dblp.uni-trier.dewww.uni-trier.de

Levente Buttyán

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
44EELevente Buttyán, Tamás Holczer, István Vajda: On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. ESAS 2007: 129-141
43EELevente Buttyán, László Dóra, Márk Félegyházi, István Vajda: Barter-based cooperation in delay-tolerant personal wireless networks. WOWMOM 2007: 1-6
42EEGildas Avoine, Levente Buttyán, Tamás Holczer, István Vajda: Group-Based Private Authentication. WOWMOM 2007: 1-6
41EELevente Buttyán, Jean-Pierre Hubaux, Li Li, Xiang-Yang Li, Tim Roughgarden, Alberto Leon-Garcia: Guest Editorial Non-Cooperative Behavior in Networking. IEEE Journal on Selected Areas in Communications 25(6): 1065-1068 (2007)
2006
40 Levente Buttyán, Virgil D. Gligor, Dirk Westhoff: Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers Springer 2006
39EELevente Buttyán, Péter Schaffer, István Vajda: Resilient Aggregation with Attack Detection in Sensor Networks. PerCom Workshops 2006: 332-336
38EELevente Buttyán, Tamás Holczer, István Vajda: Optimal Key-Trees for Tree-Based Private Authentication. Privacy Enhancing Technologies 2006: 332-350
37EEGergely Ács, Levente Buttyán, István Vajda: Modelling adversaries and security objectives for routing protocols in wireless sensor networks. SASN 2006: 49-58
36EELevente Buttyán, Péter Schaffer, István Vajda: RANBAR: RANSAC-based resilient aggregation in sensor networks. SASN 2006: 83-90
35EESrdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán: Mobility Helps Peer-to-Peer Security. IEEE Trans. Mob. Comput. 5(1): 43-51 (2006)
34EEGergely Ács, Levente Buttyán, István Vajda: Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(11): 1533-1546 (2006)
33EENaouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson: Node Cooperation in Hybrid Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(4): 365-376 (2006)
32EEMárk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán: Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(5): 463-476 (2006)
2005
31EEGergely Ács, Levente Buttyán, István Vajda: Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. ESAS 2005: 113-127
30EELevente Buttyán, László Dóra, István Vajda: Statistical Wormhole Detection in Sensor Networks. ESAS 2005: 128-141
29EELevente Buttyán, Tamás Holczer, Péter Schaffer: Spontaneous Cooperation in Multi-domain Sensor Networks. ESAS 2005: 42-53
28EEMárk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán: Cooperative Packet Forwarding in Multi-Domain Sensor Networks. PerCom Workshops 2005: 345-349
27EEIstván Zsolt Berta, Levente Buttyán, István Vajda: A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals. IEEE Trans. Dependable Sec. Comput. 2(3): 268-272 (2005)
2004
26 István Zsolt Berta, Levente Buttyán, István Vajda: Privacy Protecting Protocols for Revocable Digital Signatures. CARDIS 2004: 67-82
25EEIstván Zsolt Berta, Levente Buttyán, István Vajda: Mitigating the Untrusted Terminal Problem Using Conditional Signatures. ITCC (1) 2004: 12-16
24EELevente Buttyán, István Vajda: Towards provable security for ad hoc routing protocols. SASN 2004: 94-105
23 Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun: A formal model of rational exchange and its application to the analysis of Syverson's protocol. Journal of Computer Security 12(3-4): 551-587 (2004)
2003
22EEFelix C. Gärtner, Klaus Kursawe, Levente Buttyán: PoDSy 2003: Principles of Dependable Systems. DSN 2003: 763
21EEMarkus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán: A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. Financial Cryptography 2003: 15-33
20EENaouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson: A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. MobiHoc 2003: 13-24
19EESrdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán: Mobility helps security in ad hoc networks. MobiHoc 2003: 46-56
18EEMárk Félegyházi, Levente Buttyán, Jean-Pierre Hubaux: Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case. PWC 2003: 776-789
17EESrdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux: SECTOR: secure tracking of node encounters in multi-hop wireless networks. SASN 2003: 21-32
16EEFelix C. Gärtner, Levente Buttyán, Klaus Kursawe: Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back. IEEE Distributed Systems Online 4(9): (2003)
15EESrdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 2(1): 52-64 (2003)
14EELevente Buttyán, Jean-Pierre Hubaux: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. MONET 8(5): 579-592 (2003)
13EELevente Buttyán, Jean-Pierre Hubaux: Report on a working session on security in wireless ad hoc networks. Mobile Computing and Communications Review 7(1): 74-94 (2003)
2002
12EELevente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun: A Formal Analysis of Syverson?s Rational Exchange Protocol. CSFW 2002: 193-205
2001
11EELevente Buttyán, Naouel Ben Salem: A Payment Scheme for Broadcast Multimedia Streams. ISCC 2001: 669-673
10EEJean-Pierre Hubaux, Levente Buttyán, Srdjan Capkun: The quest for security in mobile ad hoc networks. MobiHoc 2001: 146-155
9EELevente Buttyán, Jean-Pierre Hubaux: Rational Exchange - A Formal Model Based on Game Theory. WELCOM 2001: 114-126
2000
8EELevente Buttyán, Jean-Pierre Hubaux: Enforcing service availability in mobile ad-hoc WANs. MobiHoc 2000: 87-96
7EEUwe G. Wilhelm, Sebastian Staamann, Levente Buttyán: A Pessimistic Approach to Trust in Mobile Agent Platforms. IEEE Internet Computing 4(5): 40-48 (2000)
1999
6 Sebastian Staamann, Levente Buttyán, Allan Coignet, Ernesto Ruggiano, Uwe G. Wilhelm, Marc Zweiacker: Closed user groups in Internet service centres. DAIS 1999: 439-
5EELevente Buttyán, Jean-Pierre Hubaux: Accountable Anonymous Access to Services in Mobile Communication Systems. SRDS 1999: 384-389
4 Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán: Introducing Trusted Third Parties to the Mobile Agent Paradigm. Secure Internet Programming 1999: 469-489
1998
3EELevente Buttyán, Sebastian Staamann, Uwe G. Wilhelm: A Simple Logic for Authentication Protocol Design. CSFW 1998: 153-162
2EEUwe G. Wilhelm, Sebastian Staamann, Levente Buttyán: Protecting the Itinerary of Mobile Agents. ECOOP Workshops 1998: 301
1EEUwe G. Wilhelm, Sebastian Staamann, Levente Buttyán: On the Problem of Trust in Mobile Agent Systems. NDSS 1998

