2009 |
17 | | Aleksey Ashikhmin,
James Graham,
Ahmed Desoky,
Benjamin Arazi:
Intrusion Detection System for SCADA Networks.
CATA 2009: 156-161 |
2008 |
16 | EE | Benjamin Arazi:
Computationally Efficient Distributed and Delegated Certification.
IEEE Trans. Parallel Distrib. Syst. 19(9): 1167-1174 (2008) |
2007 |
15 | | James H. Graham,
Mostafa S. Mostafa,
Benjamin Arazi,
Ashraf Tantawy,
Jeffrey L. Hieb,
Patricia A. S. Ralston,
Sandip C. Patel:
Improvements in SCADA and DCS Systems Security.
Computers and Their Applications 2007: 194-200 |
2006 |
14 | EE | Benjamin Arazi:
Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard.
Des. Codes Cryptography 38(3): 399-415 (2006) |
13 | EE | Benjamin Arazi:
Enhancing Security with Nanotechnology.
IEEE Computer 39(10): 106-107 (2006) |
2005 |
12 | EE | Benjamin Arazi,
Itamar Elhanany,
Ortal Arazi,
Hairong Qi:
Revisiting Public-Key Cryptography for Wireless Sensor Networks.
IEEE Computer 38(11): 103-105 (2005) |
1994 |
11 | | Benjamin Arazi:
On Primality Testing using Purely Divisionless Operations.
Comput. J. 37(3): 219-222 (1994) |
1993 |
10 | | Benjamin Arazi:
Double-Precision Modular Multiplication Based on a Single-Precision Modular Multiplier and a Standard CPU.
IEEE Journal on Selected Areas in Communications 11(5): 761-769 (1993) |
9 | | Benjamin Arazi:
Architectures for Exponentiation Over GF(2^n) Adopted for Smartcard Application.
IEEE Trans. Computers 42(4): 494-497 (1993) |
1992 |
8 | | Benjamin Arazi:
A Circular Binary Search.
IEEE Trans. Computers 41(1): 109-112 (1992) |
1991 |
7 | | Benjamin Arazi:
Position Recovery on a Circle Based on Coding Theory.
Algebraic Coding 1991: 87-101 |
6 | EE | Yoheved Dotan,
Benjamin Arazi:
Using Flat Concurrent Prolog in System Modeling.
IEEE Trans. Software Eng. 17(6): 493-512 (1991) |
1990 |
5 | | Yoheved Dotan,
Benjamin Arazi:
Concurrent Logic Programming as a Hardware Description Tool.
IEEE Trans. Computers 39(1): 72-88 (1990) |
1986 |
4 | | Benjamin Arazi:
A Binary Search with a Parallel Recovery of the Bits.
SIAM J. Comput. 15(3): 851-855 (1986) |
1984 |
3 | | Benjamin Arazi:
An Approach for Generating Different Types of Gray Codes
Information and Control 63(1/2): 1-10 (1984) |
1981 |
2 | | Benjamin Arazi:
On the Synthesis of de-Bruijn Sequences
Information and Control 49(2): 81-90 (1981) |
1978 |
1 | | Benjamin Arazi:
The Optimal Burst-Error Correction Capability of the Codes Generated by f(X) = (X^p+1)(X^q+1)/(X+1)
Information and Control 39(3): 303-314 (1978) |