|
Search the dblp DataBase
Amir Herzberg:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sudhanshu Aggarwal, Juan A. Garay, Amir Herzberg
Adaptive Video on Demand. [Citation Graph (1, 0)][DBLP] ESA, 1995, pp:538-553 [Conf]
- Boaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai
The Proactive Security Toolkit and Applications. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:18-27 [Conf]
- Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
Proactive Public Key and Signature Systems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1997, pp:100-110 [Conf]
- Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
Systematic Design of Two-Party Authentication Protocols. [Citation Graph (0, 0)][DBLP] CRYPTO, 1991, pp:44-61 [Conf]
- Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung
Perfectly-Secure Key Distribution for Dynamic Conferences. [Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:471-486 [Conf]
- Ran Canetti, Amir Herzberg
Maintaining Security in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP] CRYPTO, 1994, pp:425-438 [Conf]
- Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. [Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:339-352 [Conf]
- Amir Herzberg, Michael Luby
Pubic Randomness in Cryptography. [Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:421-432 [Conf]
- Amir Herzberg, Shlomit S. Pinter
Public Protection of Software. [Citation Graph (0, 0)][DBLP] CRYPTO, 1985, pp:158-179 [Conf]
- Amir Herzberg
On Tolerant Cryptographic Constructions. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:172-190 [Conf]
- Amir Herzberg, Yosi Mass
Relying Party Credentials Framework. [Citation Graph (0, 0)][DBLP] CT-RSA, 2001, pp:328-343 [Conf]
- Amir Herzberg
Web Spoofing and Phishing Attacks and Their Prevention. [Citation Graph (0, 0)][DBLP] ENC, 2004, pp:3- [Conf]
- Amir Herzberg
Network management in the presence of faults. [Citation Graph (0, 0)][DBLP] ICCC, 1988, pp:512-517 [Conf]
- Hagit Attiya, Amir Herzberg, Sergio Rajsbaum
Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version). [Citation Graph (0, 0)][DBLP] PODC, 1993, pp:109-120 [Conf]
- Baruch Awerbuch, Oded Goldreich, Amir Herzberg
A Quantitative Approach to Dynamic Networks. [Citation Graph (0, 0)][DBLP] PODC, 1990, pp:189-203 [Conf]
- Sudhanshu Aggarwal, Juan A. Garay, Amir Herzberg
Adaptive Video on Demand. [Citation Graph (0, 0)][DBLP] PODC, 1994, pp:402- [Conf]
- Boaz Barak, Shai Halevi, Amir Herzberg, Dalit Naor
Clock synchronization with faults and recoveries (extended abstract). [Citation Graph (0, 0)][DBLP] PODC, 2000, pp:133-142 [Conf]
- Ran Canetti, Shai Halevi, Amir Herzberg
Maintaining Authenticated Communication in the Presence of Break-ins. [Citation Graph (0, 0)][DBLP] PODC, 1997, pp:15-24 [Conf]
- Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
Securing the Internet (Abstract). [Citation Graph (0, 0)][DBLP] PODC, 1995, pp:257- [Conf]
- Oded Goldreich, Amir Herzberg, Yishay Mansour
Source to Destination Communication in the Presence of Faults. [Citation Graph (0, 0)][DBLP] PODC, 1989, pp:85-101 [Conf]
- Amir Herzberg
Connection-Based Communication in Dynamic Networks (Extended Abstract). [Citation Graph (0, 0)][DBLP] PODC, 1992, pp:13-24 [Conf]
- Amir Herzberg, Shay Kutten
Fast Isolation of Arbitrary Forwarding Faults. [Citation Graph (0, 0)][DBLP] PODC, 1989, pp:339-353 [Conf]
- Amir Herzberg
Controlling Spam by Secure Internet Content Selection. [Citation Graph (0, 0)][DBLP] SCN, 2004, pp:337-350 [Conf]
- Amir Herzberg, Igal Yoffe
On Secure Orders in the Presence of Faults. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:126-140 [Conf]
- Amir Herzberg, Igal Yoffe
Layered Architecture for Secure E-Commerce Applications. [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:118-125 [Conf]
- Yosi Mass, Amir Herzberg
VRCommerce - electronic commerce in virtual reality. [Citation Graph (0, 0)][DBLP] ACM Conference on Electronic Commerce, 1999, pp:103-109 [Conf]
- Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2000, pp:2-14 [Conf]
- Gal Badishi, Amir Herzberg, Idit Keidar
Keeping Denial-of-Service Attackers in the Dark. [Citation Graph (0, 0)][DBLP] DISC, 2005, pp:18-32 [Conf]
- Amir Herzberg
Securing the Net: Challenges, Failures and Directions. [Citation Graph (0, 0)][DBLP] DISC, 2005, pp:2- [Conf]
- Amir Herzberg
Payments and banking with mobile personal devices. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:5, pp:53-58 [Journal]
- Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik
Untraceable mobility or how to travel incognito. [Citation Graph (0, 0)][DBLP] Computer Networks, 1999, v:31, n:8, pp:871-884 [Journal]
- Amir Herzberg, Hilik Yochai
MiniPay: Charging per Plick on the Web. [Citation Graph (0, 0)][DBLP] Computer Networks, 1997, v:29, n:8-13, pp:939-951 [Journal]
- Amotz Bar-Noy, Juan A. Garay, Amir Herzberg
Sharing Video on Demand. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2003, v:129, n:1, pp:3-30 [Journal]
- Amir Herzberg, Yosi Mass
Relying Party Credentials Framework. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research, 2004, v:4, n:1-2, pp:23-39 [Journal]
- Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung
Perfectly Secure Key Distribution for Dynamic Conferences. [Citation Graph (0, 0)][DBLP] Inf. Comput., 1998, v:146, n:1, pp:1-23 [Journal]
- Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
A Security Architecture for the Internet Protocol. [Citation Graph (0, 0)][DBLP] IBM Systems Journal, 1998, v:37, n:1, pp:42-60 [Journal]
- Amir Herzberg, Dalit Naor
Surf'N'Sign: Client Signatures on Web Documents. [Citation Graph (0, 0)][DBLP] IBM Systems Journal, 1998, v:37, n:1, pp:61-71 [Journal]
- Ran Canetti, Shai Halevi, Amir Herzberg
Maintaining Authenticated Communication in the Presence of Break-Ins. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2000, v:13, n:1, pp:61-105 [Journal]
- Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
Systematic Design of a Family of Attack-Resistant Authentication Protocols. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:679-693 [Journal]
- Hagit Attiya, Amir Herzberg, Sergio Rajsbaum
Optimal Clock Synchronization under Different Delay Assumptions. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1996, v:25, n:2, pp:369-389 [Journal]
- Amir Herzberg, Shay Kutten
Early Detection of Message Forwarding Faults. [Citation Graph (0, 0)][DBLP] SIAM J. Comput., 2000, v:30, n:4, pp:1169-1196 [Journal]
- Amir Herzberg, Shlomit S. Pinter
Public Protection of Software. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 1987, v:5, n:4, pp:371-393 [Journal]
- Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
The KryptoKnight family of light-weight protocols for authentication and key distribution. [Citation Graph (0, 0)][DBLP] IEEE/ACM Trans. Netw., 1995, v:3, n:1, pp:31-41 [Journal]
- Gal Badishi, Amir Herzberg, Idit Keidar
Keeping Denial-of-Service Attackers in the Dark. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:191-204 [Journal]
Denial of Service Protection with Beaver. [Citation Graph (, )][DBLP]
Lightweight Opportunistic Tunneling (LOT). [Citation Graph (, )][DBLP]
Towards a Theory of White-Box Security. [Citation Graph (, )][DBLP]
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. [Citation Graph (, )][DBLP]
An Empirical Study of Denial of Service Mitigation Techniques. [Citation Graph (, )][DBLP]
The Layered Games Framework for Specifications and Analysis of Security Protocols. [Citation Graph (, )][DBLP]
Robust Combiners for Software Hardening. [Citation Graph (, )][DBLP]
Why Johnny can't surf (safely)? Attacks and defenses for web users. [Citation Graph (, )][DBLP]
Stealth-MITM DoS Attacks on Secure Channels [Citation Graph (, )][DBLP]
Search in 0.008secs, Finished in 0.011secs
|