Coauthor Index

1Gergely Ács [31] [34] [37]
2Gildas Avoine [42]
3István Zsolt Berta [25] [26] [27]
4Srdjan Capkun [10] [12] [15] [17] [19] [23] [35]
5Allan Coignet [6]
6László Dóra [30] [43]
7Márk Félegyházi [18] [28] [32] [43]
8Felix C. Freiling (Felix C. Gärtner) [16] [22]
9Virgil D. Gligor [40]
10Tamás Holczer [29] [38] [42] [44]
11Jean-Pierre Hubaux [5] [8] [9] [10] [12] [13] [14] [15] [17] [18] [19] [20] [21] [23] [28] [32] [33] [35] [41]
12Markus Jakobsson [20] [21] [33]
13Klaus Kursawe [16] [22]
14Alberto Leon-Garcia [41]
15Li Li [41]
16Xiang-Yang Li [41]
17Tim Roughgarden [41]
18Ernesto Ruggiano [6]
19Naouel Ben Salem [11] [20] [33]
20Péter Schaffer [29] [36] [39]
21Sebastian Staamann [1] [2] [3] [4] [6] [7]
22István Vajda [24] [25] [26] [27] [30] [31] [34] [36] [37] [38] [39] [42] [43] [44]
23Dirk Westhoff [40]
24Uwe G. Wilhelm [1] [2] [3] [4] [6] [7]
25Marc Zweiacker [6]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)