TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 25.

Article

Herzberg, Amir ; Shulman, Haya (2015):
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End?
In: Internet Computing, IEEE, (19), pp. 80-84. [Article]

Herzberg, Amir ; Shulman, Haya (2013):
Socket Overloading for Fun and Cache Poisoning.
In: ACM Annual Computer Security Applications Conference (ACM ACSAC) 2013, New Orleans, Louisiana, U.S., December 2013., [Article]

Herzberg, Amir ; Shulman, Haya ; Ullrich, Johanna ; Weippl, Edgar (2013):
Cloud Scouting: Services Discovery and Topology Mapping.
In: ACM Cloud Computing Security Workshop (ACM CCSW) 2013, Berlin, Germany, November 2013., [Article]

Herzberg, Amir ; Shulman, Haya (2013):
DNSSEC: Security and Availability Challenges.
In: IEEE Conference on Communications and Network Security (IEEE CNS) 2013 [poster session], Washington, D.C., U.S., October 2013., [Article]

Collberg, Christian ; Gibson, Aaron ; Herzberg, Amir ; Martin, Sam ; Shinde, Nitin ; Shulman, Haya (2013):
Exposing the Exposers: Identifying Sources of Leaked Documents.
In: IEEE Conference on Communications and Network Security (IEEE CNS) 2013 [poster session], Washington, D.C., U.S., October 2013., [Article]

Herzberg, Amir ; Shulman, Haya (2013):
Fragmentation Considered Poisonous: or one-domain-to-rule-them-all.org.
In: IEEE Conference on Communications and Network Security (IEEE CNS) 2013, Washington, D.C., U.S., October 2013., [Article]

Herzberg, Amir ; Shulman, Haya (2013):
DNSSEC: Interoperability Challenges and Transition Mechanisms.
In: IEEE International Conference on Availability, Reliability and Security (IEEE ARES) 2013, Regensburg, Germany, September 2013., [Article]

Herzberg, Amir ; Shulman, Haya (2013):
Vulnerable Delegation of DNS Resolution.
In: European Symposium on Research in Computer Security (ESORICS) 2013, London, U.K., September 2013., [Article]

Gilad, Yossi ; Herzberg, Amir ; Shulman, Haya (2013):
Off-Path Hacking: The Illusion of Challenge-Response Authentication.
In: IEEE Security & Privacy, [Article]

Elovici, Yuval ; Fire, Michael ; Herzberg, Amir ; Shulman, Haya (2013):
Ethical Considerations When Employing Fake Identities for Research in OSN.
[Article]

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Herreweghen, Els Van ; Waidner, Michael (2000):
Design, Implementation and Deployment of the iKP Secure Electronic Payment System.
In: IEEE Journal on Selected Areas in Communications, 18 (4), pp. 611--627. [Article]

Conference or Workshop Item

Hlavacek, Tomas ; Cunha, Italo ; Gilad, Yossi ; Herzberg, Amir ; Katz-Bassett, Ethan ; Schapira, Michael ; Shulman, Haya (2020):
DISCO: Sidestepping RPKI's Deployment Barriers.
Network and Distributed Systems Security Symposium (NDSS 2020), San Diego, USA, 23.-26. Febr., [Conference or Workshop Item]

Hlavacek, Tomas ; Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2018):
Practical Experience: Methodologies for Measuring Route Origin Validation.
DSN 2017 - The 47th IEEE/IFIP International Conference on Dependable Systems and Networks, Denver,CO,USA, 26.-29.06.2018, [Conference or Workshop Item]

Gilad, Yossi ; Hlavacek, Tomas ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2018):
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
pp. 57-63, ACM, HotNets'18: 17th ACM Workshop on Hot Topics in Networks, November 2018, Redmond, USA, ISBN 978-1-4503-6120-0,
DOI: 10.1145/3286062.3286071,
[Conference or Workshop Item]

Cohen, Avichai ; Gilad, Yossi ; Herzberg, Amir ; Schapira, Michael ; Shulman, Haya (2017):
Are We There Yet? On RPKIs Deployment and Security.
In: Network and Distributed Systems Security (NDSS),
San Diego, CA, USA, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Stratum Filtering: Cloud-Based Detection of Attack Sources.
In: ACM Cloud Computing Security Workshop (CCSW),
Vienna, Austria, [Conference or Workshop Item]

Fischlin, Marc ; Herzberg, Amir ; Noon, Hon Bin ; Shulman, Haya (2016):
Obfuscation Combiners.
In: International Cryptology Conference (CRYPTO),
Santa Barbara, CA, USA, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Waidner, Michael (2016):
Survey of Software Protection with Minimal Hardware.
In: International Conference on Software Science, Technology and Engineering (SWSTE),
Beer Sheva, Israel, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Authentication as a Service: Preventing Amplifikation Attacks.
In: ACSAC, In: 30th Annual Computer Security Applications Conference, pp. 356-365,
New Orleans, LA, USA, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya ; Crispo, Bruno (2014):
Less is More: Cipher-Suite Negotiation for DNSSEC.
In: Computer Security Applications Conference (ACM ACSAC),
ACSAC, IEEE, New Orleans, Louisiana, U.S., [Conference or Workshop Item]

Demmler, Daniel ; Herzberg, Amir ; Schneider, Thomas (2014):
RAID-PIR: Practical Multi-Server PIR.
pp. 45-56, ACM, 6. ACM Cloud Computing Security Workshop (CCSW'14), Scottsdale, Arizona, USA, November 07 - 07, 2014, ISBN 978-1-4503-3239-2,
DOI: 10.1145/2664168.2664181,
[Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya (2014):
DNS Security: Past, Present and Future.
In: Future Security Conference 2014,
Berlin, Germany, [Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya (2013):
Limiting MitM to MitE Covert-Channels.
In: ARES 2013, In: 2013 International Conference on Availability, Reliability and Security, pp. 236-241,
IEEE Computer Society, Regensburg, Germany, DOI: 10.1109/ARES.2013.138,
[Conference or Workshop Item]

Herzberg, Amir ; Shulman, Haya (2013):
Limiting MitM to MitE Covert-Channels.
IEEE International Conference on Availability, Reliability and Security (IEEE ARES) 2013, Regensburg, September 2013, [Conference or Workshop Item]

Bellare, Mihir ; Garay, Juan A. ; Hauser, Ralf ; Herzberg, Amir ; Krawczyk, Hugo ; Steiner, Michael ; Tsudik, Gene ; Waidner, Michael (1995):
iKP -- a family of secure electronic payment protocols.
In: Proc. First USENIX Workshop on Electronic Commerce, pp. 89--106,
[Conference or Workshop Item]

This list was generated on Tue Sep 21 08:07:43 2021 CEST.