default search action
Amir Herzberg
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c102]Sara Wrótniak, Hemi Leibowitz, Ewa Syta, Amir Herzberg:
Provable Security for PKI Schemes. CCS 2024: 1552-1566 - [c101]Cameron Morris, Amir Herzberg, Bing Wang, Samuel Secondo:
BGP-iSec: Improved Security of Internet Routing Against Post-ROV Attacks. NDSS 2024 - 2023
- [c100]Justin Furuness, Cameron Morris, Reynaldo Morillo, Amir Herzberg, Bing Wang:
BGPy: The BGP Python Security Simulator. CSET @ USENIX Security Symposium 2023: 41-56 - 2022
- [c99]Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. CCS 2022: 3019-3032 - [i49]Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao:
Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid. CoRR abs/2203.10158 (2022) - [i48]Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. CoRR abs/2210.09940 (2022) - 2021
- [j41]Amir Herzberg, Hemi Leibowitz, Kent E. Seamons, Elham Vaziripour, Justin Wu, Daniel Zappala:
Secure Messaging Authentication Ceremonies Are Broken. IEEE Secur. Priv. 19(2): 29-37 (2021) - [j40]Mai Ben-Adar Bessos, Amir Herzberg:
Intercepting a Stealthy Network. ACM Trans. Sens. Networks 17(2): 10:1-10:39 (2021) - [c98]Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrótniak:
MoSS: Modular Security Specifications Framework. CRYPTO (3) 2021: 33-63 - [c97]Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, Amir Herzberg, Bing Wang:
ROV++: Improved Deployable Defense against BGP Hijacking. NDSS 2021 - [i47]Hemi Leibowitz, Haitham Ghalwash, Ewa Syta, Amir Herzberg:
CTng: Secure Certificate and Revocation Transparency. IACR Cryptol. ePrint Arch. 2021: 818 (2021) - 2020
- [c96]Bar Meyuhas, Nethanel Gelernter, Amir Herzberg:
Cross-Site Search Attacks: Unauthorized Queries over Private Data. CANS 2020: 43-62 - [c95]Tomas Hlavacek, Ítalo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, Haya Schulmann:
DISCO: Sidestepping RPKI's Deployment Barriers. NDSS 2020 - [i46]Hemi Leibowitz, Amir Herzberg, Ewa Syta, Sara Wrótniak:
The Modular Specifications Security Framework. IACR Cryptol. ePrint Arch. 2020: 1040 (2020)
2010 – 2019
- 2019
- [c94]Amir Herzberg, Yehonatan Kfir:
The chatty-sensor: a provably-covert channel in cyber physical systems. ACSAC 2019: 638-649 - [c93]Amir Herzberg, Yehonatan Kfir:
The Leaky Actuator: A Provably-covert Channel in Cyber Physical Systems. CPS-SPC@CCS 2019: 87-98 - [c92]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. Public Key Cryptography (1) 2019: 286-313 - [c91]Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No Right to Remain Silent: Isolating Malicious Mixes. USENIX Security Symposium 2019: 1841-1858 - [i45]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. IACR Cryptol. ePrint Arch. 2019: 63 (2019) - [i44]Hemi Leibowitz, Amir Herzberg, Ewa Syta:
Provable Security for PKI Schemes. IACR Cryptol. ePrint Arch. 2019: 807 (2019) - 2018
- [j39]Ryan Henry, Amir Herzberg, Aniket Kate:
Blockchain Access Privacy: Challenges and Directions. IEEE Secur. Priv. 16(4): 38-45 (2018) - [c90]Liran Orevi, Amir Herzberg, Haim Zlatokrilov:
DNS-DNS: DNS-Based De-NAT Scheme. CANS 2018: 69-88 - [c89]Mai Ben-Adar Bessos, Amir Herzberg:
Intercepting a Stealthy Network. CSCML 2018: 188-205 - [c88]Tomas Hlavacek, Amir Herzberg, Haya Schulmann, Michael Waidner:
Practical Experience: Methodologies for Measuring Route Origin Validation. DSN 2018: 634-641 - [c87]Yossi Gilad, Tomas Hlavacek, Amir Herzberg, Michael Schapira, Haya Schulmann:
