基本信息
浏览量:354
职业迁徙
个人简介
Research Areas:
I am interested in security and privacy of networked systems. Security and privacy may be breached in many ways - it only takes one weak link to break the chain. I want to understand different threats and tools, and combine analysis and proofs with implementations, economics, and even human, legal, ethical and psychological aspects. Specific areas:
Internet security: infrastructure (routing, DNS, DoS) and applications (web, phishing).
Applied provable cryptography, esp. of applied cryptographic protocols, PKI, and resiliency to exposures and to cryptanalysis.
Privacy, anonymity and covert communication.
Security of systems interacting with humans: social-engineering, phishing and other attacks exploiting human behaviors, and usable security defenses.
Financial cryptography, i.e., using cryptography to innovate financial systems, protocols and networks.
Security for IoT and other emerging networks (e.g., of sensors, drones, stealthy-bots).
I am interested in security and privacy of networked systems. Security and privacy may be breached in many ways - it only takes one weak link to break the chain. I want to understand different threats and tools, and combine analysis and proofs with implementations, economics, and even human, legal, ethical and psychological aspects. Specific areas:
Internet security: infrastructure (routing, DNS, DoS) and applications (web, phishing).
Applied provable cryptography, esp. of applied cryptographic protocols, PKI, and resiliency to exposures and to cryptanalysis.
Privacy, anonymity and covert communication.
Security of systems interacting with humans: social-engineering, phishing and other attacks exploiting human behaviors, and usable security defenses.
Financial cryptography, i.e., using cryptography to innovate financial systems, protocols and networks.
Security for IoT and other emerging networks (e.g., of sensors, drones, stealthy-bots).
研究兴趣
论文共 233 篇作者统计合作学者相似作者
按年份排序按引用量排序主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
PROCEEDINGS OF 16TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP, CSET 2023pp.41-56, (2023)
BessosMai Ben Adar,HerzbergAmir
IACR Cryptol. ePrint Arch. (2021): 818
引用0浏览0EI引用
0
0
加载更多
作者统计
合作学者
合作机构
D-Core
- 合作者
- 学生
- 导师
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn