2016

T. Holczer, A. Gazdag, Gy. Miru

Intrusion detection in Cyber Physical Systems Based on Process Modelling

Proceedings of 16th European Conference on Cyber Warfare & Security, Academic conferences, 2016.
( Abstract, PDF, Bibtex )

2015

G. Ács-Kurucz, G. Molnár, G. Vaspöri, R. Kamarás, L. Buttyán, B. Bencsáth

Duqu 2.0:A comparison to Duqu

BME CrySyS Lab, http://www.crysys.hu/duqu2/duqu2.pdf, 2015.
( Bibtex )

D. Papp, B. Kócsó, T. Holczer, L. Buttyán, B. Bencsáth

ROSCO: Repository of signed code

Virus Bulletin, 2015.
( PDF, Bibtex )

T. Holczer, M. Felegyhazi, L. Buttyán

The design and implementation of a PLC honeypot for detecting cyber attacks against industrial control systems

Proceedings of International Conference on Computer Security in a Nuclear World: Expert Discussion and Exchange, IAEA, 2015.
( PDF, Bibtex )

2014

K Szücs, T. Holczer, A. Kiss

Adatbányászat az informatikai biztonságban

INFODIDACT konferencia, 2014, Webdidaktika Alapítvány, ISBN: 9789631206272.
( Bibtex )

B. Bencsáth, L. Buttyán, Z. Balázs, G. Ács-Kurucz, G. Molnár, G. Vaspöri, R. Kamarás

An independent test of APT attack detection appliances

MRG Effitas and BME CrySyS Lab, https://blog.mrg-effitas.com/wp-content/uploads/2014/11/Crysys_MRG_APT_detection_test_2014.pdf, 2014.
( Bibtex )

D. Buza, F. Juhasz, Gy. Miru, M. Felegyhazi, T. Holczer

CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot

in Proceedings of SmartGridSec 2014, February 26, 2014.
( Abstract, PDF, Bibtex )

D. Buza, F. Juhasz, Gy. Miru, M. Felegyhazi, T. Holczer

Kiss Natália Nagy Bálint Németh István Péter (Eds),

Tudományos terek

CryPLH: Intelligens ipari rendszerek célzott támadások elleni védelme PLC honeyp, pp. 9-20, DUF Press, 2014, ISBN: 9789632870755.
( Bibtex )

2013

P. Schöttle, A. Laszka, B. Johnson, J. Grossklags, R. Böhme

A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding

21st European Signal Processing Conference (EUSIPCO 2013), 2013, September.
( Abstract, Bibtex )

A. Laszka, B. Johnson, J. Grossklags

A Game-Theoretic Approach to Risk Mitigation Against Targeted and Non-Targeted Covert Attacks

4th Conference on Decision and Game Theory for Security (GameSec 2013), 2013, November, (accepted).
( Bibtex )

G. Pék, L. Buttyán, B. Bencsáth

A Survey of Security Issues in Hardware Virtualization

ACM Computing Surveys (CSUR), vol. 45 , no. 3, June , 2013, doi:10.1145/2480741.2480757.
( Abstract, Bibtex )

B. Johnson, P. Schöttle, A. Laszka, J. Grossklags, R. Böhme

Bitspotting: Detecting Optimal Adaptive Steganography

12th International Workshop on Digital-Forensics and Watermarking (IWDW), 2013, October.
( Bibtex )

A. Laszka, L. Buttyán, D. Szeszlér

Designing Robust Network Topologies for Wireless Sensor Networks in Adversarial Environments

Pervasive and Mobile Computing, Elsevier, vol. 9, no. 4, August, 2013, pp. 546 - 563, (http://dx.doi.org/10.1016/j.pmcj.2012.05.001).
( Abstract, Bibtex )

G. Pék

eNeMI: Evading the state-of-the-art hardware protection of I/O virtualization

Presentation at Hactivity Conference, October, 2013.
( Abstract, Bibtex )

G. Gy. Gulyás, S. Imre

Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation

In: Proc. of the 14th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS 2013), 2013, Springer, September.
( Abstract, Bibtex )

G. Pék

Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts

Xen Security Advisory CVE-2013-3495 / XSA-59, 2013.
( Abstract, Bibtex )

A. Laszka, B. Johnson, P. Schöttle, J. Grossklags, R. Böhme

Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats

The 18th European Symposium on Research in Computer Security (ESORICS 2013) , 2013, September.
( Abstract, Bibtex )

A. Laszka, B. Johnson, J. Grossklags

Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks

9th Conference on Web and Internet Economics (WINE), 2013, December.
( Bibtex )

T. V. Thong, L. Buttyán, A. Dvir

On formal and automatic security verification of WSN transport protocols

ISRN Sensor Networks Journal, Hindawi, December, 2013, In Press.
( Bibtex )

A. Laszka, A. Gueye

Quantifying All-to-One Network Topology Robustness Under Budget Constraints

The joint Workshop on Pricing and Incentives in Networks and Systems, 2013, June.
( Abstract, Bibtex )

A. Laszka, A. Gueye

Quantifying Network Topology Robustness Under Budget Constraints: General Model and Computational Complexity

4th Conference on Decision and Game Theory for Security (GameSec 2013), 2013, November, (accepted).
( Bibtex )

B. Károly, Á. M. Földes, G. Gy. Gulyás, S. Imre

Katalin Tarnay, Lai Xu, Sandor Imre,

Research and Development in E-Business through Service-Oriented Solutions

Tracking and Fingerprinting in E-Business: New Storageless Technologies and Coun, pp. 134-166, IGI Global, 2013.
( Abstract, Bibtex )

A. Dvir, L. Buttyán, T. V. Thong

SDTP+: Securing a Distributed Transport Protocol for WSNs using Merkle Trees and Hash Chains

IEEE International Confenrence on Communications (ICC), 2013, pp. 1-6, Budapest, Hungary, June.
( Abstract, Bibtex )

G. Pék, B. Bencsáth, L. Buttyán, M. Felegyhazi

Technical Trends in Recent Targeted Attacks

Presentation at Power of Community (POC 2013, Seoul, South Korea), November, 2013.
( Bibtex )

2012

G. Kótyuk, L. Buttyán

A Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks

Proceedings of the IEEE Workshop on SEcurity and SOCial Networking (SESOC), IEEE, IEEE, Lugano, Switzerland, March, 2012, pp. 1-6.
( Abstract, PDF, Bibtex )

A. Laszka, M. Felegyhazi, L. Buttyán

A Survey of Interdependent Security Games

no. CRYSYS-TR-2012-11-15, CrySyS Lab, BME, Nov, 2012.
( Abstract, PDF, Bibtex )

A. Grilo, A. Casaca, P. Pereira, L. Buttyán, J. Goncalves, C. Fortunato

A Wireless Sensor and Actuator Network for Improving the Electrical Power Grid Dependability

Euro-NF Conference on Next Generation Internet (NGI), IEEE, 2012.
( Abstract, PDF, Bibtex )

B. Bencsáth, G. Pék, L. Buttyán, M. Felegyhazi

Célzott informatikai támadások napjainkban

Budapest New Tech Meetup, Budapest, Hungary., December, 2012.
( Bibtex )

P. Langendoerfer, L. Buttyán, A. Casaca, E. Osipov, A. Hessler, C. Castelluccia, A. Alkassar

F. Flammini (ed),

Critical Infrastructure Security: Assessment, Prevention, Detection, Response

Wireless Sensor Networks for Critical Infrastructure Protection, pp. 155-167, WIT Press, 2012.
( Bibtex )

L. Buttyán, B. Bencsáth

Cryptography: The strongest link in the chain

Hackin9 Extra, vol. 8, no. 1, January, 2012, pp. 8-11.
( Abstract, PDF, Bibtex )

G. Gy. Gulyás, R. Schulcz, S. Imre

Dr Raj Sharman, Dr. Sanjukta Das Smith, Manish Gupta,

Digital Identity and Access Management: Technologies and Frameworks

Separating Private and Business Identities, pp. 114-132, IGI Global, 2012.
( Abstract, Bibtex )

B. Bencsáth, L. Buttyán, M. Felegyhazi, G. Pék

Duqu, Flame, Gauss - new challenges for a new era

EuroNOG 2012 conference, Budapest, 10-11 Sept 2012, September, 2012.
( Bibtex )

B. Bencsáth, G. Pék, L. Buttyán, M. Felegyhazi

Duqu: Analysis, Detection, and Lessons Learned

ACM European Workshop on System Security (EuroSec), ACM, 2012.
( Abstract, PDF, Bibtex )

A. Laszka, D. Szeszlér, L. Buttyán

Game-theoretic Robustness of Many-to-one Networks

3rd International Conference on Game Theory for Networks (GameNets), 2012, May.
( Abstract, Bibtex )

A. Laszka, D. Szeszlér, L. Buttyán

Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality

3rd Conference on Decision and Game Theory for Security (GameSec 2012), LNCS , November, 2012, pp. 152-170, Volume 7638.
( Abstract, Bibtex )

G. Gy. Gulyás, S. Imre

Measuring Local Topological Anonymity in Social Networks

In: Privacy in Social Data Workshop in conjunction with the 11th IEEE International Conference on Data Mining, IEEE, Brussels, Belgium, December, 2012, pp. 563-570.
( Abstract, Bibtex )

T. V. Thong, L. Buttyán

Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases

9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus), Springer LNCS, July, 2012, pp. 1-15.
( Abstract, Bibtex )

P. Schaffer, K. Farkas, Á. Horváth, T. Holczer, L. Buttyán

Secure and Reliable Clustering in Wireless Sensor Networks: A Critical Survey

accepted for publication in Elsevier Computer Networks, 2012.
( Abstract, Bibtex )

B. Bencsáth, G. Pék, L. Buttyán, M. Felegyhazi

sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks

In collaboration with the sKyWIper Analysis Team , 2012.
( PDF, Bibtex )

B. Bencsáth, G. Pék, L. Buttyán, M. Felegyhazi

Targeted attacks against Critical infrastructure: Stuxnet and beyond

SCADA and Smart Grid Cyber Security Summit, 26-27 April 2012, April, 2012, London.
( Bibtex )

B. Bencsáth, L. Buttyán, G. Pék, M. Felegyhazi

Targeted Attacks of Recent Times

Kaspersky SAS 2012 - Security Analyst Summit, Cancun, Mexico, February, 2012.
( Bibtex )

B. Bencsáth, L. Buttyán, G. Pék, M. Felegyhazi

Technical analysis and information sharing in the handling of high-profile targeted attacks

2012 Workshop on Cyber Security and Global Affairs and Global Security Forum, 1-3 June 2012, June, 2012, Barcelona, Spain.
( Bibtex )

T. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, V. Paxson

The BIZ Top-Level Domain: Ten Years Later

in Proceedings of Passive Active Measurements (PAM 2012), PAM 2012, Vienna, Austria, March 12-14, 2012.
( Abstract, Bibtex )

L. Buttyán, B. Bencsáth, G. Pék, M. Felegyhazi

The cousins of Stuxnet: Duqu, Flame, Gauss, …

ISCD 2012, Balatonöszöd, 3-4 Sep., September, 2012.
( Bibtex )

B. Bencsáth, G. Pék, L. Buttyán, M. Felegyhazi

The Cousins of Stuxnet: Duqu, Flame, and Gauss

Future Internet 2012, 4(4), doi:10.3390/fi4040971, 2012, pp. 971-1003, doi:10.3390/fi4040971, http://www.mdpi.com/journal/futureinternet/special_issues/stuxnet.
( Abstract, Bibtex )

L. Buttyán, T. Holczer

Traffic Analysis Attacks and Countermeasures in Wireless Body Area Sensor Networks

IEEE Workshop on Data Security and Privacy in Wireless Networks (D-SPAN), IEEE, June, 2012.
( Abstract, PDF, Bibtex )

2011

B. Bencsáth, G. Pék, L. Buttyán, M. Felegyhazi

Duqu: A Stuxnet-like malware found in the wild

BME CrySyS Lab., October, 2011., First published in cut-down form as appendix to the Duqu report of Symantec.
( Bibtex )

B. Bencsáth, L. Buttyán

Targeted attacks of recent days

Kiberbiztonsági Konferencia, ZMNE, November 25, 2011..
( PPT, Bibtex )

L. Buttyán, A. Grilo

A Secure Distributed Transport Protocol for Wireless Sensor Networks

Proceedings of the IEEE International Confenrence on Communications (ICC), IEEE, Kyoto, Japan, June 5-9, 2011, pp. 1-6.
( Abstract, Bibtex )

G. Gy. Gulyás, S. Imre

Analysis of Identity Separation Against a Passive Clique-Based De-anonymization Attack

Infocommunications journal, vol. 4, no. 3, December, 2011, pp. 11-20.
( Abstract, Bibtex )

T. Holczer, L. Buttyán

Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks

International Journal of Distributed Sensor Networks, 2011, pp. 1-18, Article ID 828414.
( Abstract, PDF, Bibtex )

A. Dvir, L. Buttyán

Backpressure Approach for Bypassing Jamming Attacks in Wireless Sensor Networks

IEEE INFOCOM, Demo/Posters, Shanghai, China, April 11-15, 2011, pp. 1.
( Abstract, PDF, Bibtex )