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security. HotNets 2018: 57-63 - 2017
- [c86]Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz:
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol. CANS 2017: 390-412 - [c85]Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann:
Are We There Yet? On RPKI's Deployment and Security. NDSS 2017 - [c84]Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:
AnNotify: A Private Notification Service. WPES@CCS 2017: 5-15 - [i43]Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No right to remain silent: Isolating Malicious Mixes. IACR Cryptol. ePrint Arch. 2017: 1000 (2017) - 2016
- [c83]Amir Herzberg, Haya Schulmann, Michael Waidner:
Stratum Filtering: Cloud-based Detection of Attack Sources. CCSW 2016: 47-48 - [c82]Mai Ben-Adar Bessos, Simon Birnbach, Amir Herzberg, Ivan Martinovic:
Exposing Transmitters in Mobile Multi-Agent Games. CPS-SPC@CCS 2016: 125-136 - [c81]Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. CRYPTO (2) 2016: 521-550 - [c80]Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. ESORICS (1) 2016: 344-362 - [c79]Nethanel Gelernter, Amir Herzberg:
Autocomplete Injection Attack. ESORICS (2) 2016: 512-530 - [c78]Yossi Gilad, Amir Herzberg, Michael Sudkovitch, Michael Goberman:
CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds. NDSS 2016 - [c77]Avichai Cohen, Yossi Gilad, Amir Herzberg, Michael Schapira:
Jumpstarting BGP Security with Path-End Validation. SIGCOMM 2016: 342-355 - [c76]Amir Herzberg, Hemi Leibowitz:
Can Johnny finally encrypt?: evaluating E2E-encryption in popular IM applications. STAST 2016: 17-28 - [c75]Nethanel Gelernter, Amir Herzberg:
Tell Me About Yourself: The Malicious CAPTCHA Attack. WWW 2016: 999-1008 - [i42]Amir Herzberg, Yehonatan Kfir:
Topology-based Plug-and-Play Key-Setup. IACR Cryptol. ePrint Arch. 2016: 60 (2016) - [i41]Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. IACR Cryptol. ePrint Arch. 2016: 289 (2016) - [i40]Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:
AnoNotify: A Private Notification Service. IACR Cryptol. ePrint Arch. 2016: 466 (2016) - [i39]Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz:
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol. IACR Cryptol. ePrint Arch. 2016: 489 (2016) - [i38]Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. IACR Cryptol. ePrint Arch. 2016: 678 (2016) - [i37]Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann:
Are We There Yet? On RPKI's Deployment and Security. IACR Cryptol. ePrint Arch. 2016: 1010 (2016) - 2015
- [j38]Amir Herzberg, Haya Schulmann:
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End? IEEE Internet Comput. 19(1): 80-84 (2015) - [j37]Nethanel Gelernter, Amir Herzberg:
Gossip Latin square and the meet-all gossipers problem. Inf. Process. Lett. 115(10): 738-743 (2015) - [c74]Nethanel Gelernter, Yoel Grinstein, Amir Herzberg:
Cross-Site Framing Attacks. ACSAC 2015: 161-170 - [c73]Nethanel Gelernter, Amir Herzberg:
Cross-Site Search Attacks. CCS 2015: 1394-1405 - [c72]Avichai Cohen, Yossi Gilad, Amir Herzberg, Michael Schapira:
One Hop for RPKI, One Giant Leap for BGP Security. HotNets 2015: 10:1-10:7 - [i36]Amir Herzberg, Matthias Hollick, Adrian Perrig:
Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102). Dagstuhl Reports 5(3): 28-40 (2015) - 2014
- [j36]Moti Geva, Amir Herzberg, Yehoshua Gev:
Bandwidth Distributed Denial of Service: Attacks and Defenses. IEEE Secur. Priv. 12(1): 54-61 (2014) - [j35]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. IEEE Secur. Priv. 12(5): 68-77 (2014) - [j34]Amir Herzberg, Haya Schulmann:
Retrofitting Security into Network Protocols: The Case of DNSSEC. IEEE Internet Comput. 18(1): 66-71 (2014) - [j33]Yossi Gilad, Amir Herzberg, Ari Trachtenberg:
Securing Smartphones: A µTCB Approach. IEEE Pervasive Comput. 13(4): 72-79 (2014) - [j32]Yuval Elovici, Michael Fire, Amir Herzberg, Haya Schulmann:
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research. Sci. Eng. Ethics 20(4): 1027-1043 (2014) - [j31]Yossi Gilad, Amir Herzberg:
Off-Path TCP Injection Attacks. ACM Trans. Inf. Syst. Secur. 16(4): 13 (2014) - [c71]Amir Herzberg, Haya Schulmann, Bruno Crispo:
Less is more: cipher-suite negotiation for DNSSEC. ACSAC 2014: 346-355 - [c70]Amir Herzberg, Haya Schulmann:
DNS authentication as a service: preventing amplification attacks. ACSAC 2014: 356-365 - [c69]Amir Herzberg, Haya Schulmann:
Negotiating DNSSEC Algorithms over Legacy Proxies. CANS 2014: 111-126 - [c68]Daniel Demmler, Amir Herzberg, Thomas Schneider:
RAID-PIR: Practical Multi-Server PIR. CCSW 2014: 45-56 - [i35]Yossi Gilad, Amir Herzberg, Ari Trachtenberg:
Securing Smartphones: A Micro-TCB Approach. CoRR abs/1401.7444 (2014) - 2013
- [j30]Raz Abramov, Amir Herzberg:
TCP Ack storm DoS attacks. Comput. Secur. 33: 12-27 (2013) - [j29]Amir Herzberg, Haya Schulmann:
Oblivious and fair server-aided two-party computation. Inf. Secur. Tech. Rep. 17(4): 210-226 (2013) - [j28]Amir Herzberg, Ronen Margulies:
Forcing Johnny to login safely. J. Comput. Secur. 21(3): 393-424 (2013) - [j27]Yossi Gilad, Amir Herzberg:
Fragmentation Considered Vulnerable. ACM Trans. Inf. Syst. Secur. 15(4): 16:1-16:31 (2013) - [c67]Amir Herzberg, Haya Schulmann:
Limiting MitM to MitE Covert-Channels. ARES 2013: 236-241 - [c66]Amir Herzberg, Haya Schulmann:
DNSSEC: Interoperability Challenges and Transition Mechanisms. ARES 2013: 398-405 - [c65]Amir Herzberg, Haya Schulmann:
Socket overloading for fun and cache-poisoning. ACSAC 2013: 189-198 - [c64]Amir Herzberg, Haya Schulmann, Johanna Ullrich, Edgar R. Weippl:
Cloudoscopy: services discovery and topology mapping. CCSW 2013: 113-122 - [c63]Amir Herzberg, Haya Schulmann:
Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org. CNS 2013: 224-232 - [c62]Amir Herzberg, Haya Schulmann:
DNSSEC: Security and availability challenges. CNS 2013: 365-366 - [c61]Christian S. Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg, Haya Schulmann:
Provenance of exposure: Identifying sources of leaked documents. CNS 2013: 367-368 - [c60]Amir Herzberg, Haya Schulmann:
Vulnerable Delegation of DNS Resolution. ESORICS 2013: 219-236 - [c59]Yossi Gilad, Amir Herzberg:
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI. ESORICS 2013: 255-272 - [c58]Boaz Catane, Amir Herzberg:
Secure Second Price Auctions with a Rational Auctioneer. SECRYPT 2013: 158-169 - [c57]Boaz Catane, Amir Herzberg:
Massive Group Message Authentication with Revocable Anonymity. SECRYPT 2013: 331-338 - [c56]Nethanel Gelernter, Amir Herzberg:
On the limits of provable anonymity. WPES 2013: 225-236 - [c55]Yossi Gilad, Amir Herzberg:
When tolerance causes weakness: the case of injection-friendly browsers. WWW 2013: 435-446 - [i34]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. CoRR abs/1305.0854 (2013) - [i33]Yuval Elovici, Michael Fire, Amir Herzberg, Haya Schulmann:
Ethical Considerations when Employing Fake Identities in OSN for Research. CoRR abs/1310.1651 (2013) - [i32]Amir Herzberg, Haya Schulmann:
