2008 |
20 | EE | László Györfi,
István Vajda:
Growth Optimal Investment with Transaction Costs.
ALT 2008: 108-122 |
2007 |
19 | EE | Levente Buttyán,
Tamás Holczer,
István Vajda:
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs.
ESAS 2007: 129-141 |
18 | EE | Péter Schaffer,
István Vajda:
Cora: correlation-based resilient aggregation in sensor networks.
MSWiM 2007: 373-376 |
17 | EE | Levente Buttyán,
László Dóra,
Márk Félegyházi,
István Vajda:
Barter-based cooperation in delay-tolerant personal wireless networks.
WOWMOM 2007: 1-6 |
16 | EE | Gildas Avoine,
Levente Buttyán,
Tamás Holczer,
István Vajda:
Group-Based Private Authentication.
WOWMOM 2007: 1-6 |
2006 |
15 | EE | Levente Buttyán,
Péter Schaffer,
István Vajda:
Resilient Aggregation with Attack Detection in Sensor Networks.
PerCom Workshops 2006: 332-336 |
14 | EE | Levente Buttyán,
Tamás Holczer,
István Vajda:
Optimal Key-Trees for Tree-Based Private Authentication.
Privacy Enhancing Technologies 2006: 332-350 |
13 | EE | Gergely Ács,
Levente Buttyán,
István Vajda:
Modelling adversaries and security objectives for routing protocols in wireless sensor networks.
SASN 2006: 49-58 |
12 | EE | Levente Buttyán,
Péter Schaffer,
István Vajda:
RANBAR: RANSAC-based resilient aggregation in sensor networks.
SASN 2006: 83-90 |
11 | EE | Gergely Ács,
Levente Buttyán,
István Vajda:
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput. 5(11): 1533-1546 (2006) |
2005 |
10 | EE | Gergely Ács,
Levente Buttyán,
István Vajda:
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks.
ESAS 2005: 113-127 |
9 | EE | Levente Buttyán,
László Dóra,
István Vajda:
Statistical Wormhole Detection in Sensor Networks.
ESAS 2005: 128-141 |
8 | EE | István Zsolt Berta,
Levente Buttyán,
István Vajda:
A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals.
IEEE Trans. Dependable Sec. Comput. 2(3): 268-272 (2005) |
2004 |
7 | | István Zsolt Berta,
Levente Buttyán,
István Vajda:
Privacy Protecting Protocols for Revocable Digital Signatures.
CARDIS 2004: 67-82 |
6 | EE | István Zsolt Berta,
Levente Buttyán,
István Vajda:
Mitigating the Untrusted Terminal Problem Using Conditional Signatures.
ITCC (1) 2004: 12-16 |
5 | EE | Levente Buttyán,
István Vajda:
Towards provable security for ad hoc routing protocols.
SASN 2004: 94-105 |
2002 |
4 | EE | István Vajda:
Conceptual Design of an All Superconducting Mini Power Plant Model.
DELTA 2002: 267-271 |
1998 |
3 | EE | László Györfi,
István Vajda:
Analysis of protocol sequences for slow frequency hopping.
Wireless Networks 4(5): 411-418 (1998) |
1993 |
2 | | László Györfi,
István Vajda:
Constructions of protocol sequences for multiple access collision channel without feedback.
IEEE Transactions on Information Theory 39(5): 1762- (1993) |
1990 |
1 | | István Vajda,
Tibor O. H. Nemetz:
Substitution of Characters in q-ary m-Sequences.
AAECC 1990: 96-105 |