|
|
G. Ács, L. Buttyán A taxonomy of routing protocols for wireless sensor networks Híradástechnika, 2006, December. (Abstract)
G. Ács, L. Buttyán, I. Vajda Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), 2006, October.
(Abstract, PDF)
G. Ács, L. Buttyán, I. Vajda Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks IEEE Transactions on Mobile Computing, 2006, vol. 5, no. 11.
(Abstract) G. Ács, L. Buttyán Útvonalválasztó protokollok vezeték nélküli szenzorhálózatokban Híradástecnika, 2006, November. (Abstract)
G. Ács, L. Buttyán, I. Vajda Ad hoc útvonalválasztó protokollok bizonyított biztonsága Híradástechnika, 2005, March.
(Abstract)
G. Ács, L. Buttyán, I. Vajda Provable Security for Ad Hoc Routing Protocols Híradástechnika, 2005, June.
(Abstract)
G. Ács, L. Buttyán, I. Vajda Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks In Proceedings of the Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), Visegrád, Hungary, July 13-14, 2005, 2005.
(Abstract, PDF)
G. Ács, L. Buttyán, I. Vajda Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks http://eprint.iacr.org/ under report number 2004/159., 2004, March.
(Abstract)
|