Sara Bitan
Sara Bitan
Computer Science Faculty, Technion, IIT
Verified email at
Cited by
Cited by
Inspected secure communication protocol
R Mondri, S Bitan
US Patent 7,584,505, 2009
Constructions for optimal constant weight cyclically permutable codes and difference families
S Bitan, T Etzion
IEEE Transactions on Information Theory 41 (1), 77-87, 1995
Accessing cellular networks from non-native local networks
Y Karmi, S Bitan-Erlich, S Jeffery, E Katz, Y Peleg
US Patent 7,653,200, 2010
Apparatus, system and method of digital content distribution
N Michalowitz, S Bitan-Erlich, R Hod, I Gilad, Y Yemini, A Shaked, ...
US Patent App. 12/047,870, 2008
Rogue7: Rogue engineering-station attacks on s7 simatic plcs
E Biham, S Bitan, A Carmel, A Dankner, U Malin, A Wool
Black Hat USA 2019, 2019
On the chromatic number, colorings, and codes of the Johnson graph
T Etzion, S Bitan
Discrete applied mathematics 70 (2), 163-175, 1996
System, apparatus and method for advertising using a data storage device
J Levy, N Michalowitz, R Hod, I Gilad, SP Tafla, Y Yemini, S Bitan-Erlich
US Patent App. 12/010,760, 2008
Method of negotiating security parameters and authenticating users interconnected to a network
BD Swander, S Bitan, C Huitema, PG Mayfield, DR Simon
US Patent 7,574,603, 2009
Method, system and apparatus for providing a personalized electronic shopping center
R Hod, I Gilad, Y Yemini, SP Tafla, J Levy, N Michalowitz, S Grill, ...
US Patent App. 12/038,130, 2008
Explicit delegation with strong authentication
T Shiran, S Bitan, N Nice, J De Borst, D Field, S Herzog
US Patent 8,020,197, 2011
The last packing number of quadruples, and cyclic SQS
S Bitan, T Etzion
Designs, Codes and Cryptography 3 (4), 283-313, 1993
Optimal linear broadcast
S Bitan, S Zaks
Journal of Algorithms 14 (2), 288-315, 1993
Method of negotiating security parameters and authenticating users interconnected to a network
C Huitema, PG Mayfield, BD Swander, S Bitan, DR Simon
US Patent 8,275,989, 2012
TCAN: authentication without cryptography on a can bus based on nodes location on the bus
E Biham, S Bitan, E Gavril
Proceedings of the 2018 Workshop on Embedded Security in Cars (ESCAR) 16, 2018
Optimal linear broadcast routing with capacity limitations
S Bitan, S Zaks
International Symposium on Algorithms and Computation, 287-296, 1993
On constructions for optimal optical orthogonal codes
S Bitan, T Etzion
Workshop on Algebraic Coding, 111-125, 1993
Trusted Execution Environments
A Rosenbaum, E Biham, S Bitan
Computer Science Department, Technion, 2019
STIP: A new model of trusted network
S Bitan, A Molkho
2021 IEEE 29th International Conference on Network Protocols (ICNP), 1-6, 2021
Decentralized incentive-based DDoS mitigation
S Bitan, A Molkho, A Dankner
2023 26th Conference on Innovation in Clouds, Internet and Networks and …, 2023
K7: A Protected Protocol for Industrial Control Systems that Fits Large Organizations
E Biham, S Bitan, A Dankner
Sixth Annual Industrial Control System Security (ICSS) Workshop, 1-12, 2020
The system can't perform the operation now. Try again later.
Articles 1–20