dblp.uni-trier.dewww.uni-trier.de

Amir Herzberg Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
54EEYossi Gilad, Amir Herzberg: Lightweight Opportunistic Tunneling (LOT). ESORICS 2009: 104-119
53EEAmir Herzberg: Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. SEC 2009: 13-24
52EEAmir Herzberg, Haya Shulman, Amitabh Saxena, Bruno Crispo: Towards a Theory of White-Box Security. SEC 2009: 342-352
51EEAmir Herzberg, Haya Shulman: Stealth-MITM DoS Attacks on Secure Channels CoRR abs/0910.3511: (2009)
50EEAmir Herzberg: Folklore, practice and theory of robust combiners. Journal of Computer Security 17(2): 159-189 (2009)
2008
49EEGal Badishi, Amir Herzberg, Idit Keidar, Oleg Romanov, Avital Yachin: An Empirical Study of Denial of Service Mitigation Techniques. SRDS 2008: 115-124
48EEAmir Herzberg, Igal Yoffe: The Layered Games Framework for Specifications and Analysis of Security Protocols. TCC 2008: 125-141
47EEAmir Herzberg, Ahmad Jbara: Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Techn. 8(4): (2008)
46EEAmir Herzberg, Igal Yoffe: The layered games framework for specifications and analysis of security protocols. IJACT 1(2): 144-159 (2008)
2007
45EEGal Badishi, Amir Herzberg, Idit Keidar: Keeping Denial-of-Service Attackers in the Dark. IEEE Trans. Dependable Sec. Comput. 4(3): 191-204 (2007)
2006
44EEGal Badishi, Idit Keidar, Amir Herzberg, Oleg Romanov, Avital Yachin: Denial of Service Protection with Beaver. From Security to Dependability 2006
43EEAmir Herzberg, Igal Yoffe: On Secure Orders in the Presence of Faults. SCN 2006: 126-140
42 Amir Herzberg, Igal Yoffe: Layered Architecture for Secure E-Commerce Applications. SECRYPT 2006: 118-125
2005
41EEAmir Herzberg: On Tolerant Cryptographic Constructions. CT-RSA 2005: 172-190
40EEGal Badishi, Amir Herzberg, Idit Keidar: Keeping Denial-of-Service Attackers in the Dark. DISC 2005: 18-32
39EEAmir Herzberg: Securing the Net: Challenges, Failures and Directions. DISC 2005: 2
2004
38EEAmir Herzberg: Web Spoofing and Phishing Attacks and Their Prevention. ENC 2004: 3
37EEAmir Herzberg: Controlling Spam by Secure Internet Content Selection. SCN 2004: 337-350
36EEAmir Herzberg, Yosi Mass: Relying Party Credentials Framework. Electronic Commerce Research 4(1-2): 23-39 (2004)
2003
35EEAmir Herzberg: Payments and banking with mobile personal devices. Commun. ACM 46(5): 53-58 (2003)
34EEAmotz Bar-Noy, Juan A. Garay, Amir Herzberg: Sharing Video on Demand. Discrete Applied Mathematics 129(1): 3-30 (2003)
2001
33EEAmir Herzberg, Yosi Mass: Relying Party Credentials Framework. CT-RSA 2001: 328-343
2000
32EEAmir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid: Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. IEEE Symposium on Security and Privacy 2000: 2-14
31EEBoaz Barak, Shai Halevi, Amir Herzberg, Dalit Naor: Clock synchronization with faults and recoveries (extended abstract). PODC 2000: 133-142
30EERan Canetti, Shai Halevi, Amir Herzberg: Maintaining Authenticated Communication in the Presence of Break-Ins. J. Cryptology 13(1): 61-105 (2000)
29EEAmir Herzberg, Shay Kutten: Early Detection of Message Forwarding Faults. SIAM J. Comput. 30(4): 1169-1196 (2000)
1999
28EEBoaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai: The Proactive Security Toolkit and Applications. ACM Conference on Computer and Communications Security 1999: 18-27
27EEYosi Mass, Amir Herzberg: VRCommerce - electronic commerce in virtual reality. ACM Conference on Electronic Commerce 1999: 103-109
26EEGiuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik: Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999)
1998
25 Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk: A Security Architecture for the Internet Protocol. IBM Systems Journal 37(1): 42-60 (1998)
24 Amir Herzberg, Dalit Naor: Surf'N'Sign: Client Signatures on Web Documents. IBM Systems Journal 37(1): 61-71 (1998)
23 Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly Secure Key Distribution for Dynamic Conferences. Inf. Comput. 146(1): 1-23 (1998)
1997
22EEAmir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Public Key and Signature Systems. ACM Conference on Computer and Communications Security 1997: 100-110
21 Ran Canetti, Shai Halevi, Amir Herzberg: Maintaining Authenticated Communication in the Presence of Break-ins. PODC 1997: 15-24
20EEAmir Herzberg, Hilik Yochai: MiniPay: Charging per Plick on the Web. Computer Networks 29(8-13): 939-951 (1997)
1996
19 Hagit Attiya, Amir Herzberg, Sergio Rajsbaum: Optimal Clock Synchronization under Different Delay Assumptions. SIAM J. Comput. 25(2): 369-389 (1996)
1995
18EEAmir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung: Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339-352
17EESudhanshu Aggarwal, Juan A. Garay, Amir Herzberg: Adaptive Video on Demand. ESA 1995: 538-553
16 Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk: Securing the Internet (Abstract). PODC 1995: 257
15EERay Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: The KryptoKnight family of light-weight protocols for authentication and key distribution. IEEE/ACM Trans. Netw. 3(1): 31-41 (1995)
1994
14EERan Canetti, Amir Herzberg: Maintaining Security in the Presence of Transient Faults. CRYPTO 1994: 425-438
13 Sudhanshu Aggarwal, Juan A. Garay, Amir Herzberg: Adaptive Video on Demand. PODC 1994: 402
1993
12 Hagit Attiya, Amir Herzberg, Sergio Rajsbaum: Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version). PODC 1993: 109-120
11 Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of a Family of Attack-Resistant Authentication Protocols. IEEE Journal on Selected Areas in Communications 11(5): 679-693 (1993)
1992
10EEAmir Herzberg, Michael Luby: Pubic Randomness in Cryptography. CRYPTO 1992: 421-432
9EECarlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung: Perfectly-Secure Key Distribution for Dynamic Conferences. CRYPTO 1992: 471-486
8 Amir Herzberg: Connection-Based Communication in Dynamic Networks (Extended Abstract). PODC 1992: 13-24
1991
7EERay Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of Two-Party Authentication Protocols. CRYPTO 1991: 44-61
1990
6EEBaruch Awerbuch, Oded Goldreich, Amir Herzberg: A Quantitative Approach to Dynamic Networks. PODC 1990: 189-203
1989
5 Amir Herzberg, Shay Kutten: Fast Isolation of Arbitrary Forwarding Faults. PODC 1989: 339-353
4 Oded Goldreich, Amir Herzberg, Yishay Mansour: Source to Destination Communication in the Presence of Faults. PODC 1989: 85-101
1988
3 Amir Herzberg: Network management in the presence of faults. ICCC 1988: 512-517
1987
2EEAmir Herzberg, Shlomit S. Pinter: Public Protection of Software. ACM Trans. Comput. Syst. 5(4): 371-393 (1987)
1985
1EEAmir Herzberg, Shlomit S. Pinter: Public Protection of Software. CRYPTO 1985: 158-179

Coauthor Index

1Sudhanshu Aggarwal [13] [17]
2Giuseppe Ateniese [26]
3Hagit Attiya (Chagit Attiya) [12] [19]
4Baruch Awerbuch [6]
5Gal Badishi [40] [44] [45] [49]
6Amotz Bar-Noy [34]
7Boaz Barak [28] [31]
8Ray Bird [7] [11] [15]
9Carlo Blundo [9] [23]
10Ran Canetti [14] [21] [30]
11Pau-Chen Cheng [16] [25]
12Bruno Crispo [52]
13Juan A. Garay [13] [16] [17] [25] [34]
14Yossi Gilad [54]
15Oded Goldreich [4] [6]
16Inder S. Gopal [7] [11] [15]
17Shai Halevi [21] [30] [31]
18Markus Jakobsson [22]
19Philippe A. Janson [7] [11] [15]
20Stanislaw Jarecki [18] [22]
21Ahmad Jbara [47]
22Idit Keidar [40] [44] [45] [49]
23Hugo Krawczyk [16] [18] [22] [25] [26]
24Shay Kutten [5] [7] [9] [11] [15] [23] [29]
25Michael Luby [10]
26Yishay Mansour [4]
27Yosi Mass [27] [32] [33] [36]
28Joris Mihaeli [32]
29Refik Molva [7] [11] [15]
30Dalit Naor [24] [28] [31] [32]
31Shlomit S. Pinter [1] [2]
32Sergio Rajsbaum [12] [19]
33Yiftach Ravid [32]
34Oleg Romanov [44] [49]
35Alfredo De Santis [9] [23]
36Amitabh Saxena [52]
37Eldad Shai [28]
38Haya Shulman [51] [52]
39Gene Tsudik [26]
40Ugo Vaccaro [9] [23]
41Avital Yachin [44] [49]
42Hilik Yochai [20]
43Igal Yoffe [42] [43] [46] [48]
44Moti Yung (Mordechai M. Yung) [7] [9] [11] [15] [18] [22] [23]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)