default search action
Levente Buttyán
Person information
- affiliation: Budapest University of Technology and Economics, Department of Networked Systems and Services
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c80]Gábor Fuchs, Roland Nagy, Levente Buttyán:
A Practical Attack on the TLSH Similarity Digest Scheme. ARES 2023: 13:1-13:10 - [c79]József Sándor, Roland Nagy, Levente Buttyán:
PATRIoTA: A Similarity-based IoT Malware Detection Method Robust Against Adversarial Samples. EDGE 2023: 344-353 - [c78]József Sándor, Roland Nagy, Levente Buttyán:
Increasing the Robustness of a Machine Learning-based IoT Malware Detection Method with Adversarial Training. WiseML@WiSec 2023: 3-8 - [e4]Gary B. Wills, Levente Buttyán, Péter Kacsuk, Victor Chang:
Proceedings of the 8th International Conference on Internet of Things, Big Data and Security, IoTBDS 2023, Prague, Czech Republic, April 21-23, 2023. SCITEPRESS 2023, ISBN 978-989-758-643-9 [contents] - 2022
- [c77]Dorottya Papp, Gergely Ács, Roland Nagy, Levente Buttyán:
SIMBIoTA-ML: Light-weight, Machine Learning-based Malware Detection for Embedded IoT Devices. IoTBDS 2022: 55-66 - [i6]Levente Buttyán, Rudolf Ferenc:
IoT Malware Detection with Machine Learning. ERCIM News 2022(129): 0 (2022) - 2021
- [j33]Roland Nagy, Krisztián Németh, Dorottya Papp, Levente Buttyán:
Rootkit Detection on Embedded IoT Devices. Acta Cybern. 25(2): 369-400 (2021) - [j32]Gábor Székely, Gergo Ládi, Tamás Holczer, Levente Buttyán:
Protocol State Machine Reverse Engineering with a Teaching-Learning Approach. Acta Cybern. 25(2): 517-535 (2021) - [c76]Csongor Tamás, Dorottya Papp, Levente Buttyán:
SIMBIoTA: Similarity-based Malware Detection on IoT Devices. IoTBDS 2021: 58-69 - 2020
- [b1]Máté Horváth, Levente Buttyán:
Cryptographic Obfuscation - A Survey. Springer Briefs in Computer Science, Springer 2020, ISBN 978-3-319-98040-9, pp. 1-81 - [c75]Gergely Biczók, Máté Horváth, Szilveszter Szebeni, István Lám, Levente Buttyán:
The Cost of Having Been Pwned: A Security Service Provider's Perspective. ETAA@ESORICS 2020: 154-167 - [c74]Márton Bak, Dorottya Papp, Csongor Tamás, Levente Buttyán:
Clustering IoT Malware based on Binary Similarity. NOMS 2020: 1-6
2010 – 2019
- 2019
- [c73]Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt:
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation. ICISC 2019: 133-149 - [c72]Dorottya Papp, Thorsten Tarrach, Levente Buttyán:
Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment. SEFM 2019: 491-509 - [i5]Máté Horváth, Levente Buttyán, Gábor Székely, Dóra Neubrandt:
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation. IACR Cryptol. ePrint Arch. 2019: 1302 (2019) - 2018
- [j31]Amit Dvir, Vinh-Thong Ta, Sefi Erlich, Levente Buttyán:
STWSN: A novel secure distributed transport protocol for wireless sensor networks. Int. J. Commun. Syst. 31(18) (2018) - [c71]András Gazdag, Dóra Neubrandt, Levente Buttyán, Zsolt Szalay:
Detection of Injection Attacks in Compressed CAN Traffic Logs. ISSA/CSITS@ESORICS 2018: 111-124 - [c70]Máté Horváth, Levente Buttyán:
Problem Domain Analysis of IoT-Driven Secure Data Markets. Euro-CYBERSEC 2018: 57-67 - [c69]Gergo Ládi, Levente Buttyán, Tamás Holczer:
Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic. SoftCOM 2018: 1-6 - 2017
- [c68]Dorottya Papp, Levente Buttyán, Zhendong Ma:
Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance. ARES 2017: 64:1-64:6 - [c67]András Gazdag, Levente Buttyán, Zsolt Szalay:
Efficient lossless compression of CAN traffic logs. SoftCOM 2017: 1-6 - 2016
- [c66]Gábor Pék, Zsombor Lázár, Zoltán Várnagy, Márk Félegyházi, Levente Buttyán:
Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis. ESORICS (1) 2016: 199-216 - [c65]Levente Buttyán, Márk Félegyházi, Gábor Pék:
Mentoring Talent in IT Security-A Case Study. ASE @ USENIX Security Symposium 2016 - 2015
- [c64]Dorottya Papp, Zhendong Ma, Levente Buttyán:
Embedded systems security: Threats, vulnerabilities, and attack taxonomy. PST 2015: 145-152 - 2014
- [j30]Aron Laszka, Márk Félegyházi, Levente Buttyán:
A Survey of Interdependent Information Security Games. ACM Comput. Surv. 47(2): 23:1-23:38 (2014) - [c63]Aron Laszka, Gábor Horváth, Márk Félegyházi, Levente Buttyán:
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources. GameSec 2014: 175-194 - [c62]Gábor Pék, Levente Buttyán:
Towards the automated detection of unknown malware on live systems. ICC 2014: 847-852 - [c61]Ta Vinh Thong, Amit Dvir, Levente Buttyán:
Formal Security Verification of Transport Protocols for Wireless Sensor Networks. ICCSAMA 2014: 389-403 - 2013
- [j29]Gábor Pék, Levente Buttyán, Boldizsár Bencsáth:
A survey of security issues in hardware virtualization. ACM Comput. Surv. 45(3): 40:1-40:34 (2013) - [j28]Aron Laszka, Levente Buttyán, Dávid Szeszlér:
Designing robust network topologies for wireless sensor networks in adversarial environments. Pervasive Mob. Comput. 9(4): 546-563 (2013) - [j27]Ta Vinh Thong, Levente Buttyán:
On automating the verification of secure ad-hoc network routing protocols. Telecommun. Syst. 52(4): 2611-2635 (2013) - [c60]Amit Dvir, Levente Buttyán, Ta Vinh Thong:
SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains. ICC 2013: 2073-2078 - [c59]Guevara Noubir, Krishna Sampigethaya, Levente Buttyán, Loukas Lazos:
Welcome message from the D-SPAN 2013 chairs. WOWMOM 2013: 1 - [e3]Levente Buttyán, Ahmad-Reza Sadeghi, Marco Gruteser:
Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC'13, Budapest, Hungary, April 17-19, 2013. ACM 2013, ISBN 978-1-4503-1998-0 [contents] - 2012
- [j26]Péter Schaffer, Károly Farkas, Ádám Horváth, Tamás Holczer, Levente Buttyán:
Secure and reliable clustering in wireless sensor networks: A critical survey. Comput. Networks 56(11): 2726-2741 (2012) - [j25]Boldizsár Bencsáth, Gábor Pék, Levente Buttyán, Márk Félegyházi:
The Cousins of Stuxnet: Duqu, Flame, and Gauss. Future Internet 4(4): 971-1003 (2012) - [c58]Aron Laszka, Dávid Szeszlér, Levente Buttyán:
Game-theoretic Robustness of Many-to-one Networks. GAMENETS 2012: 88-98 - [c57]Aron Laszka, Dávid Szeszlér, Levente Buttyán:
Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality. GameSec 2012: 152-170 - [c56]István Lám, Szilveszter Szebeni, Levente Buttyán:
Invitation-Oriented TGDH: Key Management for Dynamic Groups in an Asynchronous Communication Model. ICPP Workshops 2012: 269-276 - [c55]István Lám, Szilveszter Szebeni, Levente Buttyán:
Tresorium: Cryptographic File System for Dynamic Groups over Untrusted Cloud Storage. ICPP Workshops 2012: 296-303 - [c54]António Grilo, Augusto Casaca, Paulo Rogério Pereira, Levente Buttyán, José Gonçalves, Carlos Fortunato:
A Wireless Sensor and Actuator Network for improving the electrical power grid dependability. NGI 2012: 71-78 - [c53]Gergely Kotyuk, Levente Buttyán:
A machine learning based approach for predicting undisclosed attributes in social networks. PerCom Workshops 2012: 361-366 - [c52]Ta Vinh Thong, Levente Buttyán:
Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases. TrustBus 2012: 192-206 - [c51]Levente Buttyán, Tamás Holczer:
Traffic analysis attacks and countermeasures in wireless body area sensor networks. WOWMOM 2012: 1-6 - 2011
- [j24]Tamás Holczer, Levente Buttyán:
Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 7(1) (2011) - [j23]Levente Buttyán, László Czap, István Vajda:
Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes. IEEE Trans. Dependable Secur. Comput. 8(6): 824-838 (2011) - [c50]Levente Buttyán, Márk Félegyházi, Boldizsár Bencsáth:
CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap. SysSec@DIMVA 2011: 75-78 - [c49]Gábor Pék, Boldizsár Bencsáth, Levente Buttyán:
nEther: in-guest detection of out-of-the-guest malware analyzers. EUROSEC 2011: 3 - [c48]Levente Buttyán, António M. Grilo:
A Secure Distributed Transport Protocol for Wireless Sensor Networks. ICC 2011: 1-6 - [c47]Amit Dvir, Tamás Holczer, Levente Buttyán:
