2007 |
44 | EE | Levente Buttyán,
Tamás Holczer,
István Vajda:
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs.
ESAS 2007: 129-141 |
43 | EE | Levente Buttyán,
László Dóra,
Márk Félegyházi,
István Vajda:
Barter-based cooperation in delay-tolerant personal wireless networks.
WOWMOM 2007: 1-6 |
42 | EE | Gildas Avoine,
Levente Buttyán,
Tamás Holczer,
István Vajda:
Group-Based Private Authentication.
WOWMOM 2007: 1-6 |
41 | EE | Levente Buttyán,
Jean-Pierre Hubaux,
Li Li,
Xiang-Yang Li,
Tim Roughgarden,
Alberto Leon-Garcia:
Guest Editorial Non-Cooperative Behavior in Networking.
IEEE Journal on Selected Areas in Communications 25(6): 1065-1068 (2007) |
2006 |
40 | | Levente Buttyán,
Virgil D. Gligor,
Dirk Westhoff:
Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers
Springer 2006 |
39 | EE | Levente Buttyán,
Péter Schaffer,
István Vajda:
Resilient Aggregation with Attack Detection in Sensor Networks.
PerCom Workshops 2006: 332-336 |
38 | EE | Levente Buttyán,
Tamás Holczer,
István Vajda:
Optimal Key-Trees for Tree-Based Private Authentication.
Privacy Enhancing Technologies 2006: 332-350 |
37 | EE | Gergely Ács,
Levente Buttyán,
István Vajda:
Modelling adversaries and security objectives for routing protocols in wireless sensor networks.
SASN 2006: 49-58 |
36 | EE | Levente Buttyán,
Péter Schaffer,
István Vajda:
RANBAR: RANSAC-based resilient aggregation in sensor networks.
SASN 2006: 83-90 |
35 | EE | Srdjan Capkun,
Jean-Pierre Hubaux,
Levente Buttyán:
Mobility Helps Peer-to-Peer Security.
IEEE Trans. Mob. Comput. 5(1): 43-51 (2006) |
34 | EE | Gergely Ács,
Levente Buttyán,
István Vajda:
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput. 5(11): 1533-1546 (2006) |
33 | EE | Naouel Ben Salem,
Levente Buttyán,
Jean-Pierre Hubaux,
Markus Jakobsson:
Node Cooperation in Hybrid Ad Hoc Networks.
IEEE Trans. Mob. Comput. 5(4): 365-376 (2006) |
32 | EE | Márk Félegyházi,
Jean-Pierre Hubaux,
Levente Buttyán:
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput. 5(5): 463-476 (2006) |
2005 |
31 | EE | Gergely Ács,
Levente Buttyán,
István Vajda:
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks.
ESAS 2005: 113-127 |
30 | EE | Levente Buttyán,
László Dóra,
István Vajda:
Statistical Wormhole Detection in Sensor Networks.
ESAS 2005: 128-141 |
29 | EE | Levente Buttyán,
Tamás Holczer,
Péter Schaffer:
Spontaneous Cooperation in Multi-domain Sensor Networks.
ESAS 2005: 42-53 |
28 | EE | Márk Félegyházi,
Jean-Pierre Hubaux,
Levente Buttyán:
Cooperative Packet Forwarding in Multi-Domain Sensor Networks.
PerCom Workshops 2005: 345-349 |
27 | EE | István Zsolt Berta,
Levente Buttyán,
István Vajda:
A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals.
IEEE Trans. Dependable Sec. Comput. 2(3): 268-272 (2005) |
2004 |
26 | | István Zsolt Berta,
Levente Buttyán,
István Vajda:
Privacy Protecting Protocols for Revocable Digital Signatures.
CARDIS 2004: 67-82 |
25 | EE | István Zsolt Berta,
Levente Buttyán,
István Vajda:
Mitigating the Untrusted Terminal Problem Using Conditional Signatures.
ITCC (1) 2004: 12-16 |
24 | EE | Levente Buttyán,
István Vajda:
Towards provable security for ad hoc routing protocols.
SASN 2004: 94-105 |
23 | | Levente Buttyán,
Jean-Pierre Hubaux,
Srdjan Capkun:
A formal model of rational exchange and its application to the analysis of Syverson's protocol.
