The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

István Vajda: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. István Vajda, Tibor O. H. Nemetz
    Substitution of Characters in q-ary m-Sequences. [Citation Graph (0, 0)][DBLP]
    AAECC, 1990, pp:96-105 [Conf]
  2. István Zsolt Berta, Levente Buttyán, István Vajda
    Privacy Protecting Protocols for Revocable Digital Signatures. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:67-82 [Conf]
  3. B. Bencsath, I. Vajda
    Collecting randomness from the net. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  4. István Vajda
    Conceptual Design of an All Superconducting Mini Power Plant Model. [Citation Graph (0, 0)][DBLP]
    DELTA, 2002, pp:267-271 [Conf]
  5. Gergely Ács, Levente Buttyán, István Vajda
    Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:113-127 [Conf]
  6. Levente Buttyán, László Dóra, István Vajda
    Statistical Wormhole Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:128-141 [Conf]
  7. István Zsolt Berta, Levente Buttyán, István Vajda
    Mitigating the Untrusted Terminal Problem Using Conditional Signatures. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:12-16 [Conf]
  8. Levente Buttyán, Péter Schaffer, István Vajda
    Resilient Aggregation with Attack Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:332-336 [Conf]
  9. Levente Buttyán, Tamás Holczer, István Vajda
    Optimal Key-Trees for Tree-Based Private Authentication. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:332-350 [Conf]
  10. Gergely Ács, Levente Buttyán, István Vajda
    Modelling adversaries and security objectives for routing protocols in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:49-58 [Conf]
  11. Levente Buttyán, Péter Schaffer, István Vajda
    RANBAR: RANSAC-based resilient aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:83-90 [Conf]
  12. Levente Buttyán, István Vajda
    Towards provable security for ad hoc routing protocols. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:94-105 [Conf]
  13. István Zsolt Berta, Levente Buttyán, István Vajda
    A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:268-272 [Journal]
  14. László Györfi, István Vajda
    Constructions of protocol sequences for multiple access collision channel without feedback. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:5, pp:1762-0 [Journal]
  15. Gergely Ács, Levente Buttyán, István Vajda
    Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:11, pp:1533-1546 [Journal]
  16. László Györfi, István Vajda
    Analysis of protocol sequences for slow frequency hopping. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1998, v:4, n:5, pp:411-418 [Journal]
  17. Levente Buttyán, Tamás Holczer, István Vajda
    On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:129-141 [Conf]

  18. Growth Optimal Investment with Transaction Costs. [Citation Graph (, )][DBLP]


  19. Cora: correlation-based resilient aggregation in sensor networks. [Citation Graph (, )][DBLP]


  20. Pollution Attack Defense for Coding Based Sensor Storage. [Citation Graph (, )][DBLP]


  21. Group-Based Private Authentication. [Citation Graph (, )][DBLP]


  22. Barter-based cooperation in delay-tolerant personal wireless networks. [Citation Graph (, )][DBLP]


  23. CORA: Correlation-based resilient aggregation in sensor networks. [Citation Graph (, )][DBLP]


  24. Barter trade improves message delivery in opportunistic networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002