|
Security and Privacy Issues in Pervasive Computing
|
Help
Print
|
Here you can view and search the projects funded by NKFI since 2004
Back »
|
|
List of publications |
|
|
Berta I; Buttyán L; Vajda I: Mitigating the Untrusted Terminal Problem Using Conditional Signatures, In: IEEE Conference on Information Technology, Las Vegas, NV, USA: 2004., 2004 | Zömbik L; Buttyán L: Modelling Location Reveal Attacks in Mobile Systems, Periodica Polytechnica 48(1-2):85-100, 2004 | Buttyán L; Hubaux JP; Capkun S: A Formal Model of Rational Exchange and its Application to the Analysis of Syverson\'s Protocol, Journal of Computer Security 12(3-4):551-587, 2004 | Buttyán L; Holczer T; Schaffer P: Kooperációra ösztönző mechanizmusok többugrásos vezeték nélküli hálózatokban, Híradástechnika, 2004. március, 2004 | Buttyán L; Vajda I: Towards Provable Security for Ad Hoc Routing Protocols, In: 2nd ACM Workshop on Security in Ad Hoc and Sensor Networks, Washington DC, USA: 2004., 2004 | Félegyházi M; Hubaux JP; Buttyán L: Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks, In: 2nd Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Cambridge, UK: 2004., 2004 | Berta I; Buttyán L; Vajda I: Privacy Protecting Protocols for Revokable Digital Signatures, In: 6th IFIP Conference on Smart Card Research and Advanced Application, Toulouse, France: 2004., 2004 | Berta I; Bencsáth B: Sending authentic messages from malicious terminals, In: NIIF Networkshop Conference, Hungary: 2004., 2004 | Bencsáth B; Vajda I: Protection Against DDoS Attacks Based On Traffic Level Measurements, In: International Symposium on Collaborative Technologies and Systems, San Diego, CA, USA: 2004., 2004 | Bencsáth B; Vajda I: Trap E-mail Address for Combating E-mail Viruses, In: IEEE Conference on Software, Telecommunications and Computer Networks, Split, Croatia: 2004., 2004 | Bencsáth B: A hálózati vírusvédelem és a szolgáltatásmegtagadásos támadások elleni védekezés problémái és kapcsolatai, In: NIIF Networkshop Conference, Hungary: 2004., 2004 | Bencsáth B: Az internetes vírus- és spamvédelem rendszerszemléletben, In: HISEC Konferencia, Budapest, Hungary: 2004., 2004 | Ács G; Buttyán L; Vajda I: Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks, 4th ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2006), 2006 | Buttyán L; Schaffer P; Vajda I: Resilient Aggregation with Attack Detection in Sensor Networks, közlésre elfogadva: Second IEEE Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS), 2006 | Félegyházi M; Hubaux JP; Buttyán L: Cooperative Packet Forwarding in Multi-Domain Sensor Networks, In: First International Workshop on Sensor Networks and Systems for Pervasive Computing, 2005, 2005 | Berta I; Buttyán L; Vajda I: Standards for Product Security Assessment, In: H. Bidgoli (ed.) The Handbook of Information Security: John Wiley & Sons, Inc., 2005 | Ács G; Buttyán L; Vajda I: Provable Security for Ad Hoc Routing Protocols, In: Híradástechnika, 2005 | Ács G; Buttyán L; Vajda I: Ad hoc útvonalválasztó protokollok bizonyított biztonsága, In: Híradástechnika, 2005 | Buttyán L; Györfi L; Vajda I: Adatbiztonság: titkosítás, hitelesítés, digitális aláírás, In: Magyar Tudomány, 2005 | Ács G; Buttyán L; Vajda I: Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks, In: Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, Springer LNCS, 2005 | Buttyán L; Dóra L; Vajda I: Statistical Wormhole Detection in Sensor Networks, In: Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, Springer LNCS, 2005 | Buttyán L; Holczer T; Schaffer P: Spontaneous Cooperation in Multi-Domain Sensor Networks, In: Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, Springer LNCS, 2005 | Bencsáth B; Vajda I: Efficient Directory Harvest Attacks, In: IEEE Symposium on Collaborative Technologies and Systems, 2005 | Ács G; Buttyán L: A taxonomy of routing protocols for wireless sensor networks, Hiradástechnika, december, 2006 | Ács G; Buttyán L: Útvonalválasztó protokollok vezeték nélküli szenzorhálózatokban, Hiradástechnika, november, 2006 | Buttyán L; Dóra L; Félegyházi M; Vajda I: Barter-based cooperation in delay-tolerant personal wireless networks, In: IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications: 2007., 2007 | Bencsáth B; Rónai M: Empirical Analysis of Denial of Service Attack Against SMTP Servers, In: IEEE International Symposium on Collaborative Technologies and Systems: 2007., 2007 | Buttyán L; Holczer T; Vajda I: On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs, In: European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS): 2007., 2007 | Buttyán L; Schaffer P: PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks, In: IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS): 2007., 2007 | Ács G; Buttyán L; Vajda I: The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks, In: IEEE Workshop on Wireless and Sensor Networks Security (WSNS): 2007., 2007 | Buttyán L; Hubaux J-P: Security and Cooperation in Wireless Networks, Cambridge University Press, 2007 | Capkun S; Hubaux J-P; Buttyán L: Mobility Helps Peer-to-Peer Security, IEEE Transactions on Mobile Computing, 2006 | Ács G; Buttyán L; Vajda I: Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, Vol 5, No 11., 2006 | Félegyházi M; Hubaux JP; Buttyán L: Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks, IEEE Transactions on Mobile Computing, 2006 | Ben Salem N; Buttyán L; Hubaux J-P; Jakobsson M: Node Cooperation in Hybrid Ad hoc Networks, IEEE Transactions on Mobile Computing, 2006 | Buttyán L; Holczer T; Vajda I: Optimal Key-Trees for Tree-Based Private Authentication, International Workshop on Privacy Enhancing Technologies (PET 2006), 2006 | Avoine G; Buttyán L; Holczer T; Vajda I: Group-Based Private Authentication, In: IEEE International Workshop on Trust, Security, and Privacy for Ubiquitous Computing (TSPUC): 2007., 2007 | Buttyán L; Schaffer P; Vajda I: RANBAR: RANSAC Based Resilient Aggregation in Sensor Networks, 4th ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2006), 2006 | Schaffer P; Vajda I: CORA: Correlation-based Resilient Aggregation in Sensor Networks, In: ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM): 2007., 2007 | Ács G; Buttyán L: Secure Routing in Wireless Sensor Networks, In: in J. Lopez and J. Zhou (eds.), Wireless Sensor Network Security, IOS Press: 2008., 2008 | Berta I; Buttyán L; Vajda I: A framework for the revocation of unintended digital signatures initiated by malicious terminals, In: IEEE Transactions on Dependable and Secure Computing, 2005 | Bencsáth B; Vajda I: Efficient Directory Harvest Attacks and Countermeasures, In: International Journal of Network Security, Vol 5, No 3: 2007., 2007 |
|
|
|
|
|
|
Back »
|
|
|