Inspected secure communication protocol R Mondri, S Bitan US Patent 7,584,505, 2009 | 401 | 2009 |
Constructions for optimal constant weight cyclically permutable codes and difference families S Bitan, T Etzion IEEE Transactions on Information Theory 41 (1), 77-87, 1995 | 148 | 1995 |
Accessing cellular networks from non-native local networks Y Karmi, S Bitan-Erlich, S Jeffery, E Katz, Y Peleg US Patent 7,653,200, 2010 | 111 | 2010 |
Apparatus, system and method of digital content distribution N Michalowitz, S Bitan-Erlich, R Hod, I Gilad, Y Yemini, A Shaked, ... US Patent App. 12/047,870, 2008 | 94 | 2008 |
Rogue7: Rogue engineering-station attacks on s7 simatic plcs E Biham, S Bitan, A Carmel, A Dankner, U Malin, A Wool Black Hat USA 2019, 2019 | 72 | 2019 |
On the chromatic number, colorings, and codes of the Johnson graph T Etzion, S Bitan Discrete applied mathematics 70 (2), 163-175, 1996 | 44 | 1996 |
System, apparatus and method for advertising using a data storage device J Levy, N Michalowitz, R Hod, I Gilad, SP Tafla, Y Yemini, S Bitan-Erlich US Patent App. 12/010,760, 2008 | 42 | 2008 |
Method of negotiating security parameters and authenticating users interconnected to a network BD Swander, S Bitan, C Huitema, PG Mayfield, DR Simon US Patent 7,574,603, 2009 | 34 | 2009 |
Method, system and apparatus for providing a personalized electronic shopping center R Hod, I Gilad, Y Yemini, SP Tafla, J Levy, N Michalowitz, S Grill, ... US Patent App. 12/038,130, 2008 | 31 | 2008 |
Explicit delegation with strong authentication T Shiran, S Bitan, N Nice, J De Borst, D Field, S Herzog US Patent 8,020,197, 2011 | 25 | 2011 |
The last packing number of quadruples, and cyclic SQS S Bitan, T Etzion Designs, Codes and Cryptography 3 (4), 283-313, 1993 | 25 | 1993 |
Optimal linear broadcast S Bitan, S Zaks Journal of Algorithms 14 (2), 288-315, 1993 | 17 | 1993 |
Method of negotiating security parameters and authenticating users interconnected to a network C Huitema, PG Mayfield, BD Swander, S Bitan, DR Simon US Patent 8,275,989, 2012 | 11 | 2012 |
TCAN: authentication without cryptography on a can bus based on nodes location on the bus E Biham, S Bitan, E Gavril Proceedings of the 2018 Workshop on Embedded Security in Cars (ESCAR) 16, 2018 | 9 | 2018 |
Optimal linear broadcast routing with capacity limitations S Bitan, S Zaks International Symposium on Algorithms and Computation, 287-296, 1993 | 4 | 1993 |
On constructions for optimal optical orthogonal codes S Bitan, T Etzion Workshop on Algebraic Coding, 111-125, 1993 | 4 | 1993 |
STIP: A new model of trusted network S Bitan, A Molkho 2021 IEEE 29th International Conference on Network Protocols (ICNP), 1-6, 2021 | 3 | 2021 |
Trusted Execution Environments A Rosenbaum, E Biham, S Bitan Computer Science Department, Technion, 2019 | 3 | 2019 |
Decentralized incentive-based DDoS mitigation S Bitan, A Molkho, A Dankner 2023 26th Conference on Innovation in Clouds, Internet and Networks and …, 2023 | 1 | 2023 |
K7: A Protected Protocol for Industrial Control Systems that Fits Large Organizations E Biham, S Bitan, A Dankner Sixth Annual Industrial Control System Security (ICSS) Workshop, 1-12, 2020 | 1 | 2020 |