Amir Herzberg

According to our database1, Amir Herzberg authored at least 145 papers between 1987 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Provable Security for PKI Schemes.
IACR Cryptology ePrint Archive, 2019

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
IACR Cryptology ePrint Archive, 2019

The Leaky Actuator: A Provably-covert Channel in Cyber Physical Systems.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

The chatty-sensor: a provably-covert channel in cyber physical systems.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Blockchain Access Privacy: Challenges and Directions.
IEEE Security & Privacy, 2018

Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018

Practical Experience: Methodologies for Measuring Route Origin Validation.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Intercepting a Stealthy Network.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

DNS-DNS: DNS-Based De-NAT Scheme.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
No right to remain silent: Isolating Malicious Mixes.
IACR Cryptology ePrint Archive, 2017

AnNotify: A Private Notification Service.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

2016
AnoNotify: A Private Notification Service.
IACR Cryptology ePrint Archive, 2016

Topology-based Plug-and-Play Key-Setup.
IACR Cryptology ePrint Archive, 2016

Are We There Yet? On RPKI's Deployment and Security.
IACR Cryptology ePrint Archive, 2016

Two Cents for Strong Anonymity: The Anonymous Post-office Protocol.
IACR Cryptology ePrint Archive, 2016

Obfuscation Combiners.
IACR Cryptology ePrint Archive, 2016

Anonymous RAM.
IACR Cryptology ePrint Archive, 2016

Tell Me About Yourself: The Malicious CAPTCHA Attack.
Proceedings of the 25th International Conference on World Wide Web, 2016

Jumpstarting BGP Security with Path-End Validation.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Autocomplete Injection Attack.
Proceedings of the Computer Security - ESORICS 2016, 2016

Stratum Filtering: Cloud-based Detection of Attack Sources.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

Exposing Transmitters in Mobile Multi-Agent Games.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

2015
Gossip Latin square and the meet-all gossipers problem.
Inf. Process. Lett., 2015

Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
IEEE Internet Computing, 2015

Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102).
Dagstuhl Reports, 2015

One Hop for RPKI, One Giant Leap for BGP Security.
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

Cross-Site Search Attacks.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Cross-Site Framing Attacks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Off-Path TCP Injection Attacks.
ACM Trans. Inf. Syst. Secur., 2014

Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.
Science and Engineering Ethics, 2014

Securing Smartphones: A µTCB Approach.
IEEE Pervasive Computing, 2014

Retrofitting Security into Network Protocols: The Case of DNSSEC.
IEEE Internet Computing, 2014

Bandwidth Distributed Denial of Service: Attacks and Defenses.
IEEE Security & Privacy, 2014

Securing Smartphones: A Micro-TCB Approach.
CoRR, 2014

RAID-PIR: Practical Multi-Server PIR.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

Negotiating DNSSEC Algorithms over Legacy Proxies.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Less is more: cipher-suite negotiation for DNSSEC.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

DNS authentication as a service: preventing amplification attacks.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Fragmentation Considered Vulnerable.
ACM Trans. Inf. Syst. Secur., 2013

Forcing Johnny to login safely.
Journal of Computer Security, 2013

Oblivious and fair server-aided two-party computation.
Inf. Sec. Techn. Report, 2013

Inter-FSP Funds Transfer Protocol.
IACR Cryptology ePrint Archive, 2013

Towards Adoption of DNSSEC: Availability and Security Challenges.
IACR Cryptology ePrint Archive, 2013

Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI.
IACR Cryptology ePrint Archive, 2013

Efficient Unobservable Anonymous Reporting against Strong Adversaries.
IACR Cryptology ePrint Archive, 2013

On the Limits of Provable Anonymity.
IACR Cryptology ePrint Archive, 2013

Massive Group Message Authentication with Revocable Anonymity.
IACR Cryptology ePrint Archive, 2013

Secure Second Price Auctions with a Rational Auctioneer.
IACR Cryptology ePrint Archive, 2013

Off-Path Hacking: The Illusion of Challenge-Response Authentication
CoRR, 2013

Ethical Considerations when Employing Fake Identities in OSN for Research.
CoRR, 2013

TCP Ack storm DoS attacks.
Computers & Security, 2013

When tolerance causes weakness: the case of injection-friendly browsers.
Proceedings of the 22nd International World Wide Web Conference, 2013

Vulnerable Delegation of DNS Resolution.
Proceedings of the Computer Security - ESORICS 2013, 2013

DNSSEC: Security and availability challenges.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Provenance of exposure: Identifying sources of leaked documents.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Cloudoscopy: services discovery and topology mapping.
Proceedings of the CCSW'13, 2013

Socket overloading for fun and cache-poisoning.
Proceedings of the Annual Computer Security Applications Conference, 2013

DNSSEC: Interoperability Challenges and Transition Mechanisms.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

Limiting MitM to MitE Covert-Channels.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
LOT: A Defense Against IP Spoofing and Flooding Attacks.
ACM Trans. Inf. Syst. Secur., 2012

Training Johnny to Authenticate (Safely).
IEEE Security & Privacy, 2012

Unilateral Antidotes to DNS Cache Poisoning
CoRR, 2012

TCP Injections for Fun and Clogging
CoRR, 2012

Security of Patched DNS
CoRR, 2012

Fragmentation Considered Poisonous
CoRR, 2012

Off-Path Attacking the Web
CoRR, 2012

DOT-COM: Decentralized Online Trading and COMmerce.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

My Authentication Album: Adaptive Images-Based Login Mechanism.
Proceedings of the Information Security and Privacy Research, 2012

Spying in the Dark: TCP and Tor Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Backward traffic throttling to mitigate bandwidth floods.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Antidotes for DNS Poisoning by Off-Path Adversaries.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Toward Digital Asset Protection.
IEEE Intelligent Systems, 2011

Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Camouflaged Private Communication.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Unilateral Antidotes to DNS Poisoning.
Proceedings of the Security and Privacy in Communication Networks, 2011

QoSoDoS: If you can't beat them, join them!
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
Secure Guaranteed Computation.
IACR Cryptology ePrint Archive, 2010

Robust Combiner for Obfuscators.
IACR Cryptology ePrint Archive, 2010

Stealth DoS Attacks on Secure Channels.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Stealth-MITM DoS Attacks on Secure Channels
CoRR, 2009

DNS-based email sender authentication mechanisms: A critical review.
Computers & Security, 2009

Why Johnny can't surf (safely)? Attacks and defenses for web users.
Computers & Security, 2009

Combining Authentication, Reputation and Classification to Make Phishing Unprofitable.
Proceedings of the Emerging Challenges for Security, 2009

Lightweight Opportunistic Tunneling (LOT).
Proceedings of the Computer Security, 2009

2008
The layered games framework for specifications and analysis of security protocols.
IJACT, 2008

Towards a Theory of White-Box Security.
IACR Cryptology ePrint Archive, 2008

Robust Combiners for Software Hardening.
IACR Cryptology ePrint Archive, 2008

An Empirical Study of Denial of Service Mitigation Techniques.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

2007
The Delivery and Evidences Layer.
IACR Cryptology ePrint Archive, 2007

2006
Foundations of Secure E-Commerce: The Order Layer.
IACR Cryptology ePrint Archive, 2006

Browsers Defenses Against Phishing, Spoofing and Malware.
IACR Cryptology ePrint Archive, 2006

Layered Architecture for Secure E-Commerce Applications.
Proceedings of the SECRYPT 2006, 2006

On Secure Orders in the Presence of Faults.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Denial of Service Protection with Beaver.
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006

2005
Cryptographic Protocols to Prevent Spam.
IACR Cryptology ePrint Archive, 2005

Keeping Denial-of-Service Attackers in the Dark.
IACR Cryptology ePrint Archive, 2005

Securing the Net: Challenges, Failures and Directions.
Proceedings of the Distributed Computing, 19th International Conference, 2005

On Tolerant Cryptographic Constructions.
Proceedings of the Topics in Cryptology, 2005

