Küldetés
  Munkatársak
  Kutatás
  Publikációk
  Oktatás
  Ipari kapcsolatok
  Éves riportok
  Kontaktinformáció
  Egyéb
 
  Meeting információ
 
  Webmail
  Graphpass
 
magyar · english
 

Publikációk

Folyóiratcikkek · Konferenciacikkek · Disszertációk · Tanulmányok · Egyéb

Megjelent: Buttyán L., Vajda I., Kriptográfia és alkalmazásai, Typotex Kiadó, 2004. (borító)

Folyóirat- és magazincikkek
B. Bencsáth, I. Vajda
Efficient Directory Harvest Attacks and Countermeasures
International Journal of Network Security, 2007, vol. 5, no. 3, pp. 264-273.
( Bibtex )

G. Ács, L. Buttyán
A taxonomy of routing protocols for wireless sensor networks
Híradástechnika, 2006, December.
(Abstract, Bibtex )

I. Zs. Berta
How to accept an electronic signature?
Híradástechnika, 2006, vol. LXI, 2006, in Hungarian.
(Abstract, Bibtex )

B. Bencsáth, I. Vajda
Internet Denial of Service attacks in game theoretical model (in hungarian)
Alkalmazott Matematikai Lapok 23, 2006, pp. 335-348..
(Abstract, Bibtex )

Géza Szabó, B. Bencsáth
Protection against DHA attack with central filtering (in hungarian)
Híradástechnika, 2006, vol. LXI, pp. pp. 2-9, 05.

( Bibtex )

G. Ács, L. Buttyán, I. Vajda
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing, 2006, vol. 5, no. 11.

(Abstract, Bibtex )

G. Ács, L. Buttyán
Útvonalválasztó protokollok vezeték nélküli szenzorhálózatokban
Híradástecnika, 2006, November.
(Abstract, Bibtex )

L. Buttyán, L. Dóra
WiFi biztonság - A jó, a rossz, és a csúf
Híradástechnika, 2006, May.

(Abstract, PDF, Bibtex )

I. Zs. Berta, L. Buttyán, I. Vajda
A framework for the revocation of unintended digital signatures initiated by malicious terminals
IEEE Transactions on Secure and Dependable Computing, 2005, vol. (Vol. 2, No. 3), pp. 268-272, July-September, http://csdl2.computer.org/....
(Abstract, Bibtex )

G. Ács, L. Buttyán, I. Vajda
Ad hoc útvonalválasztó protokollok bizonyított biztonsága
Híradástechnika, 2005, March.

(Abstract, Bibtex )

S. Capkun, J. P. Hubaux, L. Buttyán
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing, 2005, to appear.
( Bibtex )

M. Félegyházi, J. P. Hubaux, L. Buttyán
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing, 2005, to appear.
( Bibtex )

N. B. Salem, L. Buttyán, J. P. Hubaux, M. Jakobsson
Node Cooperation in Hybrid Ad hoc Networks
IEEE Transactions on Mobile Computing, 2005, to appear.
( Bibtex )

G. Ács, L. Buttyán, I. Vajda
Provable Security for Ad Hoc Routing Protocols
Híradástechnika, 2005, June.

(Abstract, Bibtex )

L. Buttyán, J. P. Hubaux, S. Capkun
A Formal Model of Rational Exchange and Its Application to the Analysis of Syverson's Protocol
Journal on Computer Security, 2004, vol. 12, no. 3-4, pp. 551-587.

(Abstract, PDF, PS, Bibtex )

L. Buttyán, T. Holczer, P. Schaffer
Incentives for Cooperation in Multi-hop Wireless Networks (in Hungarian)
Híradástechnika, 2004, vol. LIX, no. 3, pp. 30--34, March.

(Abstract, PDF, Bibtex )

I. Zs. Berta, I. Vajda
Limitations of humans when using malicious terminals
Tatra Mountains Mathematical Publications, 2004, (to appear).

(Abstract, PDF, Bibtex )

L. Zombik, L. Buttyán
Modelling Location Reveal Attacks in Mobile Systems
Periodica Polytechnica, 2004, vol. 48, no. 1-2, pp. 85-100.
( Bibtex )

F. Gaertner, L. Buttyán, K. Kursawe
From Fault-Tolerance to Security and Back
IEEE Distributed Systems Online, 2003, vol. 4, no. 9.
( Bibtex )

I. Zs. Berta, I. Berta
Hardware and Software Security I
Elektrotechnika, 2003, vol. 2003/10, pp. 4.

(PDF, Bibtex )

I. Zs. Berta, I. Berta
Hardware and Software Security II
Elektrotechnika, 2003, vol. 2003/11, pp. 4.

(PDF, Bibtex )

L. Buttyán, J. P. Hubaux
Report on a Working Session on Security in Wireless Ad Hoc Networks
ACM Mobile Computing and Communications Review (MC2R), 2003, vol. 7, no. 1, March.

(PDF, Bibtex )

S. Capkun, L. Buttyán, J. P. Hubaux
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing, 2003, vol. 2, no. 1, January-March.

