Amir Herzberg
Orcid: 0000-0001-5586-5261
According to our database1,
Amir Herzberg
authored at least 158 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
2022
Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid.
CoRR, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
2019
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, 2016
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
2015
IEEE Internet Comput., 2015
Dagstuhl Reports, 2015
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research.
Sci. Eng. Ethics, 2014
IEEE Internet Comput., 2014
IEEE Secur. Priv., 2014
IEEE Secur. Priv., 2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
CoRR, 2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the CCSW'13, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
ACM Trans. Inf. Syst. Secur., 2012
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms.
Proceedings of the Computer Security - ESORICS 2011, 2011
2010
Proceedings of the Network and Distributed System Security Symposium, 2010
2009
Comput. Secur., 2009
Comput. Secur., 2009
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable.
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Computer Security, 2009
2008
Security and identification indicators for browsers against spoofing and phishing attacks.
ACM Trans. Internet Techn., 2008
Int. J. Appl. Cryptogr., 2008
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008
2007
IEEE Trans. Dependable Secur. Comput., 2007
2006
IACR Cryptol. ePrint Arch., 2006
Layered Architecture for Secure E-Commerce Applications.
Proceedings of the SECRYPT 2006, 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the From Security to Dependability, 10.09. - 15.09.2006, 2006
2005
Proceedings of the Distributed Computing, 19th International Conference, 2005
Proceedings of the Topics in Cryptology, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 5th Mexican International Conference on Computer Science (ENC 2004), 2004
2003
IACR Cryptol. ePrint Arch., 2003
2002
IACR Cryptol. ePrint Arch., 2002
2000
IEEE J. Sel. Areas Commun., 2000
J. Cryptol., 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000
1999
Proceedings of the First ACM Conference on Electronic Commerce (EC-99), 1999
1998
1997
1996
SIAM J. Comput., 1996
1995
The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw., 1995
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995
Proceedings of the 5th USENIX Security Symposium, 1995
Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIX.
Proceedings of the 5th USENIX Security Symposium, 1995
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994
Proceedings of the Advances in Cryptology, 1994
1993
IEEE J. Sel. Areas Commun., 1993
Optimal Clock Synchronization under Different Delay Assumptions (Preliminary Version).
Proceedings of the Twelth Annual ACM Symposium on Principles of Distributed Computing, 1993
1992
Proceedings of the Eleventh Annual ACM Symposium on Principles of Distributed Computing, 1992
1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Ninth Annual ACM Symposium on Principles of Distributed Computing, 1990
1989
Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, 1989
Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, 1989
1988
Network management in the presence of faults.
Proceedings of the Computer Communication Technologies for the 90's, Proceedings of the Ninth International Conference on Computer Communication, Tel Aviv, Israel, October 30, 1988
1987