The SCEAS System
Navigation Menu

Search the dblp DataBase


Benjamin Arazi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Benjamin Arazi
    Position Recovery on a Circle Based on Coding Theory. [Citation Graph (0, 0)][DBLP]
    Algebraic Coding, 1991, pp:87-101 [Conf]
  2. Benjamin Arazi
    On Primality Testing using Purely Divisionless Operations. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1994, v:37, n:3, pp:219-222 [Journal]
  3. Benjamin Arazi
    Enhancing Security with Nanotechnology. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2006, v:39, n:10, pp:106-107 [Journal]
  4. Benjamin Arazi, Itamar Elhanany, Ortal Arazi, Hairong Qi
    Revisiting Public-Key Cryptography for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:11, pp:103-105 [Journal]
  5. Benjamin Arazi
    Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:3, pp:399-415 [Journal]
  6. Benjamin Arazi
    The Optimal Burst-Error Correction Capability of the Codes Generated by f(X) = (X^p+1)(X^q+1)/(X+1) [Citation Graph (0, 0)][DBLP]
    Information and Control, 1978, v:39, n:3, pp:303-314 [Journal]
  7. Benjamin Arazi
    On the Synthesis of de-Bruijn Sequences [Citation Graph (0, 0)][DBLP]
    Information and Control, 1981, v:49, n:2, pp:81-90 [Journal]
  8. Benjamin Arazi
    An Approach for Generating Different Types of Gray Codes [Citation Graph (0, 0)][DBLP]
    Information and Control, 1984, v:63, n:1/2, pp:1-10 [Journal]
  9. Benjamin Arazi
    Double-Precision Modular Multiplication Based on a Single-Precision Modular Multiplier and a Standard CPU. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:761-769 [Journal]
  10. Benjamin Arazi
    A Binary Search with a Parallel Recovery of the Bits. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1986, v:15, n:3, pp:851-855 [Journal]
  11. Benjamin Arazi
    A Circular Binary Search. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1992, v:41, n:1, pp:109-112 [Journal]
  12. Benjamin Arazi
    Architectures for Exponentiation Over GF(2^n) Adopted for Smartcard Application. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1993, v:42, n:4, pp:494-497 [Journal]
  13. Yoheved Dotan, Benjamin Arazi
    Concurrent Logic Programming as a Hardware Description Tool. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1990, v:39, n:1, pp:72-88 [Journal]
  14. Yoheved Dotan, Benjamin Arazi
    Using Flat Concurrent Prolog in System Modeling. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1991, v:17, n:6, pp:493-512 [Journal]
  15. James H. Graham, Mostafa S. Mostafa, Benjamin Arazi, Ashraf Tantawy, Jeffrey L. Hieb, Patricia A. S. Ralston, Sandip C. Patel
    Improvements in SCADA and DCS Systems Security. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2007, pp:194-200 [Conf]

  16. Design of a Hierarchical Principal Component Analysis System for Field Intrusion Detection. [Citation Graph (, )][DBLP]

  17. Intrusion Detection System for SCADA Networks. [Citation Graph (, )][DBLP]

  18. Random number generation for DNA-based security circuitry. [Citation Graph (, )][DBLP]

Search in 0.019secs, Finished in 0.020secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002