2008 |
49 | EE | Gal Badishi,
Amir Herzberg,
Idit Keidar,
Oleg Romanov,
Avital Yachin:
An Empirical Study of Denial of Service Mitigation Techniques.
SRDS 2008: 115-124 |
48 | EE | Amir Herzberg,
Igal Yoffe:
The Layered Games Framework for Specifications and Analysis of Security Protocols.
TCC 2008: 125-141 |
47 | EE | Amir Herzberg,
Ahmad Jbara:
Security and identification indicators for browsers against spoofing and phishing attacks.
ACM Trans. Internet Techn. 8(4): (2008) |
46 | EE | Amir Herzberg,
Igal Yoffe:
The layered games framework for specifications and analysis of security protocols.
IJACT 1(2): 144-159 (2008) |
2007 |
45 | EE | Gal Badishi,
Amir Herzberg,
Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark.
IEEE Trans. Dependable Sec. Comput. 4(3): 191-204 (2007) |
2006 |
44 | EE | Gal Badishi,
Idit Keidar,
Amir Herzberg,
Oleg Romanov,
Avital Yachin:
Denial of Service Protection with Beaver.
From Security to Dependability 2006 |
43 | EE | Amir Herzberg,
Igal Yoffe:
On Secure Orders in the Presence of Faults.
SCN 2006: 126-140 |
42 | | Amir Herzberg,
Igal Yoffe:
Layered Architecture for Secure E-Commerce Applications.
SECRYPT 2006: 118-125 |
2005 |
41 | EE | Amir Herzberg:
On Tolerant Cryptographic Constructions.
CT-RSA 2005: 172-190 |
40 | EE | Gal Badishi,
Amir Herzberg,
Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark.
DISC 2005: 18-32 |
39 | EE | Amir Herzberg:
Securing the Net: Challenges, Failures and Directions.
DISC 2005: 2 |
2004 |
38 | EE | Amir Herzberg:
Web Spoofing and Phishing Attacks and Their Prevention.
ENC 2004: 3 |
37 | EE | Amir Herzberg:
Controlling Spam by Secure Internet Content Selection.
SCN 2004: 337-350 |
36 | EE | Amir Herzberg,
Yosi Mass:
Relying Party Credentials Framework.
Electronic Commerce Research 4(1-2): 23-39 (2004) |
2003 |
35 | EE | Amir Herzberg:
Payments and banking with mobile personal devices.
Commun. ACM 46(5): 53-58 (2003) |
34 | EE | Amotz Bar-Noy,
Juan A. Garay,
Amir Herzberg:
Sharing Video on Demand.
Discrete Applied Mathematics 129(1): 3-30 (2003) |
2001 |
33 | EE | Amir Herzberg,
Yosi Mass:
Relying Party Credentials Framework.
CT-RSA 2001: 328-343 |
2000 |
32 | EE | Amir Herzberg,
Yosi Mass,
Joris Mihaeli,
Dalit Naor,
Yiftach Ravid:
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers.
IEEE Symposium on Security and Privacy 2000: 2-14 |
31 | EE | Boaz Barak,
Shai Halevi,
Amir Herzberg,
Dalit Naor:
Clock synchronization with faults and recoveries (extended abstract).
PODC 2000: 133-142 |
30 | EE | Ran Canetti,
Shai Halevi,
Amir Herzberg:
Maintaining Authenticated Communication in the Presence of Break-Ins.
J. Cryptology 13(1): 61-105 (2000) |
29 | EE | Amir Herzberg,
Shay Kutten:
Early Detection of Message Forwarding Faults.
SIAM J. Comput. 30(4): 1169-1196 (2000) |
1999 |
28 | EE | Boaz Barak,
Amir Herzberg,
Dalit Naor,
Eldad Shai:
The Proactive Security Toolkit and Applications.
ACM Conference on Computer and Communications Security 1999: 18-27 |
27 | EE | Yosi Mass,
Amir Herzberg:
VRCommerce - electronic commerce in virtual reality.
ACM Conference on Electronic Commerce 1999: 103-109 |
26 | EE | Giuseppe Ateniese,
Amir Herzberg,
Hugo Krawczyk,
Gene Tsudik:
Untraceable mobility or how to travel incognito.
Computer Networks 31(8): 871-884 (1999) |
1998 |
25 | | Pau-Chen Cheng,
Juan A. Garay,
Amir Herzberg,
Hugo Krawczyk:
A Security Architecture for the Internet Protocol.
IBM Systems Journal 37(1): 42-60 (1998) |
24 | | Amir Herzberg,
Dalit Naor:
Surf'N'Sign: Client Signatures on Web Documents.
IBM Systems Journal 37(1): 61-71 (1998) |
23 | | Carlo Blundo,
Alfredo De Santis,
Amir Herzberg,
Shay Kutten,
Ugo Vaccaro,
Moti Yung:
Perfectly Secure Key Distribution for Dynamic Conferences.
Inf. Comput. 146(1): 1-23 (1998) |
1997 |
22 | EE | Amir Herzberg,
Markus Jakobsson,
Stanislaw Jarecki,
Hugo Krawczyk,
Moti Yung:
Proactive Public Key and Signature Systems.
ACM Conference on Computer and Communications Security 1997: 100-110 |
21 | | Ran Canetti,
Shai Halevi,
Amir Herzberg:
Maintaining Authenticated Communication in the Presence of Break-ins.
PODC 1997: 15-24 |
20 | EE | Amir Herzberg,
Hilik Yochai:
MiniPay: Charging per Plick on the Web.
Computer Networks 29(8-13): 939-951 (1997) |
1996 |
19 | | Hagit Attiya,
Amir Herzberg,
Sergio Rajsbaum:
Optimal Clock Synchronization under Different Delay Assumptions.
SIAM J. Comput. 25(2): 369-389 (1996) |
1995 |
18 | EE | Amir Herzberg,
Stanislaw Jarecki,
Hugo Krawczyk,
Moti Yung:
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
CRYPTO 1995: 339-352 |
17 | | Sudhanshu Aggarwal,
Juan A. Garay,
Amir Herzberg:
Adaptive Video on Demand.
ESA 1995: 538-553 |
16 | | Pau-Chen Cheng,
Juan A. Garay,
Amir Herzberg,
Hugo Krawczyk:
Securing the Internet (Abstract).
PODC 1995: 257 |
15 | EE | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw. 3(1): 31-41 (1995) |
1994 |
14 | EE | Ran Canetti,
Amir Herzberg:
Maintaining Security in the Presence of Transient Faults.
CRYPTO 1994: 425-438 |
13 | | Sudhanshu Aggarwal,
Juan A. Garay,
Amir Herzberg:
Adaptive Video on Demand.
PODC 1994: 402 |
1993 |
12 | | Hagit Attiya,
Amir Herzberg,
Sergio Rajsbaum:
Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version).
PODC 1993: 109-120 |
11 | | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
Systematic Design of a Family of Attack-Resistant Authentication Protocols.
IEEE Journal on Selected Areas in Communications 11(5): 679-693 (1993) |
1992 |
10 | EE | Amir Herzberg,
Michael Luby:
Pubic Randomness in Cryptography.
CRYPTO 1992: 421-432 |
9 | EE | Carlo Blundo,
Alfredo De Santis,
Amir Herzberg,
Shay Kutten,
Ugo Vaccaro,
Moti Yung:
Perfectly-Secure Key Distribution for Dynamic Conferences.
CRYPTO 1992: 471-486 |
8 | | Amir Herzberg:
Connection-Based Communication in Dynamic Networks (Extended Abstract).
PODC 1992: 13-24 |
1991 |
7 | EE | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
Systematic Design of Two-Party Authentication Protocols.
CRYPTO 1991: 44-61 |
1990 |
6 | EE | Baruch Awerbuch,
Oded Goldreich,
Amir Herzberg:
A Quantitative Approach to Dynamic Networks.
PODC 1990: 189-203 |
1989 |
5 | | Amir Herzberg,
Shay Kutten:
Fast Isolation of Arbitrary Forwarding Faults.
PODC 1989: 339-353 |
4 | | Oded Goldreich,
Amir Herzberg,
Yishay Mansour:
Source to Destination Communication in the Presence of Faults.
PODC 1989: 85-101 |
1988 |
3 | | Amir Herzberg:
Network management in the presence of faults.
ICCC 1988: 512-517 |
1987 |
2 | EE | Amir Herzberg,
Shlomit S. Pinter:
Public Protection of Software.
ACM Trans. Comput. Syst. 5(4): 371-393 (1987) |
1985 |
1 | EE | Amir Herzberg,
Shlomit S. Pinter:
Public Protection of Software.
CRYPTO 1985: 158-179 |