The SCEAS System
| |||||||

## Search the dblp DataBase
Benjamin Arazi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Benjamin Arazi
**Position Recovery on a Circle Based on Coding Theory.**[Citation Graph (0, 0)][DBLP] Algebraic Coding, 1991, pp:87-101 [Conf] - Benjamin Arazi
**On Primality Testing using Purely Divisionless Operations.**[Citation Graph (0, 0)][DBLP] Comput. J., 1994, v:37, n:3, pp:219-222 [Journal] - Benjamin Arazi
**Enhancing Security with Nanotechnology.**[Citation Graph (0, 0)][DBLP] IEEE Computer, 2006, v:39, n:10, pp:106-107 [Journal] - Benjamin Arazi, Itamar Elhanany, Ortal Arazi, Hairong Qi
**Revisiting Public-Key Cryptography for Wireless Sensor Networks.**[Citation Graph (0, 0)][DBLP] IEEE Computer, 2005, v:38, n:11, pp:103-105 [Journal] - Benjamin Arazi
**Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:38, n:3, pp:399-415 [Journal] - Benjamin Arazi
**The Optimal Burst-Error Correction Capability of the Codes Generated by f(X) = (X^p+1)(X^q+1)/(X+1)**[Citation Graph (0, 0)][DBLP] Information and Control, 1978, v:39, n:3, pp:303-314 [Journal] - Benjamin Arazi
**On the Synthesis of de-Bruijn Sequences**[Citation Graph (0, 0)][DBLP] Information and Control, 1981, v:49, n:2, pp:81-90 [Journal] - Benjamin Arazi
**An Approach for Generating Different Types of Gray Codes**[Citation Graph (0, 0)][DBLP] Information and Control, 1984, v:63, n:1/2, pp:1-10 [Journal] - Benjamin Arazi
**Double-Precision Modular Multiplication Based on a Single-Precision Modular Multiplier and a Standard CPU.**[Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:761-769 [Journal] - Benjamin Arazi
**A Binary Search with a Parallel Recovery of the Bits.**[Citation Graph (0, 0)][DBLP] SIAM J. Comput., 1986, v:15, n:3, pp:851-855 [Journal] - Benjamin Arazi
**A Circular Binary Search.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1992, v:41, n:1, pp:109-112 [Journal] - Benjamin Arazi
**Architectures for Exponentiation Over GF(2^n) Adopted for Smartcard Application.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1993, v:42, n:4, pp:494-497 [Journal] - Yoheved Dotan, Benjamin Arazi
**Concurrent Logic Programming as a Hardware Description Tool.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1990, v:39, n:1, pp:72-88 [Journal] - Yoheved Dotan, Benjamin Arazi
**Using Flat Concurrent Prolog in System Modeling.**[Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1991, v:17, n:6, pp:493-512 [Journal] - James H. Graham, Mostafa S. Mostafa, Benjamin Arazi, Ashraf Tantawy, Jeffrey L. Hieb, Patricia A. S. Ralston, Sandip C. Patel
**Improvements in SCADA and DCS Systems Security.**[Citation Graph (0, 0)][DBLP] Computers and Their Applications, 2007, pp:194-200 [Conf] **Design of a Hierarchical Principal Component Analysis System for Field Intrusion Detection.**[Citation Graph (, )][DBLP]**Intrusion Detection System for SCADA Networks.**[Citation Graph (, )][DBLP]**Random number generation for DNA-based security circuitry.**[Citation Graph (, )][DBLP]
Search in 0.019secs, Finished in 0.020secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |