Inspected secure communication protocol R Mondri, S Bitan US Patent 7,584,505, 2009 | 376 | 2009 |
Constructions for optimal constant weight cyclically permutable codes and difference families S Bitan, T Etzion IEEE Transactions on Information Theory 41 (1), 77-87, 1995 | 140 | 1995 |
Accessing cellular networks from non-native local networks Y Karmi, S Bitan-Erlich, S Jeffery, E Katz, Y Peleg US Patent 7,653,200, 2010 | 106 | 2010 |
Apparatus, system and method of digital content distribution N Michalowitz, S Bitan-Erlich, R Hod, I Gilad, Y Yemini, A Shaked, ... US Patent App. 12/047,870, 2008 | 83 | 2008 |
Rogue7: Rogue engineering-station attacks on S7 simatic PLCs E Biham, S Bitan, A Carmel, A Dankner, U Malin, A Wool Black Hat USA 2019, 2019 | 46 | 2019 |
On the chromatic number, colorings, and codes of the Johnson graph T Etzion, S Bitan Discrete applied mathematics 70 (2), 163-175, 1996 | 45 | 1996 |
System, apparatus and method for advertising using a data storage device J Levy, N Michalowitz, R Hod, I Gilad, SP Tafla, Y Yemini, S Bitan-Erlich US Patent App. 12/010,760, 2008 | 38 | 2008 |
Method of negotiating security parameters and authenticating users interconnected to a network BD Swander, S Bitan, C Huitema, PG Mayfield, DR Simon US Patent 7,574,603, 2009 | 34 | 2009 |
Method, system and apparatus for providing a personalized electronic shopping center R Hod, I Gilad, Y Yemini, SP Tafla, J Levy, N Michalowitz, S Grill, ... US Patent App. 12/038,130, 2008 | 27 | 2008 |
Explicit delegation with strong authentication T Shiran, S Bitan, N Nice, J De Borst, D Field, S Herzog US Patent 8,020,197, 2011 | 24 | 2011 |
The last packing number of quadruples, and cyclic SQS S Bitan, T Etzion Designs, Codes and Cryptography 3 (4), 283-313, 1993 | 23 | 1993 |
Optimal linear broadcast S Bitan, S Zaks Journal of Algorithms 14 (2), 288-315, 1993 | 16 | 1993 |
Method of negotiating security parameters and authenticating users interconnected to a network C Huitema, PG Mayfield, BD Swander, S Bitan, DR Simon US Patent 8,275,989, 2012 | 10 | 2012 |
TCAN: authentication without cryptography on a can bus based on nodes location on the bus E Biham, S Bitan, E Gavril Proceedings of the 2018 Workshop on Embedded Security in Cars (ESCAR) 16, 2018 | 8 | 2018 |
On constructions for optimal optical orthogonal codes S Bitan, T Etzion Workshop on Algebraic Coding, 111-125, 1993 | 4 | 1993 |
Trusted Execution Environments A Rosenbaum, E Biham, S Bitan Computer Science Department, Technion, 2019 | 3 | 2019 |
Optimal linear broadcast routing with capacity limitations S Bitan, S Zaks International Symposium on Algorithms and Computation, 287-296, 1993 | 3 | 1993 |
STIP: A new model of trusted network S Bitan, A Molkho 2021 IEEE 29th International Conference on Network Protocols (ICNP), 1-6, 2021 | 1 | 2021 |
Optimal linear broadcast S Bitan, S Zaks International Symposium on Algorithms, 368-377, 1990 | 1 | 1990 |
Decentralized incentive-based DDoS mitigation S Bitan, A Molkho, A Dankner 2023 26th Conference on Innovation in Clouds, Internet and Networks and …, 2023 | | 2023 |