dblp.uni-trier.dewww.uni-trier.de

István Vajda

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
20EELászló Györfi, István Vajda: Growth Optimal Investment with Transaction Costs. ALT 2008: 108-122
2007
19EELevente Buttyán, Tamás Holczer, István Vajda: On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. ESAS 2007: 129-141
18EEPéter Schaffer, István Vajda: Cora: correlation-based resilient aggregation in sensor networks. MSWiM 2007: 373-376
17EELevente Buttyán, László Dóra, Márk Félegyházi, István Vajda: Barter-based cooperation in delay-tolerant personal wireless networks. WOWMOM 2007: 1-6
16EEGildas Avoine, Levente Buttyán, Tamás Holczer, István Vajda: Group-Based Private Authentication. WOWMOM 2007: 1-6
2006
15EELevente Buttyán, Péter Schaffer, István Vajda: Resilient Aggregation with Attack Detection in Sensor Networks. PerCom Workshops 2006: 332-336
14EELevente Buttyán, Tamás Holczer, István Vajda: Optimal Key-Trees for Tree-Based Private Authentication. Privacy Enhancing Technologies 2006: 332-350
13EEGergely Ács, Levente Buttyán, István Vajda: Modelling adversaries and security objectives for routing protocols in wireless sensor networks. SASN 2006: 49-58
12EELevente Buttyán, Péter Schaffer, István Vajda: RANBAR: RANSAC-based resilient aggregation in sensor networks. SASN 2006: 83-90
11EEGergely Ács, Levente Buttyán, István Vajda: Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(11): 1533-1546 (2006)
2005
10EEGergely Ács, Levente Buttyán, István Vajda: Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. ESAS 2005: 113-127
9EELevente Buttyán, László Dóra, István Vajda: Statistical Wormhole Detection in Sensor Networks. ESAS 2005: 128-141
8EEIstván Zsolt Berta, Levente Buttyán, István Vajda: A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals. IEEE Trans. Dependable Sec. Comput. 2(3): 268-272 (2005)
2004
7 István Zsolt Berta, Levente Buttyán, István Vajda: Privacy Protecting Protocols for Revocable Digital Signatures. CARDIS 2004: 67-82
6EEIstván Zsolt Berta, Levente Buttyán, István Vajda: Mitigating the Untrusted Terminal Problem Using Conditional Signatures. ITCC (1) 2004: 12-16
5EELevente Buttyán, István Vajda: Towards provable security for ad hoc routing protocols. SASN 2004: 94-105
2002
4EEIstván Vajda: Conceptual Design of an All Superconducting Mini Power Plant Model. DELTA 2002: 267-271
1998
3EELászló Györfi, István Vajda: Analysis of protocol sequences for slow frequency hopping. Wireless Networks 4(5): 411-418 (1998)
1993
2 László Györfi, István Vajda: Constructions of protocol sequences for multiple access collision channel without feedback. IEEE Transactions on Information Theory 39(5): 1762- (1993)
1990
1 István Vajda, Tibor O. H. Nemetz: Substitution of Characters in q-ary m-Sequences. AAECC 1990: 96-105

Coauthor Index

1Gergely Ács [10] [11] [13]
2Gildas Avoine [16]
3István Zsolt Berta [6] [7] [8]
4Levente Buttyán [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [19]
5László Dóra [9] [17]
6Márk Félegyházi [17]
7László Györfi [2] [3] [20]
8Tamás Holczer [14] [16] [19]
9Tibor O. H. Nemetz [1]
10Péter Schaffer [12] [15] [18]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)