(Abstract, Bibtex )

L. Buttyán, J. P. Hubaux
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
ACM/Kluwer Mobile Networks and Applications, 2003, vol. 8, no. 5, October.

(PDF, Bibtex )

I. Zs. Berta, Z. Á. Mann
Evaluating Elliptic Curve Cryptography on PC and Smart Card
Periodica Polytechnica, Electrical Engineering, 2002, vol. 46/1-2, pp. 47-75.

(PDF, PS, Bibtex )

I. Vajda
Extraction of random bits for cryptographic purposes
Tatra Mountains Mathematical Publications, 2002, vol. 25, pp. 83-99.

(PS, Bibtex )

L. Buttyán, A. Nagy, I. Vajda
Efficient Multi-Party Challenge-Response Protocols for Entity Authentication
Periodica Polytechnica, 2001, vol. 45, no. 1, pp. 43-64, April.

(Abstract, PDF, Bibtex )

L. Blazevic, L. Buttyán, S. Capkun, S. Giordano, J. P. Hubaux, J. Y. Le Boudec
Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes
IEEE Communications Magazine, 2001, vol. 39, no. 6, June.

(Abstract, PS, Bibtex )

U. Wilhelm, S. Staamann, L. Buttyán
A Pessimistic Approach to Trust in Mobile Agent Platforms
IEEE Internet Computing, 2000, vol. 4, no. 5, pp. 40-48, September.

(PDF, Bibtex )

L. Györfi, Á. Jordán, I. Vajda
Exact decoding error probability for slow frequency hopping
European Transactions on Telecommunication, 2000, vol. 11, no. 2, pp. 183-190, March/April.
( Bibtex )

L. Buttyán, C. Gbaguidi, S. Staamann, U. Wilhelm
Extensions to an Authentication Technique Proposed for the Global Mobility Network
IEEE Transactions on Communications, 2000, vol. 48, no. 3, March.

(Abstract, PDF, Bibtex )

B. Bencsáth, S. Tihanyi
Home-made methods for enhancing network security (in Hungarian)
Magyar Távközlés, 2000, vol. X, no. 4, pp. 22-27..
( Bibtex )

I. Zs. Berta, Z. Á. Mann
Programmable smart cards and their security
Magyar Távközlés, 2000, 4.

(PDF, Bibtex )

L. Buttyán
Removing the financial incentive to cheat in micropayment schemes
IEE Electronics Letters, 2000, vol. 36, no. 2, pp. 132-133, January.

(Abstract, PDF, Bibtex )

I. Zs. Berta, Z. Á. Mann
Smart Cards - Present and Future
Híradástechnika, Journal on C5, 2000, 12.

(PDF, Bibtex )

L. Györfi, I. Vajda
Analysis of Protocol Sequences for Slow Frequency Hopping
Wireless Networks, 1998, vol. 4, pp. 411-418.
( Bibtex )

L. Buttyán
Data Security Issues of Computer Networks
Magyar Távközlés (Selected Papers from the Hungarian Telecommunications), 1997, pp. 50-57..
( Bibtex )

L. Buttyán
Data Security Issues of Computer Networks (in Hungarian)
Magyar Távközlés, 1996, vol. VII., no. 4., pp. 11-19., April.
( Bibtex )

I. Vajda
Code construction for FH/CDMA channels
IEEE Transactions on Communications, 1995, vol. 43, no. 10, October.
( Bibtex )

I. Vajda, L. Buttyán
On Design Criteria of Conventional Block Ciphers (in Hungarian)
Hiradástechnika, 1995, vol. XLVI., pp. 10-18., March, (awarded with the Pollak-Virag Award of the Hungarian Telecommunication Scientific Society).
( Bibtex )

L. Buttyán, I. Vajda
Searching for the best linear approximation of DES-like cryptosystems
IEE Electronics Letters, 1995, vol. 31, no. 11, pp. 873-874, May.
( Bibtex )

I. Vajda
Code Constructions for Code Division Multiple Access Channels
Journal on Communications, 1994, vol. XLV, pp. 2-9, March.
( Bibtex )

I. Vajda
Spread Spectrum Principle Based Wireless Telecommunication Networks
Magyar Távközlés, 1993, pp. 43-49, Selected papers 1993.
( Bibtex )

L. Györfi, I. Vajda
Construction of Protocol Sequences for Multiple-Access Collision Channel without Feedback
IEEE Transactions on Information Theory, 1992, vol. 39, no. 5, pp. 1762-1765, September.
( Bibtex )

I. Vajda
Comments on Code-Division Multiple Access Techniques in Optical Fiber Networks
IEEE Transactions on Communications, 1991, vol. 39, no. 2, pp. 196, February.
( Bibtex )

I. Vajda
Side information gained from signal matrices in FFH spread spectrum systems
Electronics and Communications, 1991, vol. 45, no. 2, pp. 70-76, March, Hirzel Verlag.
( Bibtex )

I. Vajda, T. Nemetz
Substitution of characters in q-ary m-sequences
Lecture Notes in Computer Science 5O8, 1991, pp. 96-105, Springer-Verlag.
( Bibtex )

