| 2008 |
| 49 | EE | Gal Badishi,
Amir Herzberg,
Idit Keidar,
Oleg Romanov,
Avital Yachin:
An Empirical Study of Denial of Service Mitigation Techniques.
SRDS 2008: 115-124 |
| 48 | EE | Amir Herzberg,
Igal Yoffe:
The Layered Games Framework for Specifications and Analysis of Security Protocols.
TCC 2008: 125-141 |
| 47 | EE | Amir Herzberg,
Ahmad Jbara:
Security and identification indicators for browsers against spoofing and phishing attacks.
ACM Trans. Internet Techn. 8(4): (2008) |
| 46 | EE | Amir Herzberg,
Igal Yoffe:
The layered games framework for specifications and analysis of security protocols.
IJACT 1(2): 144-159 (2008) |
| 2007 |
| 45 | EE | Gal Badishi,
Amir Herzberg,
Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark.
IEEE Trans. Dependable Sec. Comput. 4(3): 191-204 (2007) |
| 2006 |
| 44 | EE | Gal Badishi,
Idit Keidar,
Amir Herzberg,
Oleg Romanov,
Avital Yachin:
Denial of Service Protection with Beaver.
From Security to Dependability 2006 |
| 43 | EE | Amir Herzberg,
Igal Yoffe:
On Secure Orders in the Presence of Faults.
SCN 2006: 126-140 |
| 42 | | Amir Herzberg,
Igal Yoffe:
Layered Architecture for Secure E-Commerce Applications.
SECRYPT 2006: 118-125 |
| 2005 |
| 41 | EE | Amir Herzberg:
On Tolerant Cryptographic Constructions.
CT-RSA 2005: 172-190 |
| 40 | EE | Gal Badishi,
Amir Herzberg,
Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark.
DISC 2005: 18-32 |
| 39 | EE | Amir Herzberg:
Securing the Net: Challenges, Failures and Directions.
DISC 2005: 2 |
| 2004 |
| 38 | EE | Amir Herzberg:
Web Spoofing and Phishing Attacks and Their Prevention.
ENC 2004: 3 |
| 37 | EE | Amir Herzberg:
Controlling Spam by Secure Internet Content Selection.
SCN 2004: 337-350 |
| 36 | EE | Amir Herzberg,
Yosi Mass:
Relying Party Credentials Framework.
Electronic Commerce Research 4(1-2): 23-39 (2004) |
| 2003 |
| 35 | EE | Amir Herzberg:
Payments and banking with mobile personal devices.
Commun. ACM 46(5): 53-58 (2003) |
| 34 | EE | Amotz Bar-Noy,
Juan A. Garay,
Amir Herzberg:
Sharing Video on Demand.
Discrete Applied Mathematics 129(1): 3-30 (2003) |
| 2001 |
| 33 | EE | Amir Herzberg,
Yosi Mass:
Relying Party Credentials Framework.
CT-RSA 2001: 328-343 |
| 2000 |
| 32 | EE | Amir Herzberg,
Yosi Mass,
Joris Mihaeli,
Dalit Naor,
Yiftach Ravid:
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers.
IEEE Symposium on Security and Privacy 2000: 2-14 |
| 31 | EE | Boaz Barak,
Shai Halevi,
Amir Herzberg,
Dalit Naor:
Clock synchronization with faults and recoveries (extended abstract).
PODC 2000: 133-142 |
| 30 | EE | Ran Canetti,
Shai Halevi,
Amir Herzberg:
Maintaining Authenticated Communication in the Presence of Break-Ins.
J. Cryptology 13(1): 61-105 (2000) |
| 29 | EE | Amir Herzberg,
Shay Kutten:
Early Detection of Message Forwarding Faults.
SIAM J. Comput. 30(4): 1169-1196 (2000) |
| 1999 |
| 28 | EE | Boaz Barak,
Amir Herzberg,
Dalit Naor,
Eldad Shai:
The Proactive Security Toolkit and Applications.
ACM Conference on Computer and Communications Security 1999: 18-27 |
| 27 | EE | Yosi Mass,
Amir Herzberg:
VRCommerce - electronic commerce in virtual reality.
ACM Conference on Electronic Commerce 1999: 103-109 |
| 26 | EE | Giuseppe Ateniese,
Amir Herzberg,
Hugo Krawczyk,
Gene Tsudik:
Untraceable mobility or how to travel incognito.
Computer Networks 31(8): 871-884 (1999) |
| 1998 |
| 25 | | Pau-Chen Cheng,
Juan A. Garay,
Amir Herzberg,
Hugo Krawczyk:
A Security Architecture for the Internet Protocol.
