Search Results - "Buttyan, L."

Refine Results
  1. 1

    Extensions to an authentication technique proposed for the global mobility network by Buttyan, L., Gbaguidi, C., Staamann, S., Wilhelm, U.

    Published in IEEE transactions on communications (01-03-2000)
    “…We present three attacks on the authentication protocol that has been proposed for the so-called global mobility network in the October 1997 issue of the IEEE…”
    Get full text
    Journal Article
  2. 2

    A framework for the revocation of unintended digital signatures initiated by malicious terminals by Berta, I.Z., Buttyan, L., Vajda, I.

    “…Human users need trusted computers when they want to generate digital signatures. In many applications, in particular, if the users are mobile, they need to…”
    Get full text
    Journal Article
  3. 3

    Architecture for Secure and Private Vehicular Communications by Papadimitratos, P., Buttyan, L., Hubaux, J.-P., Kargl, F., Kung, A., Raya, M.

    “…The deployment of vehicular communication (VC) systems is strongly dependent on their security and privacy features. In this paper, we propose a security…”
    Get full text
    Conference Proceeding
  4. 4

    Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks by Buttyan, Levente, Hubaux, Jean-Pierre

    Published in Mobile networks and applications (01-10-2003)
    “…In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority; therefore, they are motivated to cooperate in order…”
    Get full text
    Journal Article
  5. 5

    A pessimistic approach to trust in mobile agent platforms by Wilhelm, U.G., Staamann, S.M., Buttyan, L.

    Published in IEEE internet computing (01-09-2000)
    “…The problem of protecting an execution environment from possibly malicious mobile agents has been studied extensively, but the reverse problem, protecting the…”
    Get full text
    Journal Article
  6. 6

    Enforcing service availability in mobile ad-hoc WANs by Buttyan, L., Hubaux, J.-P.

    “…We address the problem of service availability in mobile ad-hoc WANs. We present a secure mechanism to stimulate end users to keep their devices turned on, to…”
    Get full text
    Conference Proceeding
  7. 7

    Application of wireless sensor networks in critical infrastructure protection: challenges and design options [Security and Privacy in Emerging Wireless Networks] by Buttyan, L, Gessner, D, Hessler, A, Langendoerfer, P

    Published in IEEE wireless communications (01-10-2010)
    “…The protection of critical infrastructures provides an interesting application area for wireless sensor networks. Threats such as natural catastrophes,…”
    Get full text
    Journal Article
  8. 8

    A payment scheme for broadcast multimedia streams by Buttyan, L., Ben Salem, N.

    “…Streaming multimedia data on the Internet is developing as a mainstream technology, which attracts many users by providing a new and convenient form of access…”
    Get full text
    Conference Proceeding
  9. 9

    Towards mobile ad-hoc WANs: terminodes by Hubaux, J.-P., Le Boudec, J.-Y., Giordano, S., Hamdi, M., Blazevic, L., Buttyan, L., Vojnovic, M.

    “…Terminodes are personal devices that provide functionality of both the terminals and the nodes of the network. A network of terminodes is an autonomous, fully…”
    Get full text
    Conference Proceeding
  10. 10

    Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes by Buttyan, L., Czap, L., Vajda, I.

    “…We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the…”
    Get full text
    Journal Article
  11. 11

    Resilient aggregation with attack detection in sensor networks by Buttyan, L., Schaffer, P., Vajda, I.

    “…In this paper, we propose a new model of resilient data aggregation in sensor networks, where the aggregator analyzes the received sensor readings and tries to…”
    Get full text
    Conference Proceeding
  12. 12

    Cooperative packet forwarding in multi-domain sensor networks by Felegyhazi, M., Hubaux, J.-P., Buttyan, L.

    “…Sensor networks are large scale networks of low-power devices that collaborate in order to perform a given task. The sensors are limited in battery energy,…”
    Get full text
    Conference Proceeding
  13. 13

    Mitigating the untrusted terminal problem using conditional signatures by Berta, I.Z., Buttyan, L., Vajda, I.

    “…We study the problem of how a user at an untrusted terminal can generate digital signatures with the help of a smart card. This problem may arise in many…”
    Get full text
    Conference Proceeding
  14. 14

    Tresorium: Cryptographic File System for Dynamic Groups over Untrusted Cloud Storage by Lam, I., Szebeni, S., Buttyan, L.

    “…In this paper, we present Tresorium, a cryptographic file system designed for cloud based data storage. In Tresorium, files are encrypted before they are…”
    Get full text
    Conference Proceeding
  15. 15

    A Secure Distributed Transport Protocol for Wireless Sensor Networks by Buttyan, L., Grilo, A. M.

    “…We propose a secure distributed transport protocol for wireless sensor networks that resists against attacks on the reliability service provided by the…”
    Get full text
    Conference Proceeding
  16. 16

    VeRA - Version Number and Rank Authentication in RPL by Dvir, A., Holczer, T., Buttyan, L.

    “…Designing a routing protocol for large low-power and lossy networks (LLNs), consisting of thousands of constrained nodes and unreliable links, presents new…”
    Get full text
    Conference Proceeding
  17. 17

    Nash equilibria of packet forwarding strategies in wireless ad hoc networks by Felegyhazi, M., Hubaux, J.-P., Buttyan, L.

    Published in IEEE transactions on mobile computing (01-05-2006)
    “…In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward…”
    Get full text
    Magazine Article
  18. 18

    A simple logic for authentication protocol design by Buttyan, L., Staamann, S., Wilhelm, U.

    “…The authors describe a simple logic. The logic uses the notion of channels that are generalisations of communication links with various security properties…”
    Get full text
    Conference Proceeding
  19. 19

    Self-organized public-key management for mobile ad hoc networks by Capkun, S., Buttyan, L., Hubaux, J.-P.

    Published in IEEE transactions on mobile computing (01-01-2003)
    “…In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they…”
    Get full text
    Magazine Article
  20. 20

    Guest Editorial Non-Cooperative Behavior in Networking by Buttyan, Levente, Hubaux, Jean-Pierre, Li, Li, Li, Xiang-Yang, Roughgarden, Tim, Leon-Garcia, Alberto

    “…The 17 papers in this special issue focus on non-cooperative behavior in networking. They deal with non-cooperative behaviors arising from a wide variety of…”
    Get full text
    Journal Article