I. Vajda
AGC based hard detected FFH signal matrices
IEE Electronics Letters, 1990, vol. 26, no. 3, pp. 218-219, February.
( Bibtex )

I. Vajda, G. Einarsson
Code acquisition for a frequency hopping system
IEEE Transactions on Communications, 1987, vol. 35, no. 5, pp. 566-568, May.
( Bibtex )

G. Einarsson, I. Vajda, L. Molnár
Error probability of a code-division multiple-access frequency-hopping system
Electronics and Communications, 1987, vol. 41, no. 6, pp. 356-364, December, Hirzel Verlag.
( Bibtex )

I. Vajda
A coding rule for frequency-hopped multiple access channels
Problems of Control and Information Theory, 1983, vol. 13, no. 5, pp. 331-335.
( Bibtex )

L. Györfi, I. Vajda
Block coding and correlation decoding for an M-user weighted adder channel
Problems of Control and Information Theory, 1983, vol. 12, no. 6, pp. 405-417.
( Bibtex )

L. Molnár, I. Vajda
Decoding error probability of the Einarsson-code for frequency-hopped multiple access channel
Problems of Control and Information Theory, 1983, vol. 13, no. 2, pp. 109-120.
( Bibtex )

S. Csibi, L. Györfi, Z. Györfi, I. Vajda
Information transmission with intermediate storage under the special conditions of microcomputers
Periodica Polytechnica, 1980, vol. 24, pp. 222-227.
( Bibtex )

L. Györfi, I. Vajda
Upper bound on the error probability of detection in non-Gaussian noise
Problems of Control and Information Theory, 1980, vol. 9, no. 3, pp. 215-224.
( Bibtex )

I. Vajda, I. Kerekes, L. Györfi, H. Gomez
Remarks on a coding technique for asynchronous multiple access communication
Problems of Control and Information Theory, 1979, vol. 9, no. 4, pp. 287-296.
( Bibtex )

I. Vajda
Adaptive Gaussian detection without a priori symbol synchronization
Problems of Control and Information Theory, 1978, vol. 9, no. 2, pp. 133-140.
( Bibtex )

L. Györfi, Z. Györfi, I. Vajda
Bayesian decision with rejection
Problems of Control and Information Theory, 1978, vol. 8, no. 5, pp. 445-452.
( Bibtex )

L. Györfi, Z. Györfi, I. Vajda
A strong law of large numbers and some applications
Studia Scientiarum Mathematicarum Hungarica, 1977, vol. 12, pp. 233-244.
( Bibtex )

Konferencia- és workshop-cikkek
A. Bohák, L. Buttyán, L. Dóra
An User Authentication Scheme for Fast Handover Between WiFi Access Points
In Proceedings of the Third Annual International Wireless Internet Conference, ACM, 2007, ACM, Austin, Texas, USA, October 22-23, (invited paper).

(Abstract, PDF, Bibtex )

L. Buttyán, L. Dóra, M. Félegyházi, I. Vajda
Barter-based cooperation in delay-tolerant personal wireless networks
In Proceedings of the First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications, IEEE Computer Society Press, 2007, IEEE Computer Society Press, June.

(Abstract, PDF, Bibtex )

P. Schaffer, I. Vajda
CORA: Correlation-based Resilient Aggregation in Sensor Networks
In Proceedings of the 10th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 2007, October 22-26, ACM Press, Chania, Crete, Greece.

(Abstract, PDF, Bibtex )

B. Bencsáth, M. A. Rónai
Empirical Analysis of Denial of Service Attack Against SMTP Servers
Proceedings of The 2007 International Symposium on Collaborative Technologies and Systems, IEEE, 2007, pp. 72-79, IEEE.

(PDF, PPT, Bibtex )

G. Avoine, L. Buttyán, T. Holczer, I. Vajda
Group-Based Private Authentication
In Proceedings of the International Workshop on Trust, Security, and Privacy for Ubiquitous Computing (TSPUC 2007), IEEE, 2007, IEEE.

(Abstract, PDF, Bibtex )

L. Buttyán, T. Holczer, I. Vajda
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs
In Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS2007), Springer, 2007, Springer.

(Abstract, PDF, Bibtex )

L. Buttyán, P. Schaffer
PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks
In Proceedings of the 4th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2007, October 8-11, IEEE Press, Pisa, Italy.

(Abstract, PDF, Bibtex )

G. Ács, L. Buttyán
Secure Routing in Wireless Sensor Networks
book chapter in J. Lopez and J. Zhou (eds.): Wireless Sensor Network Security (Cryptology and Information Security Series), 2007, IOS Press.
(Abstract, Bibtex )

G. Ács, L. Buttyán, I. Vajda
The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks
In Proceedings of the 3rd IEEE Workshop on Wireless and Sensor Networks Security (WSNS 2007), 2007, October, IEEE Press, Pisa, Italy.

(Abstract, PDF, Bibtex )

G. Ács, L. Buttyán, I. Vajda
Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks
In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), 2006, October.

(Abstract, PDF, Bibtex )

L. Buttyán, T. Holczer, I. Vajda
Optimal Key-Trees for Tree-Based Private Authentication
In Proceedings of the International Workshop on Privacy Enhancing Technologies (PET), 2006, June, Springer.

(Abstract, PDF, Bibtex )

L. Buttyán, T. Holczer, I. Vajda
Providing Location Privacy in Automated Fare Collection Systems
In Proceedings of the 15th IST Mobile and Wireless Communication Summit, Mykonos, Greece, 2006, June.

(PDF, Bibtex )

L. Buttyán, P. Schaffer, I. Vajda
RANBAR: RANSAC-Based Resilient Aggregation in Sensor Networks
In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2006, October 30, ACM Press, Alexandria, VA, USA.

(Abstract, PDF, Bibtex )

L. Buttyán, P. Schaffer, I. Vajda
Resilient Aggregation with Attack Detection in Sensor Networks
Second IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS), 2006, March 13, IEEE Computer Society Press, Pisa, Italy.

(Abstract, PDF, Bibtex )

L. Buttyán, P. Schaffer, I. Vajda
Resilient Aggregation: Statistical Approaches
book chapter in N.P.Mahalik (ed.): Sensor Networks and Configuration, 2006, pp. 211--236, Springer, August.

(Abstract, PDF, Bibtex )

Géza Szabó, B. Bencsáth
Statistical analysis of the results of the DHA protection system (in hungarian)
Proceedings of Networkshop 2006 conference, NIIF, 2006, NIIF.

(Abstract, PDF, Bibtex )

B. Bencsáth, Géza Szabó
Components to improve the protection against spam and viruses
HSN LAB Workshop, 2005, Jun.

(Abstract, Bibtex )

M. Félegyházi, J. P. Hubaux, L. Buttyán
Cooperative Packet Forwarding in Multi-Domain Sensor Networks
Proceedings of the First International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS 2005), 2005, March.
( Bibtex )

B. Bencsáth, I. Vajda
Efficient Directory Harvest Attacks
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, IEEE, IEEE Computer Society, 2005, William McQuay and Waleed W. Smari, pp. 62- 68, IEEE, IEEE Computer Society, July.

(Abstract, PDF, PS, Bibtex )

Géza Szabó, Gábor Szabó
Possible protection methods against DHA attacks by the attackers recognition and centralized ban (in hungarian)
Networkshop 2005 Konferencia, 2005.

(Abstract, PDF, Bibtex )

G. Ács, L. Buttyán, I. Vajda
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks
In Proceedings of the Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), Visegrád, Hungary, July 13-14, 2005, 2005.

(Abstract, PDF, Bibtex )

L. Buttyán, T. Holczer, P. Schaffer
Spontaneous Cooperation in Multi-domain Sensor Networks
In Proceedings of the 2nd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS), 2005, July 13-14, Springer, Visegrád, Hungary.

(Abstract, PDF, Bibtex )

I. Vajda, L. Buttyán, L. Dóra
Statistical Wormhole Detection in Sensor Networks
Lecture Notes in Computer Science, Springer-Verlag GmbH, 2005, Refik Molva, Gene Tsudik, Dirk Westhoff, pp. Volume 3813/ 2005, pp. 128 - 141, Springer-Verlag GmbH, Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005.

(Abstract, PDF, Bibtex )

Gábor Szabó, Géza Szabó
The applied Spam-filtering methods and the Sender ID in Hungary (in hungarian)
Proceedings of Networkshop 2005 conference, 2005.

(Abstract, PDF, Bibtex )

B. Bencsáth
Az internetes vírus- és spamvédelem rendszerszemléletben
HISEC 2004 konferencia, 2004, 10., Budapest, in Hungarian.

(Abstract, PDF, PPT, Bibtex )

M. Félegyházi, J. P. Hubaux, L. Buttyán
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks -- the Dynamic Case
Proceedings of the 2nd Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2004), 2004, March.
( Bibtex )

I. Zs. Berta, L. Buttyán, I. Vajda
Mitigating the Untrusted Terminal Problem Using Conditional Signatures
Proceedings of International Conference on Information Technology ITCC 2004, IEEE, 2004, IEEE, Las Vegas, NV, USA, April.

(Abstract, PDF, Bibtex )

I. Zs. Berta, L. Buttyán, I. Vajda
Privacy Protecting Protocols for Revokable Digital Signatures
Proceedings of Cardis 2004, Toulouse, France (to appear), Kluwer, 2004, Kluwer.

(Abstract, PDF, Bibtex )

B. Bencsáth, I. Vajda
Protection Against DDoS Attacks Based On Traffic Level Measurements
2004 International Symposium on Collaborative Technologies and Systems, The Society for Modeling and Simulation International, 2004, Waleed W. Smari, William McQuay, pp. 22-28., The Society for Modeling and Simulation International, San Diego, CA, USA, January, Simulation series vol 36. no. 1., ISBN 1-56555-272-5.

(Abstract, PDF, PS, Bibtex )

I. Zs. Berta, B. Bencsáth
Sending authentic messages from malicious terminals
Proceedings of the Networkshop 2004 Conference, NIIF, Hungary, 2004, NIIF, Hungary.
(Abstract, Bibtex )

B. Bencsáth
The problems and connections of network virus protection and the protection against denial of service attacks
Proceedings of the Networkshop 2004 Conference, NIIF, Hungary, 2004, NIIF, Hungary.

