2008 | ||
---|---|---|
49 | EE | Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Romanov, Avital Yachin: An Empirical Study of Denial of Service Mitigation Techniques. SRDS 2008: 115-124 |
48 | EE | Amir Herzberg, Igal Yoffe: The Layered Games Framework for Specifications and Analysis of Security Protocols. TCC 2008: 125-141 |
47 | EE | Amir Herzberg, Ahmad Jbara: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Techn. 8(4): (2008) |
46 | EE | Amir Herzberg, Igal Yoffe: The layered games framework for specifications and analysis of security protocols. IJACT 1(2): 144-159 (2008) |
2007 | ||
45 | EE | Gal Badishi, Amir Herzberg, Idit Keidar: Keeping Denial-of-Service Attackers in the Dark. IEEE Trans. Dependable Sec. Comput. 4(3): 191-204 (2007) |
2006 | ||
44 | EE | Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Romanov, Avital Yachin: Denial of Service Protection with Beaver. From Security to Dependability 2006 |
43 | EE | Amir Herzberg, Igal Yoffe: On Secure Orders in the Presence of Faults. SCN 2006: 126-140 |
42 | Amir Herzberg, Igal Yoffe: Layered Architecture for Secure E-Commerce Applications. SECRYPT 2006: 118-125 | |
2005 | ||
41 | EE | Amir Herzberg: On Tolerant Cryptographic Constructions. CT-RSA 2005: 172-190 |
40 | EE | Gal Badishi, Amir Herzberg, Idit Keidar: Keeping Denial-of-Service Attackers in the Dark. DISC 2005: 18-32 |
39 | EE | Amir Herzberg: Securing the Net: Challenges, Failures and Directions. DISC 2005: 2 |
2004 | ||
38 | EE | Amir Herzberg: Web Spoofing and Phishing Attacks and Their Prevention. ENC 2004: 3 |
37 | EE | Amir Herzberg: Controlling Spam by Secure Internet Content Selection. SCN 2004: 337-350 |
36 | EE | Amir Herzberg, Yosi Mass: Relying Party Credentials Framework. Electronic Commerce Research 4(1-2): 23-39 (2004) |
2003 | ||
35 | EE | Amir Herzberg: Payments and banking with mobile personal devices. Commun. ACM 46(5): 53-58 (2003) |
34 | EE | Amotz Bar-Noy, Juan A. Garay, Amir Herzberg: Sharing Video on Demand. Discrete Applied Mathematics 129(1): 3-30 (2003) |
2001 | ||
33 | EE | Amir Herzberg, Yosi Mass: Relying Party Credentials Framework. CT-RSA 2001: 328-343 |
2000 | ||
32 | EE | Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid: Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. IEEE Symposium on Security and Privacy 2000: 2-14 |
31 | EE | Boaz Barak, Shai Halevi, Amir Herzberg, Dalit Naor: Clock synchronization with faults and recoveries (extended abstract). PODC 2000: 133-142 |
30 | EE | Ran Canetti, Shai Halevi, Amir Herzberg: Maintaining Authenticated Communication in the Presence of Break-Ins. J. Cryptology 13(1): 61-105 (2000) |
29 | EE | Amir Herzberg, Shay Kutten: Early Detection of Message Forwarding Faults. SIAM J. Comput. 30(4): 1169-1196 (2000) |
1999 | ||
28 | EE | Boaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai: The Proactive Security Toolkit and Applications. ACM Conference on Computer and Communications Security 1999: 18-27 |
27 | EE | Yosi Mass, Amir Herzberg: VRCommerce - electronic commerce in virtual reality. ACM Conference on Electronic Commerce 1999: 103-109 |
26 | EE | Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik: Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999) |
1998 | ||
25 | Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk: A Security Architecture for the Internet Protocol. IBM Systems Journal 37(1): 42-60 (1998) | |
24 | Amir Herzberg, Dalit Naor: Surf'N'Sign: Client Signatures on Web Documents. IBM Systems Journal 37(1): 61-71 (1998) | |
23 | Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly Secure Key Distribution for Dynamic Conferences. Inf. Comput. 146(1): 1-23 (1998) | |
1997 | ||
22 | EE | Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Public Key and Signature Systems. ACM Conference on Computer and Communications Security 1997: 100-110 |
21 | Ran Canetti, Shai Halevi, Amir Herzberg: Maintaining Authenticated Communication in the Presence of Break-ins. PODC 1997: 15-24 | |
20 | EE | Amir Herzberg, Hilik Yochai: MiniPay: Charging per Plick on the Web. Computer Networks 29(8-13): 939-951 (1997) |
1996 | ||
19 | Hagit Attiya, Amir Herzberg, Sergio Rajsbaum: Optimal Clock Synchronization under Different Delay Assumptions. SIAM J. Comput. 25(2): 369-389 (1996) | |
1995 | ||
18 | EE | Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339-352 |
17 | Sudhanshu Aggarwal, Juan A. Garay, Amir Herzberg: Adaptive Video on Demand. ESA 1995: 538-553 | |
16 | Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk: Securing the Internet (Abstract). PODC 1995: 257 | |
15 | EE | Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: The KryptoKnight family of light-weight protocols for authentication and key distribution. IEEE/ACM Trans. Netw. 3(1): 31-41 (1995) |
1994 | ||
14 | EE | Ran Canetti, Amir Herzberg: Maintaining Security in the Presence of Transient Faults. CRYPTO 1994: 425-438 |
13 | Sudhanshu Aggarwal, Juan A. Garay, Amir Herzberg: Adaptive Video on Demand. PODC 1994: 402 | |
1993 | ||
12 | Hagit Attiya, Amir Herzberg, Sergio Rajsbaum: Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version). PODC 1993: 109-120 | |
11 | Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of a Family of Attack-Resistant Authentication Protocols. IEEE Journal on Selected Areas in Communications 11(5): 679-693 (1993) | |
1992 | ||
10 | EE | Amir Herzberg, Michael Luby: Pubic Randomness in Cryptography. CRYPTO 1992: 421-432 |
9 | EE | Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. CRYPTO 1992: 471-486 |
8 | Amir Herzberg: Connection-Based Communication in Dynamic Networks (Extended Abstract). PODC 1992: 13-24 | |
1991 | ||
7 | EE | Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of Two-Party Authentication Protocols. CRYPTO 1991: 44-61 |
1990 | ||
6 | EE | Baruch Awerbuch, Oded Goldreich, Amir Herzberg: A Quantitative Approach to Dynamic Networks. PODC 1990: 189-203 |
1989 | ||
5 | Amir Herzberg, Shay Kutten: Fast Isolation of Arbitrary Forwarding Faults. PODC 1989: 339-353 | |
4 | Oded Goldreich, Amir Herzberg, Yishay Mansour: Source to Destination Communication in the Presence of Faults. PODC 1989: 85-101 | |
1988 | ||
3 | Amir Herzberg: Network management in the presence of faults. ICCC 1988: 512-517 | |
1987 | ||
2 | EE | Amir Herzberg, Shlomit S. Pinter: Public Protection of Software. ACM Trans. Comput. Syst. 5(4): 371-393 (1987) |
1985 | ||
1 | EE | Amir Herzberg, Shlomit S. Pinter: Public Protection of Software. CRYPTO 1985: 158-179 |