- 2. After this sentence: "Prof. Dolev, also exposed Yoav to a research combining multi-physical channel transmission and secret sharing in the scope of software-defined network (SDN), as SDN was a research subject of a postdoc in his group."
Please add the following link: https://doi.org/10.1109/NCA.2014.26
- 3. After this sentence: "This novel concept is used in the first authentication product of Secret Double Octopus, and can certainly serve as the concept for the future quantum safe Internet" please add the following link: https://aabgu.org/this-cyber-security-startup-has-legs/.
- ALSO, please add the following:
- 4. After this sentence: "
Shlomi Dolev (Hebrew: שלומי דולב, born December 5, 1958) is a Rita Altura Trust Chair Professor in Computer Science at Ben-Gurion University of the Negev (BGU) and the head of the Frankel Center for Computer Science." Please add this reference:
https://www.cs.bgu.ac.il/~dolev/cv.pdf
- 5. after the sentence: "From 2011 to 2014, Prof. Dolev served as the Dean of the Natural Sciences Faculty at Ben-Gurion University of the Negev", please add the following link:
"http://in.bgu.ac.il/teva/DocLib/Dikan/תמצית%20דוח%20פעילות%20אקדמית%20תשעג.pdf, https://www.cs.bgu.ac.il/~dolev/107.pdf"
- 6. After this sentence: "Dolev together with Yuval Elovici and Ehud Gudes established the Telekom Innovation Laboratories at Ben-Gurion University", please add the following sentence and link: "Ehud recommendation: https://www.linkedin.com/in/shlomi-dolev-a848644/.
- 7. After the sentence: "Dolev was also instrumental in establishing the IBM Cyber Security Center of Excellence (CCoE)
in Collaboration with Ben-Gurion University of the Negev, and JVP" Please add the link: https://www.research.ibm.com/haifa/ccoe/
- 8. After this sentence: "Shlomi frequently collaborates with many other researchers in computer science including Jeffrey Ullman, Nancy Lynch, Adi Shamir, Moti Yung and Noga Alon", please add the following link: http://dblp.uni-trier.de/pers/hd/d/Dolev:Shlomi
- 9 After the sentence: "The idea behind Overlay Security is to use the combined security, authenticity and identification of existing logical channels - such as messengers, emails, push tokens - by using them in parallel, so hackers need to break them all to reveal the information sent", please add the link: https://www.cs.bgu.ac.il/~frankel/Cyber.pdf.
- 10. After this sentence: "This novel concept is used in the first authentication product of Secret Double Octopus, and can certainly serve as the concept for the future quantum safe Internet", please add the following link: https://techcrunch.com/2018/01/05/the-quantum-computing-apocalypse-is-imminent/.
- 11. After this sentence: "The group of Prof. Dolev investigates and patented a variety of subjects, including authentication and secure communication in vehicle network, hardware-less application for broadcast encryption, obfuscation and homomorphic encryptions, machine learning techniques for malware identification, nanorobotics for curing cancer, and fault tolerant secure computations", please add the following link: https://patents.justia.com/search?q=shlomo+dolev+%7C+shlomi+dolev.
- I hope this time it is clearer. Thank you :)
This edit request by an editor with a conflict of interest has now been answered. |
Dear editors, It's been a while, and the COI flag is still there. Please review my article, remove what you think is not appropriate or does not follow Wikipedia's rules. I declare that all of my editings were done from a neutral point of view, and for the interest of the public, I followed Wikipedia's rules for paid editing. Thus, consider removing the COI tag. Thank you in advance. Zahira Cohen (talk) 11:25, 7 December 2018 (UTC)
Reply 07-DEC-2018
editPlease consult assigning editor
- It is recommended that, as a courtesy, you first try asking the editor who assigned the template — in this case Doc James — in order to find out from them if it can be removed. Since they placed the template, they are in the best position to know whether or not the issues which caused its placement have been corrected. You may contact them by placing a new message on their talk page. In the unlikely event that you do not hear back from them after a reasonable amount of time, please reopen this request by altering the
{{request edit}}
template's answer parameter to read from|ans=yes
to|ans=no
. Thank you!
Regards, Spintendo 12:21, 7 December 2018 (UTC)