(Abstract, PDF, PPT, Bibtex )

L. Buttyán, I. Vajda
Towards Provable Security for Ad Hoc Routing Protocols
Proceedings of the 2nd ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2004), ACM, 2004, ACM, October.
( Bibtex )

B. Bencsáth, I. Vajda
Trap E-mail Address for Combating E-mail Viruses
Proceedings of SoftCOM 2004 12. International conference on software, telecommunications and computer networks, University of Split, 2004, pp. 220-224, University of Split, October.

(PDF, PS, Bibtex )

N. B. Salem, L. Buttyán, J. P. Hubaux, M. Jakobsson
A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks
4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003), 2003, June.

(Abstract, Bibtex )

B. Bencsáth, L. Buttyán, I. Vajda
A game based analysis of the client puzzle approach to defend against DoS attacks
Proceedings of SoftCOM 2003 11. International conference on software, telecommunications and computer networks, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split, 2003, pp. 763-767, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split.

(Abstract, PDF, PS, Bibtex )

M. Jakobsson, J. P. Hubaux, L. Buttyán
A Micropayment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks
Proceedings of Financial Crypto 2003, 2003, La Guadeloupe, January.
(Abstract, Bibtex )

M. Félegyházi, L. Buttyán, J. P. Hubaux
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks -- the Static Case
8th International Conference on Personal Wireless Communications (PWC 2003), 2003, September.

(Abstract, PDF, PPT, Bibtex )

I. Vajda, L. Buttyán
Lightweight Authentication Protocols for Low-Cost RFID Tags
2nd Workshop on Security in Ubiquitous Computing, in conjunction with Ubicomp 2003, 2003, October.

(Abstract, Bibtex )

S. Capkun, J. P. Hubaux, L. Buttyán
Mobility Helps Security in Ad Hoc Networks
4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003), 2003, June.

(Abstract, Bibtex )

S. Capkun, L. Buttyán, J. P. Hubaux
SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks
Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003), ACM, 2003, ACM, October.

(Abstract, Bibtex )

L. Buttyán, S. Capkun, J. P. Hubaux
A Formal Analysis of Syverson`s Rational Exchange Protocol
Proceedings of IEEE Computer Security Foundations Workshop, 2002, Cape Breton, Nova Scotia, Canada, June.

(Abstract, PDF, Bibtex )

B. Bencsáth, I. Zs. Berta
Empiric examination of random number generators of smart cards
HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia, BME, 2002, BME.

(PDF, Bibtex )

I. Verók
Formal Verification of JavaCard Application Security Properties
HTE-BME 2002 Korszerű távközlő és informatikai rendszerek és hálózatok konferencia, Budapest University of Technology and Economics, 2002, Budapest University of Technology and Economics.

(PDF, Bibtex )

L. Buttyán, S. Capkun, J. P. Hubaux
Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph
Proceedings of The ACM New Security Paradigms Workshop 2002, 2002, pp. 8, Norfolk, Virginia Beach, USA, September.

(Abstract, PDF, Bibtex )

I. Zs. Berta
The problem of sending authentic messages from insecure terminals
HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia, BME, 2002, BME.

( Bibtex )

N. B. Salem, L. Buttyán
A Payment Scheme for Broadcast Multimedia Streams
Proceedings of 6th IEEE Symposium on Computers and Communications, 2001, Hammamet, Tunisia, July.

(Abstract, PS, Bibtex )

B. Bencsáth, I. Vajda
Collecting randomness from the net
Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security 2001, Kluwer, 2001, pp. 105-111, Kluwer, May.

(Abstract, PDF, PS, Bibtex )

I. Zs. Berta, Z. Á. Mann
Cryptographic application of programmable smart cards
Proceedings of NetWorkshop'2001, 2001.

(PDF, Bibtex )

L. Buttyán, J. P. Hubaux
Rational Exchange -- A Formal Model Based on Game Theory
Proceedings of 2nd International Workshop on Electronic Commerce (WELCOM 2001), 2001, Heidelberg, Germany, November.

(Abstract, PS, Bibtex )

J. P. Hubaux, L. Buttyán, S. Capkun
The Quest for Security in Mobile Ad Hoc Networks
Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 2001, Long Beach, CA, USA, October.

(Abstract, PS, Bibtex )

L. Buttyán, J. P. Hubaux
Enforcing Service Availability in Mobile Ad-Hoc WANs
Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), 2000, Boston, MA, USA, August.

(Abstract, PS, Bibtex )

Handover Analysis in a Wireless Mobile IP Network
12. Távközlési és Informatikai Hálózatok Szeminárium és Kiállítás, 2000, Sopron, Hungary, October 4-6, in Hungarian.

(Abstract, PDF, Bibtex )

L. Buttyán, J. P. Hubaux
Accountable Anonymous Access to Services in Mobile Communication Systems
Proceedings of 18th IEEE Symposium on Reliable Distributed Systems, Workshop on Electronic Commerce, 1999, pp. 384-389, Lausanne, Switzerland, October.

