Follow
amir herzberg
amir herzberg
Dept. of Computer Science and Engineering, University of Connecticut
Verified email at uconn.edu - Homepage
Title
Cited by
Cited by
Year
Perfectly-secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Advances in Cryptology—CRYPTO’92: 12th Annual International Cryptology …, 1993
15001993
Proactive secret sharing or: How to cope with perpetual leakage
A Herzberg, S Jarecki, H Krawczyk, M Yung
Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995
11781995
Access control meets public key infrastructure, or: Assigning roles to strangers
A Herzberg, Y Mass, J Mihaeli, D Naor, Y Ravid
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2-14, 2000
6052000
Payments and banking with mobile personal devices
A Herzberg
Communications of the ACM 46 (5), 53-58, 2003
5982003
Method and system for the secured distribution of multimedia titles
A Herzberg, HM Krawczyk, S Kutten, A Van Le, SM Matyas, MM Yung
US Patent 5,745,678, 1998
4301998
Proactive public key and signature systems
A Herzberg, M Jakobsson, S Jarecki, H Krawczyk, M Yung
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
3961997
Security and identification indicators for browsers against spoofing and phishing attacks
A Herzberg, A Jbara
ACM Transactions on Internet Technology (TOIT) 8 (4), 1-36, 2008
364*2008
Perfectly secure key distribution for dynamic conferences
C Blundo, A De Santis, A Herzberg, S Kutten, U Vaccaro, M Yung
Information and Computation 146 (1), 1-23, 1998
3351998
Blockchain access privacy: Challenges and directions
R Henry, A Herzberg, A Kate
IEEE Security & Privacy 16 (4), 38-45, 2018
3262018
iKP-A Family of Secure Electronic Payment Protocols.
M Bellare, A Herzberg, M Steiner, G Tsudik, M Waidner, RC Hauser, ...
USENIX Workshop on Electronic Commerce, 1995
2991995
Design, implementation, and deployment of the iKP secure electronic payment system
M Bellare, JA Garay, R Hauser, A Herzberg, H Krawczyk, M Steiner, ...
IEEE Journal on selected areas in communications 18 (4), 611-627, 2000
2712000
Systematic design of a family of attack-resistant authentication protocols
R Bird, I Gopal, A Herzberg, PA Janson, S Kutten, R Molva, M Yung
IEEE Journal on Selected Areas in Communications 11 (5), 679-693, 1993
2201993
Systematic design of two-party authentication protocols
R Bird, I Gopal, A Herzberg, P Janson, S Kutten, R Molva, M Yung
Advances in Cryptology—CRYPTO’91: Proceedings 11, 44-61, 1992
2151992
Public protection of software
A Herzberg, SS Pinter
ACM Transactions on Computer Systems (TOCS) 5 (4), 371-393, 1987
1861987
MiniPay: Charging per click on the web
A Herzberg, H Yochai
Computer Networks and ISDN Systems 29 (8-13), 939-951, 1997
1741997
Fragmentation considered poisonous, or: One-domain-to-rule-them-all. org
A Herzberg, H Shulman
2013 IEEE Conference on Communications and Network Security (CNS), 224-232, 2013
1722013
Multi-party secure session/conference
RF Bird, A Herzberg, PA Janson, S Kutten, RA Molva, MM Yung
US Patent 5,369,705, 1994
1601994
Maintaining security in the presence of transient faults
R Canetti, A Herzberg
Annual International Cryptology Conference, 425-438, 1994
1561994
The kryptoknight family of light-weight protocols for authentication and key distribution
R Bird, I Gopal, A Herzberg, P Janson, S Kutten, R Molva, M Yung
IEEE/ACM transactions on networking 3 (1), 31-41, 1995
1521995
Proactive security: Long-term protection against break-ins
R Canetti, R Gennaro, A Herzberg, D Naor
RSA Laboratories’ CryptoBytes 3 (1), 1-8, 1997
1381997
The system can't perform the operation now. Try again later.
Articles 1–20