Inspected secure communication protocol R Mondri, S Bitan US Patent 7,584,505, 2009 | 211 | 2009 |
Constructions for optimal constant weight cyclically permutable codes and difference families S Bitan, T Etzion IEEE Transactions on Information Theory 41 (1), 77-87, 1995 | 125 | 1995 |
Accessing cellular networks from non-native local networks Y Karmi, S Bitan-Erlich, S Jeffery, E Katz, Y Peleg US Patent 7,653,200, 2010 | 101 | 2010 |
Apparatus, system and method of digital content distribution N Michalowitz, S Bitan-Erlich, R Hod, I Gilad, Y Yemini, A Shaked, ... US Patent App. 12/047,870, 2008 | 64 | 2008 |
Direct Data Placement Protocol (DDP)/Remote Direct Memory Access Protocol (RDMAP) Security J Pinkerton, E Deleganes RFC 5042, October, 2007 | 37 | 2007 |
System, apparatus and method for advertising using a data storage device J Levy, N Michalowitz, R Hod, I Gilad, SP Tafla, Y Yemini, S Bitan-Erlich US Patent App. 12/010,760, 2008 | 34 | 2008 |
On the chromatic number, colorings, and codes of the Johnson graph T Etzion, S Bitan Discrete applied mathematics 70 (2), 163-175, 1996 | 33 | 1996 |
Method of negotiating security parameters and authenticating users interconnected to a network BD Swander, S Bitan, C Huitema, PG Mayfield, DR Simon US Patent 7,574,603, 2009 | 32 | 2009 |
Method, system and apparatus for providing a personalized electronic shopping center R Hod, I Gilad, Y Yemini, SP Tafla, J Levy, N Michalowitz, S Grill, ... US Patent App. 12/038,130, 2008 | 22 | 2008 |
The last packing number of quadruples, and cyclic SQS S Bitan, T Etzion Designs, Codes and Cryptography 3 (4), 283-313, 1993 | 21 | 1993 |
Explicit delegation with strong authentication T Shiran, S Bitan, N Nice, J De Borst, D Field, S Herzog US Patent 8,020,197, 2011 | 20 | 2011 |
Optimal linear broadcast S Bitan, S Zaks Journal of Algorithms 14 (2), 288-315, 1993 | 14 | 1993 |
Method of negotiating security parameters and authenticating users interconnected to a network C Huitema, PG Mayfield, BD Swander, S Bitan, DR Simon US Patent 8,275,989, 2012 | 10 | 2012 |
Rogue7: Rogue Engineering-Station attacks on S7 Simatic PLCs E Biham, S Bitan, A Carmel, A Dankner, U Malin, A Wool Mandalay Bay/Las Vegas, 2019 | 7 | 2019 |
TCAN: Authentication Without Cryptography on a CAN Bus Based on Nodes Location on the Bus E Biham, S Bitan, E Gavril Proceedings of the 2018 Workshop on Embedded Security in Cars (ESCAR) 16, 2018 | 5 | 2018 |
On constructions for optimal optical orthogonal codes S Bitan, T Etzion Workshop on Algebraic Coding, 111-125, 1993 | 4 | 1993 |
Optimal linear broadcast routing with capacity limitations S Bitan, S Zaks International Symposium on Algorithms and Computation, 287-296, 1993 | 2 | 1993 |
Trusted Execution Environments A Rosenbaum, E Biham, S Bitan Computer Science Department, Technion, 2019 | 1 | 2019 |
Optimal linear broadcast S Bitan, S Zaks International Symposium on Algorithms, 368-377, 1990 | 1 | 1990 |
DNS-Morph: UDP-Based Bootstrapping Protocol For Tor R Ailabouni, O Dunkelman, S Bitan arXiv preprint arXiv:1904.01240, 2019 | | 2019 |