Benjamin Arazi

Orcid: 0000-0002-9501-2092

According to our database1, Benjamin Arazi authored at least 34 papers between 1974 and 2010.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Design of a DNA-based shift register.
BMC Bioinform., 2010

DNA-based random number generation in security circuitry.
Biosyst., 2010

A data security protocol for the Trusted Truck® system.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Message Authentication in Computationally Constrained Environments.
IEEE Trans. Mob. Comput., 2009

Intrusion Detection System for SCADA Networks.
Proceedings of the ISCA 24th International Conference on Computers and Their Applications, 2009

Design of a Hierarchical Principal Component Analysis System for Field Intrusion Detection.
Proceedings of the ISCA 22nd International Conference on Computer Applications in Industry and Engineering, 2009

2008
Computationally Efficient Distributed and Delegated Certification.
IEEE Trans. Parallel Distributed Syst., 2008

Random number generation for DNA-based security circuitry.
BMC Bioinform., 2008

Mobile components security.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
Improvements in SCADA and DCS Systems Security.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

2006
Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard.
Des. Codes Cryptogr., 2006

Enhancing Security with Nanotechnology.
Computer, 2006

2005
Revisiting Public-Key Cryptography for Wireless Sensor Networks.
Computer, 2005

1994
On Primality Testing using Purely Divisionless Operations.
Comput. J., 1994

1993
Architectures for Exponentiation Over GF(2^n) Adopted for Smartcard Application.
IEEE Trans. Computers, 1993

Double-Precision Modular Multiplication Based on a Single-Precision Modular Multiplier and a Standard CPU.
IEEE J. Sel. Areas Commun., 1993

1992
A Circular Binary Search.
IEEE Trans. Computers, 1992

1991
Using Flat Concurrent Prolog in System Modeling.
IEEE Trans. Software Eng., 1991

Position Recovery on a Circle Based on Coding Theory.
Proceedings of the Algebraic Coding, 1991

1990
Concurrent Logic Programming as a Hardware Description Tool.
IEEE Trans. Computers, 1990

1989
Intuition, perception, and secure communication.
IEEE Trans. Syst. Man Cybern., 1989

1988
A commonsense approach to the theory of error correcting codes.
MIT Press Series in Computer Systems, MIT Press, ISBN: 978-0-262-01098-6, 1988

1986
A Binary Search with a Parallel Recovery of the Bits.
SIAM J. Comput., 1986

1985
An electrooptical adder.
Proc. IEEE, 1985

1984
An Approach for Generating Different Types of Gray Codes
Inf. Control., 1984

1983
Automatic handwriting identification based on the external properties of the samples.
IEEE Trans. Syst. Man Cybern., 1983

1981
On the Synthesis of de-Bruijn Sequences
Inf. Control., May, 1981

1980
A trapdoor multiple mapping (Corresp.).
IEEE Trans. Inf. Theory, 1980

1978
The Optimal Burst-Error Correction Capability of the Codes Generated by f(X) = (X^p+1)(X^q+1)/(X+1)
Inf. Control., December, 1978

The Fadeogram, A Sonogram-Like Display of the Time-Varying Frequency Response of HF-SSB Radio Channels.
IEEE Trans. Commun., 1978

1977
Self Synchronizing Digital Scramblers.
IEEE Trans. Commun., 1977

1976
Improving the Throughput of an ARQ Stop and Wait Scheme for Burst Noise Channels.
IEEE Trans. Commun., 1976

1975
An Optimal Coding Scheme for a Certain Type of Ensemble.
IEEE Trans. Commun., 1975

1974
Hadamard Transforms of Magnified, Expanded, and Periodic Signals.
IEEE Trans. Commun., 1974


  Loading...