Towards Adoption of DNSSEC: Availability and Security Challenges. IACR Cryptol. ePrint Arch. 2013: 254 (2013) - [i31]Boaz Catane, Amir Herzberg:
Secure Second Price Auctions with a Rational Auctioneer. IACR Cryptol. ePrint Arch. 2013: 289 (2013) - [i30]Boaz Catane, Amir Herzberg:
Massive Group Message Authentication with Revocable Anonymity. IACR Cryptol. ePrint Arch. 2013: 290 (2013) - [i29]Yossi Gilad, Amir Herzberg:
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI. IACR Cryptol. ePrint Arch. 2013: 410 (2013) - [i28]Nethanel Gelernter, Amir Herzberg:
On the Limits of Provable Anonymity. IACR Cryptol. ePrint Arch. 2013: 531 (2013) - [i27]Nethanel Gelernter, Amir Herzberg:
Gossip Latin Square and The Meet-All Gossipers Problem. IACR Cryptol. ePrint Arch. 2013: 533 (2013) - [i26]Nethanel Gelernter, Amir Herzberg:
Efficient Unobservable Anonymous Reporting against Strong Adversaries. IACR Cryptol. ePrint Arch. 2013: 534 (2013) - [i25]Shay Nachmani, Amir Herzberg:
Inter-FSP Funds Transfer Protocol. IACR Cryptol. ePrint Arch. 2013: 537 (2013) - [i24]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. IACR Cryptol. ePrint Arch. 2013: 623 (2013) - 2012
- [j26]Amir Herzberg, Ronen Margulies:
Training Johnny to Authenticate (Safely). IEEE Secur. Priv. 10(1): 37-45 (2012) - [j25]Yossi Gilad, Amir Herzberg:
LOT: A Defense Against IP Spoofing and Flooding Attacks. ACM Trans. Inf. Syst. Secur. 15(2): 6:1-6:30 (2012) - [c54]Amir Herzberg, Haya Schulmann:
Oblivious and Fair Server-Aided Two-Party Computation. ARES 2012: 75-84 - [c53]Amir Herzberg, Haya Schulmann:
Antidotes for DNS Poisoning by Off-Path Adversaries. ARES 2012: 262-267 - [c52]Amir Herzberg, Haya Schulmann:
Security of Patched DNS. ESORICS 2012: 271-288 - [c51]Yehoshua Gev, Moti Geva, Amir Herzberg:
Backward traffic throttling to mitigate bandwidth floods. GLOBECOM 2012: 904-910 - [c50]Yossi Gilad, Amir Herzberg:
Spying in the Dark: TCP and Tor Traffic Analysis. Privacy Enhancing Technologies 2012: 100-119 - [c49]Amir Herzberg, Ronen Margulies:
My Authentication Album: Adaptive Images-Based Login Mechanism. SEC 2012: 315-326 - [c48]Moti Geva, Amir Herzberg:
DOT-COM: Decentralized Online Trading and COMmerce. STM 2012: 177-192 - [c47]Yossi Gilad, Amir Herzberg:
Off-Path Attacking the Web. WOOT 2012: 41-52 - [i23]Yossi Gilad, Amir Herzberg:
Off-Path Attacking the Web. CoRR abs/1204.6623 (2012) - [i22]Amir Herzberg, Haya Schulmann:
Fragmentation Considered Poisonous. CoRR abs/1205.4011 (2012) - [i21]Amir Herzberg, Haya Schulmann:
Security of Patched DNS. CoRR abs/1205.5190 (2012) - [i20]Yossi Gilad, Amir Herzberg:
TCP Injections for Fun and Clogging. CoRR abs/1208.2357 (2012) - [i19]Amir Herzberg, Haya Schulmann:
Unilateral Antidotes to DNS Cache Poisoning. CoRR abs/1209.1482 (2012) - 2011
- [j24]Christian S. Collberg, Jack W. Davidson, Roberto Giacobazzi, Yuan Xiang Gu, Amir Herzberg, Fei-Yue Wang:
Toward Digital Asset Protection. IEEE Intell. Syst. 26(6): 8-13 (2011) - [c46]Amir Herzberg, Ronen Margulies:
Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms. ESORICS 2011: 452-471 - [c45]Moti Geva, Amir Herzberg:
QoSoDoS: If you can't beat them, join them! INFOCOM 2011: 1278-1286 - [c44]Raz Abramov, Amir Herzberg:
TCP Ack Storm DoS Attacks. SEC 2011: 29-40 - [c43]Amir Herzberg, Haya Schulmann:
Unilateral Antidotes to DNS Poisoning. SecureComm 2011: 319-336 - [c42]Amir Herzberg, Ely Porat, Nir Soffer, Erez Waisbard:
Camouflaged Private Communication. SocialCom/PASSAT 2011: 1159-1162 - [c41]Yossi Gilad, Amir Herzberg:
Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments. WOOT 2011: 9-18 - 2010
- [c40]Amir Herzberg, Haya Schulmann:
Stealth DoS Attacks on Secure Channels. NDSS 2010 - [c39]Amir Herzberg, Haya Schulmann:
Robust Combiners for Software Hardening. TRUST 2010: 282-289 - [i18]Amir Herzberg, Haya Schulmann:
Robust Combiner for Obfuscators. IACR Cryptol. ePrint Arch. 2010: 202 (2010) - [i17]Amir Herzberg, Haya Schulmann:
Secure Guaranteed Computation. IACR Cryptol. ePrint Arch. 2010: 449 (2010)
2000 – 2009
- 2009
- [j23]Amir Herzberg:
Why Johnny can't surf (safely)? Attacks and defenses for web users. Comput. Secur. 28(1-2): 63-71 (2009) - [j22]Amir Herzberg:
DNS-based email sender authentication mechanisms: A critical review. Comput. Secur. 28(8): 731-742 (2009) - [j21]Amir Herzberg:
Folklore, practice and theory of robust combiners. J. Comput. Secur. 17(2): 159-189 (2009) - [c38]Yossi Gilad, Amir Herzberg:
Lightweight Opportunistic Tunneling (LOT). ESORICS 2009: 104-119 - [c37]Amir Herzberg:
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. SEC 2009: 13-24 - [c36]Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. SEC 2009: 342-352 - [i16]Amir Herzberg, Haya Schulmann:
Stealth-MITM DoS Attacks on Secure Channels. CoRR abs/0910.3511 (2009) - 2008
- [j20]Amir Herzberg, Igal Yoffe:
The layered games framework for specifications and analysis of security protocols. Int. J. Appl. Cryptogr. 1(2): 144-159 (2008) - [j19]Amir Herzberg, Ahmad Jbara:
Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Techn. 8(4): 16:1-16:36 (2008) - [c35]Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Romanov, Avital Yachin:
An Empirical Study of Denial of Service Mitigation Techniques. SRDS 2008: 115-124 - [c34]Amir Herzberg, Igal Yoffe:
The Layered Games Framework for Specifications and Analysis of Security Protocols. TCC 2008: 125-141 - [i15]Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. IACR Cryptol. ePrint Arch. 2008: 87 (2008) - [i14]Amir Herzberg, Haya Schulmann:
Robust Combiners for Software Hardening. IACR Cryptol. ePrint Arch. 2008: 150 (2008) - 2007
- [j18]Gal Badishi, Amir Herzberg, Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark. IEEE Trans. Dependable Secur. Comput. 4(3): 191-204 (2007) - [i13]Amir Herzberg, Igal Yoffe:
The Delivery and Evidences Layer. IACR Cryptol. ePrint Arch. 2007: 139 (2007) - 2006
- [c33]Amir Herzberg, Igal Yoffe:
On Secure Orders in the Presence of Faults. SCN 2006: 126-140 - [c32]Amir Herzberg, Igal Yoffe:
Layered Architecture for Secure E-Commerce Applications. SECRYPT 2006: 118-125 - [i12]Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Romanov, Avital Yachin:
Denial of Service Protection with Beaver. From Security to Dependability 2006 - [i11]Amir Herzberg:
Browsers Defenses Against Phishing, Spoofing and Malware. IACR Cryptol. ePrint Arch. 2006: 83 (2006) - [i10]Amir Herzberg, Igal Yoffe:
Foundations of Secure E-Commerce: The Order Layer. IACR Cryptol. ePrint Arch. 2006: 352 (2006) - [i9]Amir Herzberg, Igal Yoffe:
The Layered Games Framework for Specifications and Analysis of Security Protocols. IACR Cryptol. ePrint Arch. 2006: 398 (2006) - 2005
- [c31]Amir Herzberg:
On Tolerant Cryptographic Constructions. CT-RSA 2005: 172-190 - [c30]Amir Herzberg:
Securing the Net: Challenges, Failures and Directions. DISC 2005: 2 - [c29]Gal Badishi, Amir Herzberg, Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark. DISC 2005: 18-32 - [i8]Gal Badishi, Amir Herzberg, Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark. IACR Cryptol. ePrint Arch. 2005: 298 (2005) - [i7]Amir Herzberg:
Cryptographic Protocols to Prevent Spam. IACR Cryptol. ePrint Arch. 2005: 329 (2005) - 2004
- [j17]Amir Herzberg, Yosi Mass:
Relying Party Credentials Framework. Electron. Commer. Res. 4(1-2): 23-39 (2004) - [c28]Amir Herzberg:
Web Spoofing and Phishing Attacks and Their Prevention. ENC 2004: 3 - [c27]Amir Herzberg:
Controlling Spam by Secure Internet Content Selection. SCN 2004: 337-350 - [i6]Amir Herzberg:
Controlling Spam by Secure Internet Content Selection. IACR Cryptol. ePrint Arch. 2004: 154 (2004) - [i5]Amir Herzberg, Ahmad Jbara:
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks. IACR Cryptol. ePrint Arch. 2004: 155 (2004) - 2003
- [j16]Amir Herzberg:
Payments and banking with mobile personal devices. Commun. ACM 46(5): 53-58 (2003) - [j15]Amotz Bar-Noy, Juan A. Garay, Amir Herzberg:
Sharing Video on Demand. Discret. Appl. Math. 129(1): 3-30 (2003) - [i4]Yitchak Gertner, Amir Herzberg:
Committing Encryption and Publicly-Verifiable SignCryption. IACR Cryptol. ePrint Arch. 2003: 254 (2003) - 2002
- [i3]Amir Herzberg:
Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer. IACR Cryptol. ePrint Arch. 2002: 84 (2002) - [i2]Amir Herzberg:
Folklore, Practice and Theory of Robust Combiners. IACR Cryptol. ePrint Arch. 2002: 135 (2002) - 2001
- [c26]Amir Herzberg, Yosi Mass:
Relying Party Credentials Framework. CT-RSA 2001: 328-343 - 2000
- [j14]Ran Canetti, Shai Halevi, Amir Herzberg:
Maintaining Authenticated Communication in the Presence of Break-Ins. J. Cryptol. 13(1): 61-105 (2000) - [j13]Mihir Bellare, Juan A. Garay, Ralf C. Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner:
Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4): 611-627 (2000) - [j12]Amir Herzberg, Shay Kutten:
Early Detection of Message Forwarding Faults. SIAM J. Comput. 30(4): 1169-1196 (2000) - [c25]Boaz Barak, Shai Halevi, Amir Herzberg, Dalit Naor:
Clock synchronization with faults and recoveries (extended abstract). PODC 2000: 133-142 - [c24]Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid:
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. S&P 2000: 2-14
1990 – 1999
- 1999
- [j11]Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik:
Untraceable mobility or how to travel incognito. Comput. Networks 31(8): 871-884 (1999) - [c23]Boaz Barak, Amir Herzberg, Dalit Naor, Eldad Shai:
The Proactive Security Toolkit and Applications. CCS 1999: 18-27 - [c22]Yosi Mass, Amir Herzberg:
VRCommerce - electronic commerce in virtual reality. EC 1999: 103-109 - 1998
- [j10]Amir Herzberg:
Safeguarding Digital Library Contents: Charging for Online Content. D Lib Mag. 4(1) (1998) - [j9]Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung:
Perfectly Secure Key Distribution for Dynamic Conferences. Inf. Comput. 146(1): 1-23 (1998) - [j8]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
A Security Architecture for the Internet Protocol. IBM Syst. J. 37(1): 42-60 (1998) - [j7]Amir Herzberg, Dalit Naor:
Surf'N'Sign: Client Signatures on Web Documents. IBM Syst. J. 37(1): 61-71 (1998) - [i1]Ran Canetti, Shai Halevi, Amir Herzberg:
Maintaining Authenticated Communication in the Presence of Break-ins. IACR Cryptol. ePrint Arch. 1998: 12 (1998) - 1997
- [j6]Amir Herzberg, Hilik Yochai:
MiniPay: Charging per Plick on the Web. Comput. Networks 29(8-13): 939-951 (1997) - [c21]Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