(Abstract, PS, Bibtex )

L. Buttyán, S. Staamann, A. Coignet, E. Ruggiano, U. Wilhelm, M. Zweiacker
Closed User Groups in Internet Service Centres
Proceedings of DAIS`99, 1999, Helsinki, June.

(Abstract, PS, Bibtex )

U. Wilhelm, S. Staamann, L. Buttyán
Introducing Trusted Third Parties to the Mobile Agent Paradigm
Proceedings of Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer-Verlag (LNCS 1603), 1999, J. Vitek, C. Jensen, pp. 471-491, Springer-Verlag (LNCS 1603), January.

(Abstract, PS, Bibtex )

S. Staamann, U. Wilhelm, L. Buttyán
Multilateral Security in Middleware Based Telecommunications Architectures
Proceedings of Multilateral Security in Communications, Addison-Wesley, 1999, G. Mueller and K. Rannenberg, pp. 381-386, Addison-Wesley, July.

(Abstract, PS, Bibtex )

L. Buttyán, S. Staamann, U. Wilhelm
A Simple Logic for Authentication Protocol Design
Proceedings of IEEE Computer Security Foundations Workshop, 1998, pp. 153-162, Rockport, MA, USA, June.

(Abstract, PS, Bibtex )

S. Csibi, L. Györfi, I. Vajda
Analysis of Protocol Sequences for Slow Frequency Hopping
Proceedings of the 1998 International Zürich Seminar on Broadband Communication (IEEE Catalog No.98TH8277), 1998, pp. 237-242.
( Bibtex )

Á. Jordán, I. Vajda
On the distribution of Hamming correlation of cyclically permutable subsets of RS codes
Proceedings of the II. International Workshop on Optimal Codes'98, 1998, pp. 144-150, Sazopol,Bulgaria, June 9-15.
( Bibtex )

Á. Jordán, I. Vajda
On the Hamming correlation distribution of SFH signature sequence sets
roceedings of the IEEE ISSSTA '98 (IEEE Fifth International Symposium on Spread Sectrum Techniques & Applications), 1998, pp. 676-680, Sun City, South Africa, September 2-4.
( Bibtex )

U. Wilhelm, S. Staamann, L. Buttyán
On the Problem of Trust in Mobile Agent Systems
Proceedings of Internet Society`s Symposium on Network and Distributed System Security, 1998, San Diego, CA, USA, March.

(Abstract, PS, Bibtex )

U. Wilhelm, S. Staamann, L. Buttyán
Protecting the Itinerary of Mobile Agents
Proceedings of ECOOP Workshop on Mobile Object Systems: Secure Internet Mobile Communications, 1998, Brussels, Belgium, June.

(Abstract, PS, Bibtex )

S. Staamann, U. Wilhelm, L. Buttyán
Security in TINA
Proceedings of IFIP-SEC`98, 1998, Wienna-Budapest, August.

(Abstract, PS, Bibtex )

S. Staamann, U. Wilhelm, A. Schiper, L. Buttyán, J. P. Hubaux
Security in the Telecommunication Information Networking Architecture - the CrySTINA Approach
Proceedings of TINA`97, 1997, November.

(Abstract, PS, Bibtex )

L. Györfi, I. Vajda
Construction of Protocol Sequences for Multiple-Access Collision Channels
Proceedings of the 1993 IEEE International Symposium on Information Theory, 1993, pp. 157, San Antonio, USA, Jan 17-22.
( Bibtex )

I. Vajda
Code sequences for FH-CDMA channels
Proceedings of IEEE Symposium on Spread Spectrum Techniques and Applications, 1992, pp. 195-197, Yokohama, Japan.
( Bibtex )

T. Nemetz, I. Vajda
A cryptographic element based on number system conversion
Proceedings of 1991 IEEE International Symposium on Information Theory, 1991, pp. 127, Budapest, Hungary.
( Bibtex )

I. Vajda
On random code-hopping DS/SSMA systems
Proceedings of IEEE Symposium on Spread Spectrum Techniques and Applications, 1990, pp. 47-52, London.
( Bibtex )

I. Vajda, J. Landsmann
Some results on generation of shift-register sequences with large linear complexity
Proceedings of Applied Algebra, Algebraic Algorithms and Error Control Codes, AAECC-5, 1987, pp. 81, Menorca, Spain, June 15-19.
( Bibtex )

I. Vajda
More on modelling and performance evaluation for frequency coded multiple access channels
Proceedings of U.R.S.I. XXIst General Assembly, 1985, pp. 104, Florence, Italy.
( Bibtex )



Disszertációk
I. Zs. Berta
Mitigating the attacks of malicious terminals
BME, 2005, http://www.crysys.hu/~isti/phd.

(Abstract, PDF, Bibtex )

I. Zs. Berta
Why are not digital signatures spreading as quickly as it was expected?
MBA dissertation, Buckinghamshire Chilterns University College, Buckinghamshire Business School, Számalk Open Business School, 2004.

(PDF, Bibtex )

I. Verók
A Mobile Agent Bidirectional One-to-Many Communications Framework
BME, 2001.
( Bibtex )

L. Buttyán
Building Blocks for Secure Services: Authenticated Key Transport and Rational Exchange Protocols
Swiss Federal Institute of Technology (EPFL), 2001, December.

(Abstract, PDF, Bibtex )

I. Verók
Cahoots: A Mobile Agent Bidirectional One-to-Many Communications Framework
Budapest University of Technology and Economics, 2001.

(PDF, Bibtex )

M. Hegedüs
On-line tőzsdei kereskedési adatfeldolgozó rendszer fejlesztése és statisztikai elemzések napon belüli kereskedéshez
BME, 2001.
( Bibtex )

M. Perényi
On-line tőzsdei kereskedési adatfeldolgozó rendszer fejlesztése és statisztikai elemzések napon belüli kereskedéshez
BME, 2001.
( Bibtex )

I. Berta
Programozható chipkártya biztonsági alkalmazásai
BME, 2001.
( Bibtex )

I. Zs. Berta
Security of programmable smart cards
Budapest University of Technology and Economics, 2001.

(Abstract, PDF, Bibtex )

S. Tihanyi
Biztonságos anonim hálózati kommunikációs rendszer
BME, 2000.
( Bibtex )

B. Korossy Khayll
Intelligens ügynök az elektronikus kereskedelemban
BME, 2000.
( Bibtex )

T. Németh
Nyilvános kulcsú kriptográfiai megoldás elektronikus banki szolgáltatásra
BME, 2000.
( Bibtex )

Smart Card technológiát alkalmazó Internetes fizetési rendszer
BME, 2000.
( Bibtex )

B. Bencsáth
Virtuális magánhálózatok kiépítése és auditálása
BME, 2000.
( Bibtex )

D. Labanc
Internetes értékpapír-megbízásokat kezelő rendszer, 1999.
( Bibtex )

I. Kiss
SmartCardos mobiltelefonokkal megvalósított biztonságos elektronikus fizetőeszköz
BME, 1999.
( Bibtex )

Á. Csernitzky
Internetes telebanki szolgáltatás és a szerver oldali adatbiztonsága
BME, 1998.
( Bibtex )

Zs. Nagy
A hitelkártyás vásárlás SET (Secure Electronic Transaction) draft standard adatbiztonsági protokolljának vizsgálata
BME, 1997.
( Bibtex )

Zs. Szabadi
Biztonságos kommunikáció X400 MTA és Web Browser ügyfél alkalmazás között
BME, 1997.
( Bibtex )

K. Rassay
Nyílt számítógépes hálózatok adatvédelmi kérdései
BME, 1995.
( Bibtex )

L. Buttyán
S-box Design, (in Hungarian)
Budapest University of Technology, 1995, May.
( Bibtex )

Gy. Hernádi
Lokális számítógéphálózatok algoritmikus adatvédelme
BME, 1992.
( Bibtex )

T. Szántó
Reed-Solomon kódok alkalmazási lehetőségei az adatvédelemben
BME, 1991.
( Bibtex )

Tanulmányok
B. Bencsáth, T. Tuzson, B. Tóth, T. Tiszai, G. Szappanos, E. Rigó, Sz. Pásztor, M. Pásztor, P. Papp, P. Orvos, P. Mátó, B. Martos, L. Kún, Z. Kincses, T. Horváth, M. Juhász, B. K. Erdélyi, A. Bogár, G. Vid
Az informatikai hálózati infrastruktúra biztonsági kockázatai és kontrolljai
IHM - MTA-SZTAKI, 2004.

(Abstract, PDF, Bibtex )

I. Zs. Berta, I. Vajda, L. Buttyán, B. Bencsáth, T. Veiland
HUNEID - Hungarian Electronic ID smart card specifications
Ministry of Informatics and Telecommunications (www.ihm.hu), 2004, http://www.itktb.hu/engine.aspx?page=showcontent&content;=ias.
( Bibtex )

G. Ács, L. Buttyán, I. Vajda
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks
http://eprint.iacr.org/ under report number 2004/159., 2004, March.

(Abstract, Bibtex )

L. Buttyán, J. P. Hubaux
Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks
EPFL-DI-ICA, 2001, no. DSC/2001/001, January.

(Abstract, PS, Bibtex )

L. Buttyán, J. P. Hubaux
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
EPFL-DI-ICA, 2001, no. DSC/2001/046, August.

(Abstract, PS, Bibtex )

L. Buttyán, J. P. Hubaux
Enforcing Service Availability in Mobile Ad-Hoc WANs
EPFL-DI-ICA, 2000, no. DSC/2000/025, May.

(Abstract, PDF, Bibtex )

I. Vajda, B. Bencsáth, A. Bognár
Tanulmány a napvilágra került Elender jelszavakról, 2000, Apr..
(Abstract, Bibtex )

J. P. Hubaux, J. Y. Le Boudec, S. Giordano, M. Hamdi, L. Blazevic, L. Buttyán, M. Vojnovic
Toward Mobile Ad-Hoc WANs: Terminodes
EPFL-DI-ICA, 2000, no. DSC/2000/006, February.

