au.\*:("HERZBERG, Amir")
Results 1 to 8 of 8
Selection :
Off-Path TCP Injection AttacksGILAD, Yossi; HERZBERG, Amir.ACM transactions on information and system security. 2013, Vol 16, Num 4, issn 1094-9224, 13.1-13.32Article
On tolerant cryptographic constructionsHERZBERG, Amir.Lecture notes in computer science. 2005, pp 172-190, issn 0302-9743, isbn 3-540-24399-2, 19 p.Conference Paper
Early detection of message forwarding faultsHERZBERG, Amir; KUTTEN, Shay.SIAM journal on computing (Print). 2001, Vol 30, Num 4, pp 1169-1196, issn 0097-5397Article
Bandwidth Distributed Denial of Service: Attacks and DefensesGEVA, Moti; HERZBERG, Amir; GEV, Yehoshua et al.IEEE security & privacy. 2014, Vol 12, Num 1, pp 54-61, issn 1540-7993, 8 p.Article
Relying party credentials frameworkHERZBERG, Amir; MASS, Yosi.Lecture notes in computer science. 2001, pp 328-343, issn 0302-9743, isbn 3-540-41898-9Conference Paper
Toward Digital Asset ProtectionCOLLBERG, Christian; DAVIDSON, Jack; GIACOBAZZI, Roberto et al.IEEE intelligent systems. 2011, Vol 26, Num 6, pp 8-13, issn 1541-1672, 6 p.Article
Sharing video on demandBAR-NOY, Amotz; GARAY, Juan A; HERZBERG, Amir et al.Discrete applied mathematics. 2003, Vol 129, Num 1, pp 3-30, issn 0166-218X, 28 p.Article
TCP Ack storm DoS attacksABRAMOV, Raz; HERZBERG, Amir.Computers & security. 2013, Vol 33, pp 12-27, issn 0167-4048, 16 p.Article