Journal of Computer Security 12(3-4): 551-587 (2004) |
2003 |
22 | EE | Felix C. Gärtner,
Klaus Kursawe,
Levente Buttyán:
PoDSy 2003: Principles of Dependable Systems.
DSN 2003: 763 |
21 | EE | Markus Jakobsson,
Jean-Pierre Hubaux,
Levente Buttyán:
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.
Financial Cryptography 2003: 15-33 |
20 | EE | Naouel Ben Salem,
Levente Buttyán,
Jean-Pierre Hubaux,
Markus Jakobsson:
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks.
MobiHoc 2003: 13-24 |
19 | EE | Srdjan Capkun,
Jean-Pierre Hubaux,
Levente Buttyán:
Mobility helps security in ad hoc networks.
MobiHoc 2003: 46-56 |
18 | EE | Márk Félegyházi,
Levente Buttyán,
Jean-Pierre Hubaux:
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case.
PWC 2003: 776-789 |
17 | EE | Srdjan Capkun,
Levente Buttyán,
Jean-Pierre Hubaux:
SECTOR: secure tracking of node encounters in multi-hop wireless networks.
SASN 2003: 21-32 |
16 | EE | Felix C. Gärtner,
Levente Buttyán,
Klaus Kursawe:
Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back.
IEEE Distributed Systems Online 4(9): (2003) |
15 | EE | Srdjan Capkun,
Levente Buttyán,
Jean-Pierre Hubaux:
Self-Organized Public-Key Management for Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput. 2(1): 52-64 (2003) |
14 | EE | Levente Buttyán,
Jean-Pierre Hubaux:
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks.
MONET 8(5): 579-592 (2003) |
13 | EE | Levente Buttyán,
Jean-Pierre Hubaux:
Report on a working session on security in wireless ad hoc networks.
Mobile Computing and Communications Review 7(1): 74-94 (2003) |
2002 |
12 | EE | Levente Buttyán,
Jean-Pierre Hubaux,
Srdjan Capkun:
A Formal Analysis of Syverson?s Rational Exchange Protocol.
CSFW 2002: 193-205 |
2001 |
11 | EE | Levente Buttyán,
Naouel Ben Salem:
A Payment Scheme for Broadcast Multimedia Streams.
ISCC 2001: 669-673 |
10 | EE | Jean-Pierre Hubaux,
Levente Buttyán,
Srdjan Capkun:
The quest for security in mobile ad hoc networks.
MobiHoc 2001: 146-155 |
9 | EE | Levente Buttyán,
Jean-Pierre Hubaux:
Rational Exchange - A Formal Model Based on Game Theory.
WELCOM 2001: 114-126 |
2000 |
8 | EE | Levente Buttyán,
Jean-Pierre Hubaux:
Enforcing service availability in mobile ad-hoc WANs.
MobiHoc 2000: 87-96 |
7 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
A Pessimistic Approach to Trust in Mobile Agent Platforms.
IEEE Internet Computing 4(5): 40-48 (2000) |
1999 |
6 | | Sebastian Staamann,
Levente Buttyán,
Allan Coignet,
Ernesto Ruggiano,
Uwe G. Wilhelm,
Marc Zweiacker:
Closed user groups in Internet service centres.
DAIS 1999: 439- |
5 | EE | Levente Buttyán,
Jean-Pierre Hubaux:
Accountable Anonymous Access to Services in Mobile Communication Systems.
SRDS 1999: 384-389 |
4 | | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
Introducing Trusted Third Parties to the Mobile Agent Paradigm.
Secure Internet Programming 1999: 469-489 |
1998 |
3 | EE | Levente Buttyán,
Sebastian Staamann,
Uwe G. Wilhelm:
A Simple Logic for Authentication Protocol Design.
CSFW 1998: 153-162 |
2 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
Protecting the Itinerary of Mobile Agents.
ECOOP Workshops 1998: 301 |
1 | EE | Uwe G. Wilhelm,
Sebastian Staamann,
Levente Buttyán:
On the Problem of Trust in Mobile Agent Systems.
NDSS 1998 |