The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Amir Herzberg: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sudhanshu Aggarwal, Juan A. Garay, Amir Herzberg
    Adaptive Video on Demand. [Citation Graph (1, 0)][DBLP]
    ESA, 1995, pp:538-553 [Conf]
  2. Boaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai
    The Proactive Security Toolkit and Applications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:18-27 [Conf]
  3. Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
    Proactive Public Key and Signature Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1997, pp:100-110 [Conf]
  4. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
    Systematic Design of Two-Party Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:44-61 [Conf]
  5. Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung
    Perfectly-Secure Key Distribution for Dynamic Conferences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:471-486 [Conf]
  6. Ran Canetti, Amir Herzberg
    Maintaining Security in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:425-438 [Conf]
  7. Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung
    Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:339-352 [Conf]
  8. Amir Herzberg, Michael Luby
    Pubic Randomness in Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:421-432 [Conf]
  9. Amir Herzberg, Shlomit S. Pinter
    Public Protection of Software. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:158-179 [Conf]
  10. Amir Herzberg
    On Tolerant Cryptographic Constructions. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:172-190 [Conf]
  11. Amir Herzberg, Yosi Mass
    Relying Party Credentials Framework. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:328-343 [Conf]
  12. Amir Herzberg
    Web Spoofing and Phishing Attacks and Their Prevention. [Citation Graph (0, 0)][DBLP]
    ENC, 2004, pp:3- [Conf]
  13. Amir Herzberg
    Network management in the presence of faults. [Citation Graph (0, 0)][DBLP]
    ICCC, 1988, pp:512-517 [Conf]
  14. Hagit Attiya, Amir Herzberg, Sergio Rajsbaum
    Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version). [Citation Graph (0, 0)][DBLP]
    PODC, 1993, pp:109-120 [Conf]
  15. Baruch Awerbuch, Oded Goldreich, Amir Herzberg
    A Quantitative Approach to Dynamic Networks. [Citation Graph (0, 0)][DBLP]
    PODC, 1990, pp:189-203 [Conf]
  16. Sudhanshu Aggarwal, Juan A. Garay, Amir Herzberg
    Adaptive Video on Demand. [Citation Graph (0, 0)][DBLP]
    PODC, 1994, pp:402- [Conf]
  17. Boaz Barak, Shai Halevi, Amir Herzberg, Dalit Naor
    Clock synchronization with faults and recoveries (extended abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 2000, pp:133-142 [Conf]
  18. Ran Canetti, Shai Halevi, Amir Herzberg
    Maintaining Authenticated Communication in the Presence of Break-ins. [Citation Graph (0, 0)][DBLP]
    PODC, 1997, pp:15-24 [Conf]
  19. Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
    Securing the Internet (Abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 1995, pp:257- [Conf]
  20. Oded Goldreich, Amir Herzberg, Yishay Mansour
    Source to Destination Communication in the Presence of Faults. [Citation Graph (0, 0)][DBLP]
    PODC, 1989, pp:85-101 [Conf]
  21. Amir Herzberg
    Connection-Based Communication in Dynamic Networks (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    PODC, 1992, pp:13-24 [Conf]
  22. Amir Herzberg, Shay Kutten
    Fast Isolation of Arbitrary Forwarding Faults. [Citation Graph (0, 0)][DBLP]
    PODC, 1989, pp:339-353 [Conf]
  23. Amir Herzberg
    Controlling Spam by Secure Internet Content Selection. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:337-350 [Conf]
  24. Amir Herzberg, Igal Yoffe
    On Secure Orders in the Presence of Faults. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:126-140 [Conf]
  25. Amir Herzberg, Igal Yoffe
    Layered Architecture for Secure E-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:118-125 [Conf]
  26. Yosi Mass, Amir Herzberg
    VRCommerce - electronic commerce in virtual reality. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 1999, pp:103-109 [Conf]
  27. Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid
    Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:2-14 [Conf]
  28. Gal Badishi, Amir Herzberg, Idit Keidar
    Keeping Denial-of-Service Attackers in the Dark. [Citation Graph (0, 0)][DBLP]
    DISC, 2005, pp:18-32 [Conf]
  29. Amir Herzberg
    Securing the Net: Challenges, Failures and Directions. [Citation Graph (0, 0)][DBLP]
    DISC, 2005, pp:2- [Conf]
  30. Amir Herzberg
    Payments and banking with mobile personal devices. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:5, pp:53-58 [Journal]
  31. Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik
    Untraceable mobility or how to travel incognito. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:871-884 [Journal]
  32. Amir Herzberg, Hilik Yochai
    MiniPay: Charging per Plick on the Web. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1997, v:29, n:8-13, pp:939-951 [Journal]
  33. Amotz Bar-Noy, Juan A. Garay, Amir Herzberg
    Sharing Video on Demand. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2003, v:129, n:1, pp:3-30 [Journal]
  34. Amir Herzberg, Yosi Mass
    Relying Party Credentials Framework. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2004, v:4, n:1-2, pp:23-39 [Journal]
  35. Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung
    Perfectly Secure Key Distribution for Dynamic Conferences. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1998, v:146, n:1, pp:1-23 [Journal]
  36. Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
    A Security Architecture for the Internet Protocol. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1998, v:37, n:1, pp:42-60 [Journal]
  37. Amir Herzberg, Dalit Naor
    Surf'N'Sign: Client Signatures on Web Documents. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1998, v:37, n:1, pp:61-71 [Journal]
  38. Ran Canetti, Shai Halevi, Amir Herzberg
    Maintaining Authenticated Communication in the Presence of Break-Ins. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:1, pp:61-105 [Journal]
  39. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
    Systematic Design of a Family of Attack-Resistant Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:679-693 [Journal]
  40. Hagit Attiya, Amir Herzberg, Sergio Rajsbaum
    Optimal Clock Synchronization under Different Delay Assumptions. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1996, v:25, n:2, pp:369-389 [Journal]
  41. Amir Herzberg, Shay Kutten
    Early Detection of Message Forwarding Faults. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2000, v:30, n:4, pp:1169-1196 [Journal]
  42. Amir Herzberg, Shlomit S. Pinter
    Public Protection of Software. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1987, v:5, n:4, pp:371-393 [Journal]
  43. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
    The KryptoKnight family of light-weight protocols for authentication and key distribution. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1995, v:3, n:1, pp:31-41 [Journal]
  44. Gal Badishi, Amir Herzberg, Idit Keidar
    Keeping Denial-of-Service Attackers in the Dark. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:191-204 [Journal]

  45. Denial of Service Protection with Beaver. [Citation Graph (, )][DBLP]


  46. Lightweight Opportunistic Tunneling (LOT). [Citation Graph (, )][DBLP]


  47. Towards a Theory of White-Box Security. [Citation Graph (, )][DBLP]


  48. Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. [Citation Graph (, )][DBLP]


  49. An Empirical Study of Denial of Service Mitigation Techniques. [Citation Graph (, )][DBLP]


  50. The Layered Games Framework for Specifications and Analysis of Security Protocols. [Citation Graph (, )][DBLP]


  51. Robust Combiners for Software Hardening. [Citation Graph (, )][DBLP]


  52. Why Johnny can't surf (safely)? Attacks and defenses for web users. [Citation Graph (, )][DBLP]


  53. Stealth-MITM DoS Attacks on Secure Channels [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002