IBM Systems Journal 37(1): 42-60 (1998) |
| 24 | | Amir Herzberg,
Dalit Naor:
Surf'N'Sign: Client Signatures on Web Documents.
IBM Systems Journal 37(1): 61-71 (1998) |
| 23 | | Carlo Blundo,
Alfredo De Santis,
Amir Herzberg,
Shay Kutten,
Ugo Vaccaro,
Moti Yung:
Perfectly Secure Key Distribution for Dynamic Conferences.
Inf. Comput. 146(1): 1-23 (1998) |
| 1997 |
| 22 | EE | Amir Herzberg,
Markus Jakobsson,
Stanislaw Jarecki,
Hugo Krawczyk,
Moti Yung:
Proactive Public Key and Signature Systems.
ACM Conference on Computer and Communications Security 1997: 100-110 |
| 21 | | Ran Canetti,
Shai Halevi,
Amir Herzberg:
Maintaining Authenticated Communication in the Presence of Break-ins.
PODC 1997: 15-24 |
| 20 | EE | Amir Herzberg,
Hilik Yochai:
MiniPay: Charging per Plick on the Web.
Computer Networks 29(8-13): 939-951 (1997) |
| 1996 |
| 19 | | Hagit Attiya,
Amir Herzberg,
Sergio Rajsbaum:
Optimal Clock Synchronization under Different Delay Assumptions.
SIAM J. Comput. 25(2): 369-389 (1996) |
| 1995 |
| 18 | EE | Amir Herzberg,
Stanislaw Jarecki,
Hugo Krawczyk,
Moti Yung:
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
CRYPTO 1995: 339-352 |
| 17 | | Sudhanshu Aggarwal,
Juan A. Garay,
Amir Herzberg:
Adaptive Video on Demand.
ESA 1995: 538-553 |
| 16 | | Pau-Chen Cheng,
Juan A. Garay,
Amir Herzberg,
Hugo Krawczyk:
Securing the Internet (Abstract).
PODC 1995: 257 |
| 15 | EE | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw. 3(1): 31-41 (1995) |
| 1994 |
| 14 | EE | Ran Canetti,
Amir Herzberg:
Maintaining Security in the Presence of Transient Faults.
CRYPTO 1994: 425-438 |
| 13 | | Sudhanshu Aggarwal,
Juan A. Garay,
Amir Herzberg:
Adaptive Video on Demand.
PODC 1994: 402 |
| 1993 |
| 12 | | Hagit Attiya,
Amir Herzberg,
Sergio Rajsbaum:
Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version).
PODC 1993: 109-120 |
| 11 | | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
Systematic Design of a Family of Attack-Resistant Authentication Protocols.
IEEE Journal on Selected Areas in Communications 11(5): 679-693 (1993) |
| 1992 |
| 10 | EE | Amir Herzberg,
Michael Luby:
Pubic Randomness in Cryptography.
CRYPTO 1992: 421-432 |
| 9 | EE | Carlo Blundo,
Alfredo De Santis,
Amir Herzberg,
Shay Kutten,
Ugo Vaccaro,
Moti Yung:
Perfectly-Secure Key Distribution for Dynamic Conferences.
CRYPTO 1992: 471-486 |
| 8 | | Amir Herzberg:
Connection-Based Communication in Dynamic Networks (Extended Abstract).
PODC 1992: 13-24 |
| 1991 |
| 7 | EE | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
Systematic Design of Two-Party Authentication Protocols.
CRYPTO 1991: 44-61 |
| 1990 |
| 6 | EE | Baruch Awerbuch,
Oded Goldreich,
Amir Herzberg:
A Quantitative Approach to Dynamic Networks.
PODC 1990: 189-203 |
| 1989 |
| 5 | | Amir Herzberg,
Shay Kutten:
Fast Isolation of Arbitrary Forwarding Faults.
PODC 1989: 339-353 |
| 4 | | Oded Goldreich,
Amir Herzberg,
Yishay Mansour:
Source to Destination Communication in the Presence of Faults.
PODC 1989: 85-101 |
| 1988 |
| 3 | | Amir Herzberg:
Network management in the presence of faults.
ICCC 1988: 512-517 |
| 1987 |
| 2 | EE | Amir Herzberg,
Shlomit S. Pinter:
Public Protection of Software.
ACM Trans. Comput. Syst. 5(4): 371-393 (1987) |
| 1985 |
| 1 | EE | Amir Herzberg,
Shlomit S. Pinter:
Public Protection of Software.
CRYPTO 1985: 158-179 |