The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Levente Buttyán: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. István Zsolt Berta, Levente Buttyán, István Vajda
    Privacy Protecting Protocols for Revocable Digital Signatures. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:67-82 [Conf]
  2. Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
    A Formal Analysis of Syverson?s Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:193-205 [Conf]
  3. Levente Buttyán, Sebastian Staamann, Uwe G. Wilhelm
    A Simple Logic for Authentication Protocol Design. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:153-162 [Conf]
  4. Sebastian Staamann, Levente Buttyán, Allan Coignet, Ernesto Ruggiano, Uwe G. Wilhelm, Marc Zweiacker
    Closed user groups in Internet service centres. [Citation Graph (0, 0)][DBLP]
    DAIS, 1999, pp:439-0 [Conf]
  5. Felix C. Gärtner, Klaus Kursawe, Levente Buttyán
    PoDSy 2003: Principles of Dependable Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2003, pp:763- [Conf]
  6. Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
    Protecting the Itinerary of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:301- [Conf]
  7. Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
    Introducing Trusted Third Parties to the Mobile Agent Paradigm. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:469-489 [Conf]
  8. Gergely Ács, Levente Buttyán, István Vajda
    Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:113-127 [Conf]
  9. Levente Buttyán, László Dóra, István Vajda
    Statistical Wormhole Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:128-141 [Conf]
  10. Levente Buttyán, Tamás Holczer, Péter Schaffer
    Spontaneous Cooperation in Multi-domain Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:42-53 [Conf]
  11. Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán
    A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:15-33 [Conf]
  12. Márk Félegyházi, Levente Buttyán, Jean-Pierre Hubaux
    Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:776-789 [Conf]
  13. Levente Buttyán, Naouel Ben Salem
    A Payment Scheme for Broadcast Multimedia Streams. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:669-673 [Conf]
  14. István Zsolt Berta, Levente Buttyán, István Vajda
    Mitigating the Untrusted Terminal Problem Using Conditional Signatures. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:12-16 [Conf]
  15. Levente Buttyán, Jean-Pierre Hubaux
    Enforcing service availability in mobile ad-hoc WANs. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2000, pp:87-96 [Conf]
  16. Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
    Mobility helps security in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2003, pp:46-56 [Conf]
  17. Jean-Pierre Hubaux, Levente Buttyán, Srdjan Capkun
    The quest for security in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2001, pp:146-155 [Conf]
  18. Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson
    A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2003, pp:13-24 [Conf]
  19. Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
    On the Problem of Trust in Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  20. Levente Buttyán, Péter Schaffer, István Vajda
    Resilient Aggregation with Attack Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:332-336 [Conf]
  21. Márk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán
    Cooperative Packet Forwarding in Multi-Domain Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2005, pp:345-349 [Conf]
  22. Levente Buttyán, Tamás Holczer, István Vajda
    Optimal Key-Trees for Tree-Based Private Authentication. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:332-350 [Conf]
  23. Gergely Ács, Levente Buttyán, István Vajda
    Modelling adversaries and security objectives for routing protocols in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:49-58 [Conf]
  24. Levente Buttyán, Péter Schaffer, István Vajda
    RANBAR: RANSAC-based resilient aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:83-90 [Conf]
  25. Levente Buttyán, István Vajda
    Towards provable security for ad hoc routing protocols. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:94-105 [Conf]
  26. Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
    SECTOR: secure tracking of node encounters in multi-hop wireless networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:21-32 [Conf]
  27. Levente Buttyán, Jean-Pierre Hubaux
    Accountable Anonymous Access to Services in Mobile Communication Systems. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1999, pp:384-389 [Conf]
  28. Levente Buttyán, Jean-Pierre Hubaux
    Rational Exchange - A Formal Model Based on Game Theory. [Citation Graph (0, 0)][DBLP]
    WELCOM, 2001, pp:114-126 [Conf]
  29. Felix C. Gärtner, Levente Buttyán, Klaus Kursawe
    Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2003, v:4, n:9, pp:- [Journal]
  30. Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
    A Pessimistic Approach to Trust in Mobile Agent Platforms. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2000, v:4, n:5, pp:40-48 [Journal]
  31. Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
    A formal model of rational exchange and its application to the analysis of Syverson's protocol. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:551-587 [Journal]
  32. Levente Buttyán, Jean-Pierre Hubaux
    Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MONET, 2003, v:8, n:5, pp:579-592 [Journal]
  33. Levente Buttyán, Jean-Pierre Hubaux
    Report on a working session on security in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2003, v:7, n:1, pp:74-94 [Journal]
  34. István Zsolt Berta, Levente Buttyán, István Vajda
    A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:268-272 [Journal]
  35. Gergely Ács, Levente Buttyán, István Vajda
    Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:11, pp:1533-1546 [Journal]
  36. Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
    Self-Organized Public-Key Management for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2003, v:2, n:1, pp:52-64 [Journal]
  37. Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
    Mobility Helps Peer-to-Peer Security. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:1, pp:43-51 [Journal]
  38. Márk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán
    Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:5, pp:463-476 [Journal]
  39. Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson
    Node Cooperation in Hybrid Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:4, pp:365-376 [Journal]
  40. Levente Buttyán, Tamás Holczer, István Vajda
    On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:129-141 [Conf]

  41. Security analysis of reliable transport layer protocols for wireless sensor networks. [Citation Graph (, )][DBLP]


  42. Pollution Attack Defense for Coding Based Sensor Storage. [Citation Graph (, )][DBLP]


  43. Group-Based Private Authentication. [Citation Graph (, )][DBLP]


  44. Barter-based cooperation in delay-tolerant personal wireless networks. [Citation Graph (, )][DBLP]


  45. An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks. [Citation Graph (, )][DBLP]


  46. CORA: Correlation-based resilient aggregation in sensor networks. [Citation Graph (, )][DBLP]


  47. Barter trade improves message delivery in opportunistic networks. [Citation Graph (, )][DBLP]


  48. Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks. [Citation Graph (, )][DBLP]


  49. Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [Citation Graph (, )][DBLP]


  50. Secure Vehicular Communication Systems: Design and Architecture [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.459secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002