Proactive Public Key and Signature Systems. CCS 1997: 100-110 - [c20]Ran Canetti, Shai Halevi, Amir Herzberg:
Maintaining Authenticated Communication in the Presence of Break-ins. PODC 1997: 15-24 - 1996
- [j5]Hagit Attiya, Amir Herzberg, Sergio Rajsbaum:
Optimal Clock Synchronization under Different Delay Assumptions. SIAM J. Comput. 25(2): 369-389 (1996) - 1995
- [j4]Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung:
The KryptoKnight family of light-weight protocols for authentication and key distribution. IEEE/ACM Trans. Netw. 3(1): 31-41 (1995) - [j3]Yair Frankel, Amir Herzberg, Paul A. Karger, Hugo Krawczyk, Charles A. Kunzinger, Mordechai M. Yung:
Security issues in a CDPD wireless network. IEEE Wirel. Commun. 2(4): 16-27 (1995) - [c19]Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung:
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. CRYPTO 1995: 339-352 - [c18]Sudhanshu Aggarwal, Juan A. Garay, Amir Herzberg:
Adaptive Video on Demand. ESA 1995: 538-553 - [c17]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
Securing the Internet (Abstract). PODC 1995: 257 - [c16]Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk:
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX. USENIX Security Symposium 1995 - [c15]Chee-Seng Chow, Amir Herzberg:
Network Randomization Protocol: A Proactive Pseudo-Random Generator. USENIX Security Symposium 1995 - [c14]Mihir Bellare, Amir Herzberg, Michael Steiner, Gene Tsudik, Michael Waidner, Ralf C. Hauser, Juan A. Garay:
iKP - A Family of Secure Electronic Payment Protocols. USENIX Workshop on Electronic Commerce 1995 - 1994
- [c13]Ran Canetti, Amir Herzberg:
Maintaining Security in the Presence of Transient Faults. CRYPTO 1994: 425-438 - [c12]Sudhanshu Aggarwal, Juan A. Garay, Amir Herzberg:
Adaptive Video on Demand. PODC 1994: 402 - [c11]Amir Herzberg, Hugo Krawczyk, Gene Tsudik:
On Travelling Incognito. WMCSA 1994: 205-211 - 1993
- [j2]Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung:
Systematic Design of a Family of Attack-Resistant Authentication Protocols. IEEE J. Sel. Areas Commun. 11(5): 679-693 (1993) - [c10]Hagit Attiya, Amir Herzberg, Sergio Rajsbaum:
Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version). PODC 1993: 109-120 - 1992
- [c9]Amir Herzberg, Michael Luby:
Pubic Randomness in Cryptography. CRYPTO 1992: 421-432 - [c8]Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, Moti Yung:
Perfectly-Secure Key Distribution for Dynamic Conferences. CRYPTO 1992: 471-486 - [c7]Amir Herzberg:
Connection-Based Communication in Dynamic Networks (Extended Abstract). PODC 1992: 13-24 - 1991
- [c6]Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung:
Systematic Design of Two-Party Authentication Protocols. CRYPTO 1991: 44-61 - 1990
- [c5]Baruch Awerbuch, Oded Goldreich, Amir Herzberg:
A Quantitative Approach to Dynamic Networks. PODC 1990: 189-203
1980 – 1989
- 1989
- [c4]Oded Goldreich, Amir Herzberg, Yishay Mansour:
Source to Destination Communication in the Presence of Faults. PODC 1989: 85-101 - [c3]Amir Herzberg, Shay Kutten:
Fast Isolation of Arbitrary Forwarding Faults. PODC 1989: 339-353 - 1988
- [c2]Amir Herzberg:
Network management in the presence of faults. ICCC 1988: 512-517 - 1987
- [j1]Amir Herzberg, Shlomit S. Pinter:
Public Protection of Software. ACM Trans. Comput. Syst. 5(4): 371-393 (1987) - 1985
- [c1]Amir Herzberg, Shlomit S. Pinter:
Public Protection of Software. CRYPTO 1985: 158-179
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint