amir herzberg
amir herzberg
Dept. of Computer Science and Engineering, University of Connecticut
Verified email at uconn.edu - Homepage
Title
Cited by
Cited by
Year
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Annual international cryptology conference, 471-486, 1992
14371992
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
annual international cryptology conference, 339-352, 1995
10131995
Access control meets public key infrastructure, or: Assigning roles to strangers
A Herzberg, Y Mass, J Mihaeli, D Naor, Y Ravid
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2-14, 2000
5692000
Payments and banking with mobile personal devices
A Herzberg
Communications of the ACM 46 (5), 53-58, 2003
4882003
Proactive public key and signature systems
A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung
Proceedings of the 4th ACM Conference on Computer and Communicationsá…, 1997
3761997
Method and system for the secured distribution of multimedia titles
A Herzberg, HM Krawczyk, S Kutten, A Van Le, SM Matyas, MM Yung
US Patent 5,745,678, 1998
3361998
Perfectly secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Information and Computation 146 (1), 1-23, 1998
3041998
iKP-A Family of Secure Electronic Payment Protocols.
M Bellare, A Herzberg, M Steiner, G Tsudik, M Waidner, RC Hauser, ...
USENIX Workshop on Electronic Commerce, 1995
2921995
Security and identification indicators for browsers against spoofing and phishing attacks
A Herzberg, A Jbara
ACM Transactions on Internet Technology (TOIT) 8 (4), 1-36, 2008
275*2008
Design, implementation, and deployment of the iKP secure electronic payment system
M Bellare, JA Garay, R Hauser, A Herzberg, H Krawczyk, M Steiner, ...
IEEE Journal on selected areas in communications 18 (4), 611-627, 2000
2332000
Systematic design of a family of attack-resistant authentication protocols
R Bird, I Gopal, A Herzberg, PA Janson, S Kutten, R Molva, M Yung
IEEE Journal on Selected Areas in Communications 11 (5), 679-693, 1993
2311993
Public protection of software
A Herzberg, SS Pinter
ACM Transactions on Computer Systems (TOCS) 5 (4), 371-393, 1987
1891987
Systematic design of two-party authentication protocols
R Bird, I Gopal, A Herzberg, P Janson, S Kutten, R Molva, M Yung
Annual International Cryptology Conference, 44-61, 1991
1821991
MiniPay: Charging per click on the web
A Herzberg, H Yochai
Computer Networks and ISDN Systems 29 (8-13), 939-951, 1997
1621997
Multi-party secure session/conference
RF Bird, A Herzberg, PA Janson, S Kutten, RA Molva, MM Yung
US Patent 5,369,705, 1994
1571994
Blockchain access privacy: Challenges and directions
R Henry, A Herzberg, A Kate
IEEE Security & Privacy 16 (4), 38-45, 2018
1532018
The kryptoknight family of light-weight protocols for authentication and key distribution
R Bird, I Gopal, A Herzberg, P Janson, S Kutten, R Molva, M Yung
IEEE/ACM transactions on networking 3 (1), 31-41, 1995
1451995
Maintaining security in the presence of transient faults
R Canetti, A Herzberg
Annual International Cryptology Conference, 425-438, 1994
1371994
Proactive security: Long-term protection against break-ins
R Canetti, R Gennaro, A Herzberg, D Naor
RSA Laboratories’ CryptoBytes 3 (1), 1-8, 1997
1311997
Fragmentation considered poisonous, or: One-domain-to-rule-them-all. org
A Herzberg, H Shulman
2013 IEEE Conference on Communications and Network Security (CNS), 224-232, 2013
1252013
The system can't perform the operation now. Try again later.
Articles 1–20