2004
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks.
IACR Cryptology ePrint Archive, 2004

Controlling Spam by Secure Internet Content Selection.
IACR Cryptology ePrint Archive, 2004

Relying Party Credentials Framework.
Electronic Commerce Research, 2004

Web Spoofing and Phishing Attacks and Their Prevention.
Proceedings of the 5th Mexican International Conference on Computer Science (ENC 2004), 2004

2003
Committing Encryption and Publicly-Verifiable SignCryption.
IACR Cryptology ePrint Archive, 2003

Sharing Video on Demand.
Discrete Applied Mathematics, 2003

Payments and banking with mobile personal devices.
Commun. ACM, 2003

2002
Folklore, Practice and Theory of Robust Combiners.
IACR Cryptology ePrint Archive, 2002

Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer.
IACR Cryptology ePrint Archive, 2002

2000
Early Detection of Message Forwarding Faults.
SIAM J. Comput., 2000

Design, implementation, and deployment of the iKP secure electronic payment system.
IEEE Journal on Selected Areas in Communications, 2000

Maintaining Authenticated Communication in the Presence of Break-Ins.
J. Cryptology, 2000

Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Clock synchronization with faults and recoveries (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

1999
Untraceable mobility or how to travel incognito.
Computer Networks, 1999

VRCommerce - electronic commerce in virtual reality.
Proceedings of the First ACM Conference on Electronic Commerce (EC-99), 1999

The Proactive Security Toolkit and Applications.
Proceedings of the CCS '99, 1999

1998
Surf'N'Sign: Client Signatures on Web Documents.
IBM Systems Journal, 1998

A Security Architecture for the Internet Protocol.
IBM Systems Journal, 1998

Perfectly Secure Key Distribution for Dynamic Conferences.
Inf. Comput., 1998

Safeguarding Digital Library Contents: Charging for Online Content.
D-Lib Mag., 1998

1997
MiniPay: Charging per Plick on the Web.
Computer Networks, 1997

Proactive Public Key and Signature Systems.
Proceedings of the CCS '97, 1997

1996
Optimal Clock Synchronization under Different Delay Assumptions.
SIAM J. Comput., 1996

1995
Security issues in a CDPD wireless network.
IEEE Personal Commun., 1995

The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw., 1995

iKP - A Family of Secure Electronic Payment Protocols.
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995

Network Randomization Protocol: A Proactive Pseudo-Random Generator.
Proceedings of the 5th USENIX Security Symposium, 1995

Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Proceedings of the 5th USENIX Security Symposium, 1995

Securing the Internet (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

Adaptive Video on Demand.
Proceedings of the Algorithms, 1995

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage.
Proceedings of the Advances in Cryptology, 1995

1994
On Travelling Incognito.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

Maintaining Security in the Presence of Transient Faults.
Proceedings of the Advances in Cryptology, 1994

1993
Systematic Design of a Family of Attack-Resistant Authentication Protocols.
IEEE Journal on Selected Areas in Communications, 1993

Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version).
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993

1992
Connection-Based Communication in Dynamic Networks (Extended Abstract).
Proceedings of the Eleventh Annual ACM Symposium on Principles of Distributed Computing, 1992

Pubic Randomness in Cryptography.
Proceedings of the Advances in Cryptology, 1992

1991
Systematic Design of Two-Party Authentication Protocols.
Proceedings of the Advances in Cryptology, 1991

1990
A Quantitative Approach to Dynamic Networks.
Proceedings of the Ninth Annual ACM Symposium on Principles of Distributed Computing, 1990

1989
Fast Isolation of Arbitrary Forwarding Faults.
Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, 1989

Source to Destination Communication in the Presence of Faults.
Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, 1989

1988
Network management in the presence of faults.
Proceedings of the Computer Communication Technologies for the 90's, Proceedings of the Ninth International Conference on Computer Communication, Tel Aviv, Israel, October 30, 1988

1987
Public Protection of Software.
ACM Trans. Comput. Syst., 1987


  Loading...