TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 23.

Hlavacek, Tomas and Herzberg, Amir and Shulman, Haya and Waidner, Michael :
Practical Experience: Methodologies for Measuring Route Origin Validation.
[Online-Edition: http://dsn2017.github.io/]
In: DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, 26.-29.06.2018, Denver,CO,USA.
[Conference or Workshop Item] , (2018)

Cohen, Avichai and Gilad, Yossi and Herzberg, Amir and Schapira, Michael and Shulman, Haya :
Are We There Yet? On RPKIs Deployment and Security.
Network and Distributed Systems Security (NDSS)
[Conference or Workshop Item] , (2017)

Herzberg, Amir and Shulman, Haya and Waidner, Michael :
Stratum Filtering: Cloud-Based Detection of Attack Sources.
ACM Cloud Computing Security Workshop (CCSW)
[Conference or Workshop Item] , (2016)

Fischlin, Marc and Herzberg, Amir and Noon, Hon Bin and Shulman, Haya :
Obfuscation Combiners.
International Cryptology Conference (CRYPTO)
[Conference or Workshop Item] , (2016)

Herzberg, Amir and Shulman, Haya and Waidner, Michael :
Survey of Software Protection with Minimal Hardware.
International Conference on Software Science, Technology and Engineering (SWSTE)
[Conference or Workshop Item] , (2016)

Herzberg, Amir and Shulman, Haya :
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE (19) pp. 80-84.
[Article] , (2015)

Herzberg, Amir and Shulman, Haya :
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC .
[Conference or Workshop Item] , (2014)

Herzberg, Amir and Shulman, Haya and Crispo, Bruno :
Less is More: Cipher-Suite Negotiation for DNSSEC.
Computer Security Applications Conference (ACM ACSAC) ACSAC, IEEE
[Conference or Workshop Item] , (2014)

Demmler, Daniel and Herzberg, Amir and Schneider, Thomas :
RAID-PIR: Practical Multi-Server PIR.
6. ACM Cloud Computing Security Workshop (CCSW'14) ACM
[Conference or Workshop Item] , (2014)

Herzberg, Amir and Shulman, Haya :
DNS Security: Past, Present and Future.
Future Security Conference 2014
[Conference or Workshop Item] , (2014)

Herzberg, Amir and Shulman, Haya :
Socket Overloading for Fun and Cache Poisoning.
In: ACM Annual Computer Security Applications Conference (ACM ACSAC) 2013, New Orleans, Louisiana, U.S., December 2013.
[Article] , (2013)

Herzberg, Amir and Shulman, Haya and Ullrich, Johanna and Weippl, Edgar :
Cloud Scouting: Services Discovery and Topology Mapping.
In: ACM Cloud Computing Security Workshop (ACM CCSW) 2013, Berlin, Germany, November 2013.
[Article] , (2013)

Herzberg, Amir and Shulman, Haya :
DNSSEC: Security and Availability Challenges.
In: IEEE Conference on Communications and Network Security (IEEE CNS) 2013 [poster session], Washington, D.C., U.S., October 2013.
[Article] , (2013)

Collberg, Christian and Gibson, Aaron and Herzberg, Amir and Martin, Sam and Shinde, Nitin and Shulman, Haya :
Exposing the Exposers: Identifying Sources of Leaked Documents.
In: IEEE Conference on Communications and Network Security (IEEE CNS) 2013 [poster session], Washington, D.C., U.S., October 2013.
[Article] , (2013)

Herzberg, Amir and Shulman, Haya :
Fragmentation Considered Poisonous: or one-domain-to-rule-them-all.org.
In: IEEE Conference on Communications and Network Security (IEEE CNS) 2013, Washington, D.C., U.S., October 2013.
[Article] , (2013)

Herzberg, Amir and Shulman, Haya :
DNSSEC: Interoperability Challenges and Transition Mechanisms.
In: IEEE International Conference on Availability, Reliability and Security (IEEE ARES) 2013, Regensburg, Germany, September 2013.
[Article] , (2013)

Herzberg, Amir and Shulman, Haya :
Limiting MitM to MitE Covert-Channels.
In: ARES 2013 . IEEE Computer Society
[Conference or Workshop Item] , (2013)

Herzberg, Amir and Shulman, Haya :
Limiting MitM to MitE Covert-Channels.
In: IEEE International Conference on Availability, Reliability and Security (IEEE ARES) 2013, September 2013, Regensburg.
[Conference or Workshop Item] , (2013)

Herzberg, Amir and Shulman, Haya :
Vulnerable Delegation of DNS Resolution.
In: European Symposium on Research in Computer Security (ESORICS) 2013, London, U.K., September 2013.
[Article] , (2013)

Gilad, Yossi and Herzberg, Amir and Shulman, Haya :
Off-Path Hacking: The Illusion of Challenge-Response Authentication.
In: IEEE Security & Privacy
[Article] , (2013)

Elovici, Yuval and Fire, Michael and Herzberg, Amir and Shulman, Haya :
Ethical Considerations When Employing Fake Identities for Research in OSN.
In:
[Article] , (2013)

Bellare, Mihir and Garay, Juan A. and Hauser, Ralf and Herzberg, Amir and Krawczyk, Hugo and Steiner, Michael and Tsudik, Gene and Herreweghen, Els Van and Waidner, Michael :
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4) 611--627.
[Article] , (2000)

Bellare, Mihir and Garay, Juan A. and Hauser, Ralf and Herzberg, Amir and Krawczyk, Hugo and Steiner, Michael and Tsudik, Gene and Waidner, Michael :
iKP -- a family of secure electronic payment protocols.
Proc. First USENIX Workshop on Electronic Commerce
[Conference or Workshop Item] , (1995)

This list was generated on Sat Apr 20 00:58:18 2019 CEST.