VeRA - Version Number and Rank Authentication in RPL. MASS 2011: 709-714 - [c46]Boldizsár Bencsáth, Levente Buttyán, Tamás Paulik:
XCS based hidden firmware modification on embedded devices. SoftCOM 2011: 1-5 - [c45]Aron Laszka, Levente Buttyán, Dávid Szeszlér:
Optimal selection of sink nodes in wireless sensor networks in adversarial environments. WOWMOM 2011: 1-6 - 2010
- [j22]Levente Buttyán, László Dóra, Márk Félegyházi, István Vajda:
Barter trade improves message delivery in opportunistic networks. Ad Hoc Networks 8(1): 1-14 (2010) - [j21]Levente Buttyán, László Dóra, Fabio Martinelli, Marinella Petrocchi:
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks. Comput. Commun. 33(8): 907-922 (2010) - [j20]Levente Buttyán, Péter Schaffer:
Position-Based Aggregator Node Election in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 6(1) (2010) - [j19]Levente Buttyán, D. Gessner, A. Hessler, Peter Langendörfer:
Application of wireless sensor networks in critical infrastructure protection: challenges and design options. IEEE Wirel. Commun. 17(5): 44-49 (2010) - [j18]Ioannis G. Askoxylakis, Boldizsár Bencsáth, Levente Buttyán, László Dóra, Vasilios A. Siris, D. Szili, István Vajda:
Securing multi-operator-based QoS-aware mesh networks: requirements and design options. Wirel. Commun. Mob. Comput. 10(5): 622-646 (2010) - [c44]Levente Buttyán, Tamás Holczer:
Perfectly anonymous data aggregation in wireless sensor networks. MASS 2010: 513-518 - [c43]Levente Buttyán, Ta Vinh Thong:
Formal verification of secure ad-hoc network routing protocols using deductive model-checking. WMNC 2010: 1-6 - [c42]Levente Buttyán, L. Csik:
Security analysis of reliable transport layer protocols for wireless sensor networks. PerCom Workshops 2010: 419-424 - [c41]Levente Buttyán, László Czap, István Vajda:
Pollution Attack Defense for Coding Based Sensor Storage. SUTC/UMC 2010: 66-73 - [c40]Gergely Ács, Levente Buttyán, László Dóra:
Misbehaving router detection in link-state routing for wireless mesh networks. WOWMOM 2010: 1-6 - [e2]Tansu Alpcan, Levente Buttyán, John S. Baras:
Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings. Lecture Notes in Computer Science 6442, Springer 2010, ISBN 978-3-642-17196-3 [contents] - [i4]Frank Kargl, Levente Buttyán, David Eckhoff, Panagiotis Papadimitratos, Elmar Schoch:
10402 Report - Working Group on Security and Privacy. Inter-Vehicular Communication 2010
2000 – 2009
- 2009
- [j17]Levente Buttyán, Péter Schaffer, István Vajda:
CORA: Correlation-based resilient aggregation in sensor networks. Ad Hoc Networks 7(6): 1035-1050 (2009) - [c39]Levente Buttyán, Tamás Holczer:
Private Cluster Head Election in Wireless Sensor Networks. MASS 2009: 1048-1053 - [c38]Levente Buttyán, Tamás Holczer, André Weimerskirch, William Whyte:
SLOW: A Practical pseudonym changing scheme for location privacy in VANETs. VNC 2009: 1-8 - [c37]Levente Buttyán, László Dóra:
An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks. WOWMOM 2009: 1-6 - [i3]Panagiotis Papadimitratos, Levente Buttyán, Tamás Holczer, Elmar Schoch, Julien Freudiger, Maxim Raya, Zhendong Ma, Frank Kargl, Antonio Kung, Jean-Pierre Hubaux:
Secure Vehicular Communication Systems: Design and Architecture. CoRR abs/0912.5391 (2009) - [i2]Frank Kargl, Panagiotis Papadimitratos, Levente Buttyán, Michael Müter, Björn Wiedersheim, Elmar Schoch, Ta Vinh Thong, Giorgio Calandriello, Albert Held, Antonio Kung, Jean-Pierre Hubaux:
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges. CoRR abs/0912.5393 (2009) - 2008
- [j16]Panagiotis Papadimitratos, Levente Buttyán, Tamás Holczer, Elmar Schoch, Julien Freudiger, Maxim Raya, Zhendong Ma, Frank Kargl, Antonio Kung, Jean-Pierre Hubaux:
Secure vehicular communication systems: design and architecture. IEEE Commun. Mag. 46(11): 100-109 (2008) - [j15]Frank Kargl, Panagiotis Papadimitratos, Levente Buttyán, Michael Müter, Elmar Schoch, Björn Wiedersheim, Ta Vinh Thong, Giorgio Calandriello, Albert Held, Antonio Kung, Jean-Pierre Hubaux:
Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Commun. Mag. 46(11): 110-118 (2008) - [c36]Levente Buttyán, László Czap, István Vajda:
Securing coding based distributed storage in wireless sensor networks. MASS 2008: 821-827 - 2007
- [j14]Levente Buttyán, Jean-Pierre Hubaux, Li Li, Xiang-Yang Li, Tim Roughgarden, Alberto Leon-Garcia:
Guest Editorial Non-Cooperative Behavior in Networking. IEEE J. Sel. Areas Commun. 25(6): 1065-1068 (2007) - [c35]Levente Buttyán, Tamás Holczer, István Vajda:
On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. ESAS 2007: 129-141 - [c34]Gergely Ács, Levente Buttyán, István Vajda:
The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks. MASS 2007: 1-6 - [c33]Levente Buttyán, Péter Schaffer:
PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks. MASS 2007: 1-9 - [c32]Gildas Avoine, Levente Buttyán, Tamás Holczer, István Vajda:
Group-Based Private Authentication. WOWMOM 2007: 1-6 - [c31]Levente Buttyán, László Dóra, Márk Félegyházi, István Vajda:
Barter-based cooperation in delay-tolerant personal wireless networks. WOWMOM 2007: 1-6 - 2006
- [j13]Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán:
Mobility Helps Peer-to-Peer Security. IEEE Trans. Mob. Comput. 5(1): 43-51 (2006) - [j12]Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson:
Node Cooperation in Hybrid Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(4): 365-376 (2006) - [j11]Márk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán:
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(5): 463-476 (2006) - [j10]Gergely Ács, Levente Buttyán, István Vajda:
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 5(11): 1533-1546 (2006) - [c30]Levente Buttyán, Péter Schaffer, István Vajda:
Resilient Aggregation with Attack Detection in Sensor Networks. PerCom Workshops 2006: 332-336 - [c29]Levente Buttyán, Tamás Holczer, István Vajda:
Optimal Key-Trees for Tree-Based Private Authentication. Privacy Enhancing Technologies 2006: 332-350 - [c28]Gergely Ács, Levente Buttyán, István Vajda:
Modelling adversaries and security objectives for routing protocols in wireless sensor networks. SASN 2006: 49-58 - [c27]Levente Buttyán, Péter Schaffer, István Vajda:
RANBAR: RANSAC-based resilient aggregation in sensor networks. SASN 2006: 83-90 - [e1]Levente Buttyán, Virgil D. Gligor, Dirk Westhoff:
Security and Privacy in Ad-Hoc and Sensor Networks, Third European Workshop, ESAS 2006, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4357, Springer 2006, ISBN 978-3-540-69172-3 [contents] - 2005
- [j9]István Zsolt Berta, Levente Buttyán, István Vajda:
A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals. IEEE Trans. Dependable Secur. Comput. 2(3): 268-272 (2005) - [c26]Levente Buttyán, Tamás Holczer, Péter Schaffer:
Spontaneous Cooperation in Multi-domain Sensor Networks. ESAS 2005: 42-53 - [c25]Gergely Ács, Levente Buttyán, István Vajda:
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. ESAS 2005: 113-127 - [c24]Levente Buttyán, László Dóra, István Vajda:
Statistical Wormhole Detection in Sensor Networks. ESAS 2005: 128-141 - [c23]Márk Félegyházi, Jean-Pierre Hubaux, Levente Buttyán:
Cooperative Packet Forwarding in Multi-Domain Sensor Networks. PerCom Workshops 2005: 345-349 - 2004
- [j8]Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun:
A formal model of rational exchange and its application to the analysis of Syverson's protocol. J. Comput. Secur. 12(3-4): 551-587 (2004) - [c22]István Zsolt Berta, Levente Buttyán, István Vajda:
Privacy Protecting Protocols for Revocable Digital Signatures. CARDIS 2004: 67-81 - [c21]István Zsolt Berta, Levente Buttyán, István Vajda:
Mitigating the Untrusted Terminal Problem Using Conditional Signatures. ITCC (1) 2004: 12-16 - [c20]Levente Buttyán, István Vajda:
Towards provable security for ad hoc routing protocols. SASN 2004: 94-105 - [i1]Gergely Ács, Levente Buttyán, István Vajda:
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks. IACR Cryptol. ePrint Arch. 2004: 159 (2004) - 2003
- [j7]Felix C. Gärtner, Levente Buttyán, Klaus Kursawe:
Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back. IEEE Distributed Syst. Online 4(9) (2003) - [j6]Levente Buttyán, Jean-Pierre Hubaux:
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Mob. Networks Appl. 8(5): 579-592 (2003) - [j5]Levente Buttyán, Jean-Pierre Hubaux:
Report on a working session on security in wireless ad hoc networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(1): 74-94 (2003) - [j4]Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux:
Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 2(1): 52-64 (2003) - [c19]Felix C. Gärtner, Klaus Kursawe, Levente Buttyán:
PoDSy 2003: Principles of Dependable Systems. DSN 2003: 763 - [c18]Markus Jakobsson, Jean-Pierre Hubaux, Levente Buttyán:
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks. Financial Cryptography 2003: 15-33 - [c17]Márk Félegyházi, Levente Buttyán, Jean-Pierre Hubaux:
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case. PWC 2003: 776-789 - [c16]Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson:
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. MobiHoc 2003: 13-24 - [c15]Srdjan Capkun, Jean-Pierre Hubaux, Levente Buttyán:
Mobility helps security in ad hoc networks. MobiHoc 2003: 46-56 - [c14]Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux:
SECTOR: secure tracking of node encounters in multi-hop wireless networks. SASN 2003: 21-32 - 2002
- [c13]Levente Buttyán, Jean-Pierre Hubaux, Srdjan Capkun:
A Formal Analysis of Syverson?s Rational Exchange Protocol. CSFW 2002: 193-205 - [c12]Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux:
Small worlds in security systems: an analysis of the PGP certificate graph. NSPW 2002: 28-35 - 2001
- [j3]Ljubica Blazevic, Levente Buttyán, Srdjan Capkun, Silvia Giordano, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Self-organization in mobile ad hoc networks: the approach of Terminodes. IEEE Commun. Mag. 39(6): 166-174 (2001) - [c11]Levente Buttyán, Naouel Ben Salem:
A Payment Scheme for Broadcast Multimedia Streams. ISCC 2001: 669-673 - [c10]Jean-Pierre Hubaux, Levente Buttyán, Srdjan Capkun:
The quest for security in mobile ad hoc networks. MobiHoc 2001: 146-155 - [c9]Levente Buttyán, Jean-Pierre Hubaux:
Rational Exchange - A Formal Model Based on Game Theory. WELCOM 2001: 114-126 - 2000
- [j2]Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán:
A Pessimistic Approach to Trust in Mobile Agent Platforms. IEEE Internet Comput. 4(5): 40-48 (2000) - [j1]Levente Buttyán, Constant Gbaguidi, Sebastian Staamann, Uwe G. Wilhelm:
Extensions to an authentication technique proposed for the global mobility network. IEEE Trans. Commun. 48(3): 373-376 (2000) - [c8]Levente Buttyán, Jean-Pierre Hubaux:
Enforcing service availability in mobile ad-hoc WANs. MobiHoc 2000: 87-96 - [c7]Jean-Pierre Hubaux, Jean-Yves Le Boudec, Silvia Giordano, Maher Hamdi, Ljubica Blazevic, Levente Buttyán, Milan Vojnovic:
Towards mobile ad-hoc WANs: terminodes. WCNC 2000: 1052-1059
1990 – 1999
- 1999
- [c6]Sebastian Staamann, Levente Buttyán, Allan Coignet, Ernesto Ruggiano, Uwe G. Wilhelm, Marc Zweiacker:
Closed user groups in Internet service centres. DAIS 1999: 439- - [c5]Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán:
Introducing Trusted Third Parties to the Mobile Agent Paradigm. Secure Internet Programming 1999: 469-489 - [c4]Levente Buttyán, Jean-Pierre Hubaux:
Accountable Anonymous Access to Services in Mobile Communication Systems. SRDS 1999: 384-389 - 1998
- [c3]Levente Buttyán, Sebastian Staamann, Uwe G. Wilhelm:
A Simple Logic for Authentication Protocol Design. CSFW 1998: 153-162 - [c2]Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán:
Protecting the Itinerary of Mobile Agents. ECOOP Workshops 1998: 301 - [c1]Uwe G. Wilhelm, Sebastian Staamann, Levente Buttyán:
On the Problem of Trust in Mobile Agent Systems. NDSS 1998
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint