Mission
  Members
  Research
  Publications
  Teaching
  Industrial connections
  Activity reports
  Contact information
  Miscellaneous
 
  Meeting information
 
  Webmail
  Graphpass
 
magyar · english
 

Publications of Dr István VAJDA



L. Buttyán, L. Dóra, M. Félegyházi, I. Vajda
Barter-based cooperation in delay-tolerant personal wireless networks
In Proceedings of the First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications, IEEE Computer Society Press, 2007, IEEE Computer Society Press, June.

(Abstract, PDF, Bibtex )

P. Schaffer, I. Vajda
CORA: Correlation-based Resilient Aggregation in Sensor Networks
In Proceedings of the 10th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 2007, October 22-26, ACM Press, Chania, Crete, Greece.

(Abstract, PDF, Bibtex )

B. Bencsáth, I. Vajda
Efficient Directory Harvest Attacks and Countermeasures
International Journal of Network Security, 2007, vol. 5, no. 3, pp. 264-273.
( Bibtex )

G. Avoine, L. Buttyán, T. Holczer, I. Vajda
Group-Based Private Authentication
In Proceedings of the International Workshop on Trust, Security, and Privacy for Ubiquitous Computing (TSPUC 2007), IEEE, 2007, IEEE.

(Abstract, PDF, Bibtex )

L. Buttyán, T. Holczer, I. Vajda
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs
In Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS2007), Springer, 2007, Springer.

(Abstract, PDF, Bibtex )

G. Ács, L. Buttyán, I. Vajda
The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks
In Proceedings of the 3rd IEEE Workshop on Wireless and Sensor Networks Security (WSNS 2007), 2007, October, IEEE Press, Pisa, Italy.

(Abstract, PDF, Bibtex )

B. Bencsáth, I. Vajda
Internet Denial of Service attacks in game theoretical model (in hungarian)
Alkalmazott Matematikai Lapok 23, 2006, pp. 335-348..
(Abstract, Bibtex )

G. Ács, L. Buttyán, I. Vajda
Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks
In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), 2006, October.

(Abstract, PDF, Bibtex )

L. Buttyán, T. Holczer, I. Vajda
Optimal Key-Trees for Tree-Based Private Authentication
In Proceedings of the International Workshop on Privacy Enhancing Technologies (PET), 2006, June, Springer.

(Abstract, PDF, Bibtex )

G. Ács, L. Buttyán, I. Vajda
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing, 2006, vol. 5, no. 11.

(Abstract, Bibtex )

L. Buttyán, T. Holczer, I. Vajda
Providing Location Privacy in Automated Fare Collection Systems
In Proceedings of the 15th IST Mobile and Wireless Communication Summit, Mykonos, Greece, 2006, June.

(PDF, Bibtex )

L. Buttyán, P. Schaffer, I. Vajda
RANBAR: RANSAC-Based Resilient Aggregation in Sensor Networks
In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2006, October 30, ACM Press, Alexandria, VA, USA.

(Abstract, PDF, Bibtex )

L. Buttyán, P. Schaffer, I. Vajda
Resilient Aggregation with Attack Detection in Sensor Networks
Second IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS), 2006, March 13, IEEE Computer Society Press, Pisa, Italy.

(Abstract, PDF, Bibtex )

L. Buttyán, P. Schaffer, I. Vajda
Resilient Aggregation: Statistical Approaches
book chapter in N.P.Mahalik (ed.): Sensor Networks and Configuration, 2006, pp. 211--236, Springer, August.

(Abstract, PDF, Bibtex )

I. Zs. Berta, L. Buttyán, I. Vajda
A framework for the revocation of unintended digital signatures initiated by malicious terminals
IEEE Transactions on Secure and Dependable Computing, 2005, vol. (Vol. 2, No. 3), pp. 268-272, July-September, http://csdl2.computer.org/....
(Abstract, Bibtex )

G. Ács, L. Buttyán, I. Vajda
Ad hoc útvonalválasztó protokollok bizonyított biztonsága
Híradástechnika, 2005, March.

(Abstract, Bibtex )

B. Bencsáth, I. Vajda
Efficient Directory Harvest Attacks
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, IEEE, IEEE Computer Society, 2005, William McQuay and Waleed W. Smari, pp. 62- 68, IEEE, IEEE Computer Society, July.

(Abstract, PDF, PS, Bibtex )

G. Ács, L. Buttyán, I. Vajda
Provable Security for Ad Hoc Routing Protocols
Híradástechnika, 2005, June.

(Abstract, Bibtex )

G. Ács, L. Buttyán, I. Vajda
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
In Proceedings of the Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), Visegrád, Hungary, July 13-14, 2005, 2005.

(Abstract, PDF, Bibtex )

I. Zs. Berta, L. Buttyán, I. Vajda, Standards for Product Security Assessment
Chapter 53, in IT Security Handbook, edited by Hossein Bidgoli, John Wiley and Sons, 2005, (to appear).
( Bibtex )

I. Vajda, L. Buttyán, L. Dóra
Statistical Wormhole Detection in Sensor Networks
Lecture Notes in Computer Science, Springer-Verlag GmbH, 2005, Refik Molva, Gene Tsudik, Dirk Westhoff, pp. Volume 3813/ 2005, pp. 128 - 141, Springer-Verlag GmbH, Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005.

(Abstract, PDF, Bibtex )

I. Zs. Berta, I. Vajda, L. Buttyán, B. Bencsáth, T. Veiland
HUNEID - Hungarian Electronic ID smart card specifications
Ministry of Informatics and Telecommunications (www.ihm.hu), 2004, http://www.itktb.hu/engine.aspx?page=showcontent&content;=ias.
( Bibtex )

I. Zs. Berta, I. Vajda
Limitations of humans when using malicious terminals
Tatra Mountains Mathematical Publications, 2004, (to appear).

(Abstract, PDF, Bibtex )

I. Zs. Berta, L. Buttyán, I. Vajda
Mitigating the Untrusted Terminal Problem Using Conditional Signatures
Proceedings of International Conference on Information Technology ITCC 2004, IEEE, 2004, IEEE, Las Vegas, NV, USA, April.

(Abstract, PDF, Bibtex )

I. Zs. Berta, L. Buttyán, I. Vajda
Privacy Protecting Protocols for Revokable Digital Signatures
Proceedings of Cardis 2004, Toulouse, France (to appear), Kluwer, 2004, Kluwer.

(Abstract, PDF, Bibtex )

B. Bencsáth, I. Vajda
Protection Against DDoS Attacks Based On Traffic Level Measurements
2004 International Symposium on Collaborative Technologies and Systems, The Society for Modeling and Simulation International, 2004, Waleed W. Smari, William McQuay, pp. 22-28., The Society for Modeling and Simulation International, San Diego, CA, USA, January, Simulation series vol 36. no. 1., ISBN 1-56555-272-5.

(Abstract, PDF, PS, Bibtex )

G. Ács, L. Buttyán, I. Vajda
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
http://eprint.iacr.org/ under report number 2004/159., 2004, March.

(Abstract, Bibtex )

L. Buttyán, I. Vajda
Towards Provable Security for Ad Hoc Routing Protocols
Proceedings of the 2nd ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2004), ACM, 2004, ACM, October.
( Bibtex )

B. Bencsáth, I. Vajda
Trap E-mail Address for Combating E-mail Viruses
Proceedings of SoftCOM 2004 12. International conference on software, telecommunications and computer networks, University of Split, 2004, pp. 220-224, University of Split, October.

(PDF, PS, Bibtex )

B. Bencsáth, L. Buttyán, I. Vajda
A game based analysis of the client puzzle approach to defend against DoS attacks
Proceedings of SoftCOM 2003 11. International conference on software, telecommunications and computer networks, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split, 2003, pp. 763-767, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split.

(Abstract, PDF, PS, Bibtex )

I. Zs. Berta, I. Vajda
Documents from Malicious Terminals
SPIE's Microtechnologies for the New Millenium 2003, Bioengineered and Bioinspired Systems, Grand Canaria, Spain, 2003.

(Abstract, PDF, Bibtex )

I. Vajda, L. Buttyán
Lightweight Authentication Protocols for Low-Cost RFID Tags
2nd Workshop on Security in Ubiquitous Computing, in conjunction with Ubicomp 2003, 2003, October.

(Abstract, Bibtex )

I. Vajda, I. Zs. Berta
Limitations of users when using malicious terminals
Third Central European Conference on Cryptography (Tatracrypt'03), 2003.
( Bibtex )

B. Bencsáth, I. Vajda
A game theoretical approach to optimizing of protection against DoS attacks
presented on the Second Central European Conference on Cryptography (Hajducrypt), Július, 2002, (no proceedings).
( Bibtex )

L. Buttyán, I. Zs. Berta, I. Vajda
Eliminating Man-in-the-Middle attacks of Malicious Terminals
Workshop organised by the IST Coordination Point of the Ministry of Education, Budapest, 2002.

(Abstract, Bibtex )

I. Vajda
Extraction of random bits for cryptographic purposes
Tatra Mountains Mathematical Publications, 2002, vol. 25, pp. 83-99.

(PS, Bibtex )

I. Zs. Berta, I. Vajda
Message Authentication using Smart Card and Biometry
Second Central European Conference on Cryptography (HajduCrypt) 2002, Debrecen, Hungary, 2002.

(Abstract, Bibtex )

B. Bencsáth, I. Vajda
Collecting randomness from the net
Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security 2001, Kluwer, 2001, pp. 105-111, Kluwer, May.

(Abstract, PDF, PS, Bibtex )

L. Buttyán, A. Nagy, I. Vajda
Efficient Multi-Party Challenge-Response Protocols for Entity Authentication
Periodica Polytechnica, 2001, vol. 45, no. 1, pp. 43-64, April.

(Abstract, PDF, Bibtex )

L. Györfi, Á. Jordán, I. Vajda
Exact decoding error probability for slow frequency hopping
European Transactions on Telecommunication, 2000, vol. 11, no. 2, pp. 183-190, March/April.
( Bibtex )

I. Vajda, B. Bencsáth, A. Bognár
Tanulmány a napvilágra került Elender jelszavakról, 2000, Apr..
(Abstract, Bibtex )

L. Györfi, I. Vajda
Analysis of Protocol Sequences for Slow Frequency Hopping
Wireless Networks, 1998, vol. 4, pp. 411-418.
( Bibtex )

S. Csibi, L. Györfi, I. Vajda
Analysis of Protocol Sequences for Slow Frequency Hopping
Proceedings of the 1998 International Zürich Seminar on Broadband Communication (IEEE Catalog No.98TH8277), 1998, pp. 237-242.
( Bibtex )

Á. Jordán, I. Vajda
On the distribution of Hamming correlation of cyclically permutable subsets of RS codes
Proceedings of the II. International Workshop on Optimal Codes'98, 1998, pp. 144-150, Sazopol,Bulgaria, June 9-15.
( Bibtex )

Á. Jordán, I. Vajda
On the Hamming correlation distribution of SFH signature sequence sets
roceedings of the IEEE ISSSTA '98 (IEEE Fifth International Symposium on Spread Sectrum Techniques & Applications), 1998, pp. 676-680, Sun City, South Africa, September 2-4.
( Bibtex )

L. Buttyán, I. Vajda
On the Design of Strong Bit Permutations and Substitutions
Budapest University of Technology, 1997, January.
( Bibtex )

I. Vajda, L. Buttyán
On the Design of Substitution-Permutation Ciphers
Budapest University of Technology, 1997, January.
( Bibtex )

I. Vajda
Code construction for FH/CDMA channels
IEEE Transactions on Communications, 1995, vol. 43, no. 10, October.
( Bibtex )

I. Vajda, L. Buttyán
On Design Criteria of Conventional Block Ciphers (in Hungarian)
Hiradástechnika, 1995, vol. XLVI., pp. 10-18., March, (awarded with the Pollak-Virag Award of the Hungarian Telecommunication Scientific Society).
( Bibtex )

L. Buttyán, I. Vajda
Searching for the best linear approximation of DES-like cryptosystems
IEE Electronics Letters, 1995, vol. 31, no. 11, pp. 873-874, May.
( Bibtex )

I. Vajda
Code Constructions for Code Division Multiple Access Channels
Journal on Communications, 1994, vol. XLV, pp. 2-9, March.
( Bibtex )

L. Györfi, I. Vajda
Construction of Protocol Sequences for Multiple-Access Collision Channels
Proceedings of the 1993 IEEE International Symposium on Information Theory, 1993, pp. 157, San Antonio, USA, Jan 17-22.
( Bibtex )

I. Vajda
Spread Spectrum Principle Based Wireless Telecommunication Networks
Magyar Távközlés, 1993, pp. 43-49, Selected papers 1993.
( Bibtex )

I. Vajda
Code sequences for FH-CDMA channels
Proceedings of IEEE Symposium on Spread Spectrum Techniques and Applications, 1992, pp. 195-197, Yokohama, Japan.
( Bibtex )

L. Györfi, I. Vajda
Construction of Protocol Sequences for Multiple-Access Collision Channel without Feedback
IEEE Transactions on Information Theory, 1992, vol. 39, no. 5, pp. 1762-1765, September.
( Bibtex )

T. Nemetz, I. Vajda
A cryptographic element based on number system conversion
Proceedings of 1991 IEEE International Symposium on Information Theory, 1991, pp. 127, Budapest, Hungary.
( Bibtex )

I. Vajda
Comments on Code-Division Multiple Access Techniques in Optical Fiber Networks
IEEE Transactions on Communications, 1991, vol. 39, no. 2, pp. 196, February.
( Bibtex )

I. Vajda
Side information gained from signal matrices in FFH spread spectrum systems
Electronics and Communications, 1991, vol. 45, no. 2, pp. 70-76, March, Hirzel Verlag.
( Bibtex )

I. Vajda, T. Nemetz
Substitution of characters in q-ary m-sequences
Lecture Notes in Computer Science 5O8, 1991, pp. 96-105, Springer-Verlag.
( Bibtex )

I. Vajda
AGC based hard detected FFH signal matrices
IEE Electronics Letters, 1990, vol. 26, no. 3, pp. 218-219, February.
( Bibtex )

I. Vajda
On random code-hopping DS/SSMA systems
Proceedings of IEEE Symposium on Spread Spectrum Techniques and Applications, 1990, pp. 47-52, London.
( Bibtex )

I. Vajda, G. Einarsson
Code acquisition for a frequency hopping system
IEEE Transactions on Communications, 1987, vol. 35, no. 5, pp. 566-568, May.
( Bibtex )

G. Einarsson, I. Vajda, L. Molnár
Error probability of a code-division multiple-access frequency-hopping system
Electronics and Communications, 1987, vol. 41, no. 6, pp. 356-364, December, Hirzel Verlag.
( Bibtex )

I. Vajda, J. Landsmann
Some results on generation of shift-register sequences with large linear complexity
Proceedings of Applied Algebra, Algebraic Algorithms and Error Control Codes, AAECC-5, 1987, pp. 81, Menorca, Spain, June 15-19.
( Bibtex )

I. Vajda
More on modelling and performance evaluation for frequency coded multiple access channels
Proceedings of U.R.S.I. XXIst General Assembly, 1985, pp. 104, Florence, Italy.
( Bibtex )

I. Vajda
A coding rule for frequency-hopped multiple access channels
Problems of Control and Information Theory, 1983, vol. 13, no. 5, pp. 331-335.
( Bibtex )

L. Györfi, I. Vajda
Block coding and correlation decoding for an M-user weighted adder channel
Problems of Control and Information Theory, 1983, vol. 12, no. 6, pp. 405-417.
( Bibtex )

L. Molnár, I. Vajda
Decoding error probability of the Einarsson-code for frequency-hopped multiple access channel
Problems of Control and Information Theory, 1983, vol. 13, no. 2, pp. 109-120.
( Bibtex )

S. Csibi, L. Györfi, Z. Györfi, I. Vajda
Information transmission with intermediate storage under the special conditions of microcomputers
Periodica Polytechnica, 1980, vol. 24, pp. 222-227.
( Bibtex )

L. Györfi, I. Vajda
Upper bound on the error probability of detection in non-Gaussian noise
Problems of Control and Information Theory, 1980, vol. 9, no. 3, pp. 215-224.
( Bibtex )

I. Vajda, I. Kerekes, L. Györfi, H. Gomez
Remarks on a coding technique for asynchronous multiple access communication
Problems of Control and Information Theory, 1979, vol. 9, no. 4, pp. 287-296.
( Bibtex )

I. Vajda
Adaptive Gaussian detection without a priori symbol synchronization
Problems of Control and Information Theory, 1978, vol. 9, no. 2, pp. 133-140.
( Bibtex )

L. Györfi, Z. Györfi, I. Vajda
Bayesian decision with rejection
Problems of Control and Information Theory, 1978, vol. 8, no. 5, pp. 445-452.
( Bibtex )

L. Györfi, Z. Györfi, I. Vajda
A strong law of large numbers and some applications
Studia Scientiarum Mathematicarum Hungarica, 1977, vol. 12, pp. 233-244.
( Bibtex )