Search Results - "Buttyan, L."
-
1
Extensions to an authentication technique proposed for the global mobility network
Published in IEEE transactions on communications (01-03-2000)“…We present three attacks on the authentication protocol that has been proposed for the so-called global mobility network in the October 1997 issue of the IEEE…”
Get full text
Journal Article -
2
A framework for the revocation of unintended digital signatures initiated by malicious terminals
Published in IEEE transactions on dependable and secure computing (01-07-2005)“…Human users need trusted computers when they want to generate digital signatures. In many applications, in particular, if the users are mobile, they need to…”
Get full text
Journal Article -
3
Architecture for Secure and Private Vehicular Communications
Published in 2007 7th International Conference on ITS Telecommunications (01-06-2007)“…The deployment of vehicular communication (VC) systems is strongly dependent on their security and privacy features. In this paper, we propose a security…”
Get full text
Conference Proceeding -
4
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
Published in Mobile networks and applications (01-10-2003)“…In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority; therefore, they are motivated to cooperate in order…”
Get full text
Journal Article -
5
A pessimistic approach to trust in mobile agent platforms
Published in IEEE internet computing (01-09-2000)“…The problem of protecting an execution environment from possibly malicious mobile agents has been studied extensively, but the reverse problem, protecting the…”
Get full text
Journal Article -
6
Enforcing service availability in mobile ad-hoc WANs
Published in 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444) (2000)“…We address the problem of service availability in mobile ad-hoc WANs. We present a secure mechanism to stimulate end users to keep their devices turned on, to…”
Get full text
Conference Proceeding -
7
Application of wireless sensor networks in critical infrastructure protection: challenges and design options [Security and Privacy in Emerging Wireless Networks]
Published in IEEE wireless communications (01-10-2010)“…The protection of critical infrastructures provides an interesting application area for wireless sensor networks. Threats such as natural catastrophes,…”
Get full text
Journal Article -
8
A payment scheme for broadcast multimedia streams
Published in Proceedings. Sixth IEEE Symposium on Computers and Communications (2001)“…Streaming multimedia data on the Internet is developing as a mainstream technology, which attracts many users by providing a new and convenient form of access…”
Get full text
Conference Proceeding -
9
Towards mobile ad-hoc WANs: terminodes
Published in 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540) (2000)“…Terminodes are personal devices that provide functionality of both the terminals and the nodes of the network. A network of terminodes is an autonomous, fully…”
Get full text
Conference Proceeding -
10
Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes
Published in IEEE transactions on dependable and secure computing (01-11-2011)“…We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the…”
Get full text
Journal Article -
11
Resilient aggregation with attack detection in sensor networks
Published in Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06) (2006)“…In this paper, we propose a new model of resilient data aggregation in sensor networks, where the aggregator analyzes the received sensor readings and tries to…”
Get full text
Conference Proceeding -
12
Cooperative packet forwarding in multi-domain sensor networks
Published in Third IEEE International Conference on Pervasive Computing and Communications Workshops (2005)“…Sensor networks are large scale networks of low-power devices that collaborate in order to perform a given task. The sensors are limited in battery energy,…”
Get full text
Conference Proceeding -
13
Mitigating the untrusted terminal problem using conditional signatures
Published in International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004 (2004)“…We study the problem of how a user at an untrusted terminal can generate digital signatures with the help of a smart card. This problem may arise in many…”
Get full text
Conference Proceeding -
14
Tresorium: Cryptographic File System for Dynamic Groups over Untrusted Cloud Storage
Published in 2012 41st International Conference on Parallel Processing Workshops (01-09-2012)“…In this paper, we present Tresorium, a cryptographic file system designed for cloud based data storage. In Tresorium, files are encrypted before they are…”
Get full text
Conference Proceeding -
15
A Secure Distributed Transport Protocol for Wireless Sensor Networks
Published in 2011 IEEE International Conference on Communications (ICC) (01-06-2011)“…We propose a secure distributed transport protocol for wireless sensor networks that resists against attacks on the reliability service provided by the…”
Get full text
Conference Proceeding -
16
VeRA - Version Number and Rank Authentication in RPL
Published in 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems (01-10-2011)“…Designing a routing protocol for large low-power and lossy networks (LLNs), consisting of thousands of constrained nodes and unreliable links, presents new…”
Get full text
Conference Proceeding -
17
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
Published in IEEE transactions on mobile computing (01-05-2006)“…In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward…”
Get full text
Magazine Article -
18
A simple logic for authentication protocol design
Published in Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238) (1998)“…The authors describe a simple logic. The logic uses the notion of channels that are generalisations of communication links with various security properties…”
Get full text
Conference Proceeding -
19
Self-organized public-key management for mobile ad hoc networks
Published in IEEE transactions on mobile computing (01-01-2003)“…In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they…”
Get full text
Magazine Article -
20
Guest Editorial Non-Cooperative Behavior in Networking
Published in IEEE journal on selected areas in communications (01-08-2007)“…The 17 papers in this special issue focus on non-cooperative behavior in networking. They deal with non-cooperative behaviors arising from a wide variety of…”
Get full text
Journal Article