|
Search the dblp DataBase
Levente Buttyán:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- István Zsolt Berta, Levente Buttyán, István Vajda
Privacy Protecting Protocols for Revocable Digital Signatures. [Citation Graph (0, 0)][DBLP] CARDIS, 2004, pp:67-82 [Conf]
- Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
A Formal Analysis of Syverson?s Rational Exchange Protocol. [Citation Graph (0, 0)][DBLP] CSFW, 2002, pp:193-205 [Conf]
- Levente Buttyán, Sebastian Staamann, Uwe G. Wilhelm
A Simple Logic for Authentication Protocol Design. [Citation Graph (0, 0)][DBLP] CSFW, 1998, pp:153-162 [Conf]
- Sebastian Staamann, Levente Buttyán, Allan Coignet, Ernesto Ruggiano, Uwe G. Wilhelm, Marc Zweiacker
Closed user groups in Internet service centres. [Citation Graph (0, 0)][DBLP] DAIS, 1999, pp:439-0 [Conf]
- Felix C. Gärtner, Klaus Kursawe, Levente Buttyán
PoDSy 2003: Principles of Dependable Systems. [Citation Graph (0, 0)][DBLP] DSN, 2003, pp:763- [Conf]
- Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
Protecting the Itinerary of Mobile Agents. [Citation Graph (0, 0)][DBLP] ECOOP Workshops, 1998, pp:301- [Conf]
- Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
Introducing Trusted Third Parties to the Mobile Agent Paradigm. [Citation Graph (0, 0)][DBLP] Secure Internet Programming, 1999, pp:469-489 [Conf]
- Gergely Ács, Levente Buttyán, István Vajda
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2005, pp:113-127 [Conf]
- Levente Buttyán, László Dóra, István Vajda
Statistical Wormhole Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2005, pp:128-141 [Conf]
- Levente Buttyán, Tamás Holczer, Péter Schaffer
Spontaneous Cooperation in Multi-domain Sensor Networks. [Citation Graph (0, 0)][DBLP] ESAS, 2005, pp:42-53 [Conf]
- Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2003, pp:15-33 [Conf]
- Márk Félegyházi, Levente Buttyán, Jean-Pierre Hubaux
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case. [Citation Graph (0, 0)][DBLP] PWC, 2003, pp:776-789 [Conf]
- Levente Buttyán, Naouel Ben Salem
A Payment Scheme for Broadcast Multimedia Streams. [Citation Graph (0, 0)][DBLP] ISCC, 2001, pp:669-673 [Conf]
- István Zsolt Berta, Levente Buttyán, István Vajda
Mitigating the Untrusted Terminal Problem Using Conditional Signatures. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:12-16 [Conf]
- Levente Buttyán, Jean-Pierre Hubaux
Enforcing service availability in mobile ad-hoc WANs. [Citation Graph (0, 0)][DBLP] MobiHoc, 2000, pp:87-96 [Conf]
- Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
Mobility helps security in ad hoc networks. [Citation Graph (0, 0)][DBLP] MobiHoc, 2003, pp:46-56 [Conf]
- Jean-Pierre Hubaux, Levente Buttyán, Srdjan Capkun
The quest for security in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP] MobiHoc, 2001, pp:146-155 [Conf]
- Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. [Citation Graph (0, 0)][DBLP] MobiHoc, 2003, pp:13-24 [Conf]
- Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
On the Problem of Trust in Mobile Agent Systems. [Citation Graph (0, 0)][DBLP] NDSS, 1998, pp:- [Conf]
- Levente Buttyán, Péter Schaffer, István Vajda
Resilient Aggregation with Attack Detection in Sensor Networks. [Citation Graph (0, 0)][DBLP] PerCom Workshops, 2006, pp:332-336 [Conf]
- Márk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán
Cooperative Packet Forwarding in Multi-Domain Sensor Networks. [Citation Graph (0, 0)][DBLP] PerCom Workshops, 2005, pp:345-349 [Conf]
- Levente Buttyán, Tamás Holczer, István Vajda
Optimal Key-Trees for Tree-Based Private Authentication. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2006, pp:332-350 [Conf]
- Gergely Ács, Levente Buttyán, István Vajda
Modelling adversaries and security objectives for routing protocols in wireless sensor networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:49-58 [Conf]
- Levente Buttyán, Péter Schaffer, István Vajda
RANBAR: RANSAC-based resilient aggregation in sensor networks. [Citation Graph (0, 0)][DBLP] SASN, 2006, pp:83-90 [Conf]
- Levente Buttyán, István Vajda
Towards provable security for ad hoc routing protocols. [Citation Graph (0, 0)][DBLP] SASN, 2004, pp:94-105 [Conf]
- Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
SECTOR: secure tracking of node encounters in multi-hop wireless networks. [Citation Graph (0, 0)][DBLP] SASN, 2003, pp:21-32 [Conf]
- Levente Buttyán, Jean-Pierre Hubaux
Accountable Anonymous Access to Services in Mobile Communication Systems. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1999, pp:384-389 [Conf]
- Levente Buttyán, Jean-Pierre Hubaux
Rational Exchange - A Formal Model Based on Game Theory. [Citation Graph (0, 0)][DBLP] WELCOM, 2001, pp:114-126 [Conf]
- Felix C. Gärtner, Levente Buttyán, Klaus Kursawe
Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back. [Citation Graph (0, 0)][DBLP] IEEE Distributed Systems Online, 2003, v:4, n:9, pp:- [Journal]
- Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán
A Pessimistic Approach to Trust in Mobile Agent Platforms. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2000, v:4, n:5, pp:40-48 [Journal]
- Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun
A formal model of rational exchange and its application to the analysis of Syverson's protocol. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:551-587 [Journal]
- Levente Buttyán, Jean-Pierre Hubaux
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] MONET, 2003, v:8, n:5, pp:579-592 [Journal]
- Levente Buttyán, Jean-Pierre Hubaux
Report on a working session on security in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP] Mobile Computing and Communications Review, 2003, v:7, n:1, pp:74-94 [Journal]
- István Zsolt Berta, Levente Buttyán, István Vajda
A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:268-272 [Journal]
- Gergely Ács, Levente Buttyán, István Vajda
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2006, v:5, n:11, pp:1533-1546 [Journal]
- Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux
Self-Organized Public-Key Management for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2003, v:2, n:1, pp:52-64 [Journal]
- Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán
Mobility Helps Peer-to-Peer Security. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2006, v:5, n:1, pp:43-51 [Journal]
- Márk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2006, v:5, n:5, pp:463-476 [Journal]
- Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson
Node Cooperation in Hybrid Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2006, v:5, n:4, pp:365-376 [Journal]
- Levente Buttyán, Tamás Holczer, István Vajda
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. [Citation Graph (0, 0)][DBLP] ESAS, 2007, pp:129-141 [Conf]
Security analysis of reliable transport layer protocols for wireless sensor networks. [Citation Graph (, )][DBLP]
Pollution Attack Defense for Coding Based Sensor Storage. [Citation Graph (, )][DBLP]
Group-Based Private Authentication. [Citation Graph (, )][DBLP]
Barter-based cooperation in delay-tolerant personal wireless networks. [Citation Graph (, )][DBLP]
An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks. [Citation Graph (, )][DBLP]
CORA: Correlation-based resilient aggregation in sensor networks. [Citation Graph (, )][DBLP]
Barter trade improves message delivery in opportunistic networks. [Citation Graph (, )][DBLP]
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks. [Citation Graph (, )][DBLP]
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges [Citation Graph (, )][DBLP]
Secure Vehicular Communication Systems: Design and Architecture [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.459secs
|