(Abstract, PDF, Bibtex )

L. Buttyán, J. P. Hubaux
Accountable Anonymous Service Usage in Mobile Communication Systems
EPFL-DI-ICA, 1999, no. SSC/99/16, May.

(Abstract, PS, Bibtex )

L. Buttyán
Formal methods in the design of cryptographic protocols (state of the art)
EPFL-DI-ICA, 1999, no. SSC/1999/38, November.

(Abstract, PS, Bibtex )

L. Buttyán, J. P. Hubaux
Toward a Formal Model of Fair Exchange - a Game Theoretic Approach
EPFL-DI-ICA, 1999, no. SSC/1999/39, December.

(Abstract, PDF, Bibtex )

C. Gbaguidi, S. Staamann, U. Wilhelm, L. Buttyán
A Note on an Authentication Technique Based on Distributed Security Management for the Global Mobility Network
EPFL-DI-ICA, 1998, no. SSC/98/18, April.

(Abstract, PS, Bibtex )

S. Staamann, U. Wilhelm, L. Buttyán
CrySTINA: Security in the Telecommunications Information Networking Architecture
EPFL-DI-ICA, 1998, no. SSC/98/4, January.

(Abstract, PS, Bibtex )

S. Staamann, U. Wilhelm, L. Buttyán
Security in the Telecommunication Information Networking Architecture - the CrySTINA Approach
EPFL-DI-ICA, 1998, no. SSC/98/4, January.

(Abstract, PS, Bibtex )

L. Buttyán, I. Vajda
On the Design of Strong Bit Permutations and Substitutions
Budapest University of Technology, 1997, January.
( Bibtex )

I. Vajda, L. Buttyán
On the Design of Substitution-Permutation Ciphers
Budapest University of Technology, 1997, January.
( Bibtex )

Egyéb
I. Zs. Berta, I. Vajda
Documents from Malicious Terminals
SPIE's Microtechnologies for the New Millenium 2003, Bioengineered and Bioinspired Systems, Grand Canaria, Spain, 2003.

(Abstract, PDF, Bibtex )

I. Vajda, I. Zs. Berta
Limitations of users when using malicious terminals
Third Central European Conference on Cryptography (Tatracrypt'03), 2003.
( Bibtex )

B. Bencsáth, I. Vajda
A game theoretical approach to optimizing of protection against DoS attacks
presented on the Second Central European Conference on Cryptography (Hajducrypt), Július, 2002, (no proceedings).
( Bibtex )

L. Buttyán, I. Zs. Berta, I. Vajda
Eliminating Man-in-the-Middle attacks of Malicious Terminals
Workshop organised by the IST Coordination Point of the Ministry of Education, Budapest, 2002.

(Abstract, Bibtex )

I. Zs. Berta, I. Berta
Hardware and Software Security
Magyar Elektrotechnikai Egyesület XLIX. vándorgyülés, Sopron, 2002.

( Bibtex )

I. Zs. Berta, I. Vajda
Message Authentication using Smart Card and Biometry
Second Central European Conference on Cryptography (HajduCrypt) 2002, Debrecen, Hungary, 2002.

(Abstract, Bibtex )

L. Buttyán, E. Wiedmer, E. Lauper
Method for transmitting payment information between a terminal and a third equipment, May, 2001, International Patent Application.
( Bibtex )

I. Verók
A Decentralized Marketplace Composed of Mobile Intelligent Agents
Scientific student circles (TDK), 2000.

(PDF, Bibtex )

I. Zs. Berta, Z. Á. Mann
Analysis of public key cryptography based on elliptic curves in smart card and PC environment
Scientific student circles (TDK) 2000, Budapest University of Technology and Economics, 2000.

( Bibtex )

Design and Analysis of a Bluetooth Network Optimization Algorithm
Students' Scientific Conference, TU Budapest, October, 2000, in Hungarian.

(Abstract, PDF, Bibtex )

L. Buttyán, E. Wiedmer, E. Lauper
Method for securing communications between a terminal and an additional user equipment, September, 2000, International Patent Application.
( Bibtex )

B. Bencsáth
Simple, free encrypted tunnels using linux
Presented on Networkshop 2000, Gödöllő, Hungary, 2000, http://nws.iif.hu/NwScd/docs/nevjegy/nj74.htm.
( Bibtex )

Gy. Miklós, M. Félegyházi
Traffic Dependent Bluetooth Scatternet Optimization Procedure
US patent, May, 2000, Nr: 09/666529.
( Bibtex )

M. Félegyházi, Cs. Szabó, V. Tímár
An Experimental Analysis of Mobile IP in a Wireless Environment
Students' Scientific Conference, TU Budapest, October, 1999, in Hungarian.

(Abstract, PDF, Bibtex )

I. Zs. Berta, Z. Á. Mann
Possibilities of authenticity using intelligent smart card
Scientific student circles (TDK) 1999, Budapest University of Technology and Economics, 1999.

(Abstract, PDF, Bibtex )

B. Bencsáth, S. Tihanyi
Problem areas of the security aspects of network operating systems
Scientific student groups (TDK) 1999, 1999.

(PDF, Bibtex )