L. Buttyán, M. Felegyhazi, B. Bencsáth

CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap

Proceedings of the First SysSec Workshop SysSec 2011, SysSec, Amsterdam, The Netherlands, July 6, 2011, pp. 73-76.
( PDF, PPT, Bibtex )

B. Bencsáth, L. Buttyán

Cryptography - the strongest chain element in the practice of cyber security

Kiberbiztonsági Konferencia, ZMNE, November 25, 2011.
( PPT, Bibtex )

L. Buttyán, L. Czap, I. Vajda

Detection and Recovery From Pollution Attacks in Coding Based Distributed Storage Schemes

IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 6, November/December, 2011.
( Abstract, PDF, Bibtex )

L. Buttyán, T. V. Thong

Formal verification of secure ad-hoc network routing protocols using deductive model-checking

Periodica Polytechnica Journal, accepted for publication, 2011.
( Abstract, Bibtex )

G. Pék, B. Bencsáth, L. Buttyán

nEther: In-guest Detection of Out-of-the-guest Malware Analyzers

ACM European Workshop on System Security (EuroSec), ACM, Salzburg, Austria, April 10, 2011, pp. 1-6.
( PDF, PPT, Bibtex )

G. Schwartz, J. Musacchio, M. Felegyhazi, J. Walrand

Network Regulation and Market Entry

GameNets 2011, 2011, , Shanghai, China, April 16-18.
( Abstract, Bibtex )

T. V. Thong, L. Buttyán

On automating the verification of secure ad-hoc network routing protocols

Springer Telecommunication Systems, accepted for publication, 2011, pp. 1-30, Article ID: 10.1007/s11235-011-9592-3.
( Abstract, Bibtex )

H. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, S. Savage

On the Effects of Registrar-level Intervention

In Proceedings of LEET 2011, LEET 2011 (USENIX), Boston, MA, USA, March 29, 2011 .
( Abstract, Bibtex )

A. Laszka, L. Buttyán, D. Szeszlér

Optimal Selection of Sink Nodes in Wireless Sensor Networks in Adversarial Environments

IEEE Workshop on Data Security and Privacy in Wireless Networks (D-SPAN), 2011, pp. 1-6, Lucca, Italy, June 20.
( Abstract, PDF, Bibtex )

B. Bencsáth, L. Buttyán, G. Pék, M. Felegyhazi

Recent advances in targeted malware attacks

Fókuszban a CrySyS Lab. , December 14, 2011.
( Bibtex )

B. Bencsáth, L. Buttyán, G. Pék, M. Felegyhazi

Recent advances in targeted malware attacks

Schönherz - Simonyi Szakkollégium ., December 13, 2011.
( Bibtex )

T. Besenyei, Á. M. Földes, G. Gy. Gulyás, S. Imre

StegoWeb: Towards the Ideal Private Web Content Publishing Tool

In: Proceedings of The Fifth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2011), ThinkMind, Nice, France, August, 2011, pp. 109-114.
( Abstract, Bibtex )

B. Károly, Á. M. Földes, G. Gy. Gulyás, S. Imre

User Tracking on the Web via Cross-Browser Fingerprinting

Information Security Technology for Applications, 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers, Springer, Talinn, Estonia, 2011.
( Abstract, Bibtex )

A. Dvir, T. Holczer, L. Buttyán

VeRA - Version Number and Rank Authentication in RPL

7th IEEE International Workshop on Wireless and Sensor Networks Security, IEEE, Valencia, Spain, October 17-22, 2011, pp. 709 - 714.
( Abstract, PDF, Bibtex )

B. Bencsáth, L. Buttyán, T. Paulik

XCS based hidden firmware modification on embedded devices

Proceedings of the IEEE Conference on Software, Telecommunications and Computer Networks (SoftCom), IEEE, Split-Hvar-Dubrovnik, September 15-17, 2011, pp. 1-6.
( Bibtex )

K. Levchenko, G. M. Voelker, V. Paxson, N. Weaver, A. Pitsillidis, D. McCoy, H. Liu, C. Kreibich, C. Kanich, T. Halvorson, C. Grier, M. Felegyhazi, B. Enright, N. Chachra, S. Savage

Click Trajectories: End-to-End Analysis of the Spam Value Chain

in Proceedings of IEEE Symposium on Security& Privacy (Oakland 2011), IEEE, Oakland, CA, USA, May 22-25, 2011 , pp. 1-16.
( Abstract, Bibtex )

2010

N. Shetty, G. Schwartz, M. Felegyhazi, J. Walrand

Competitive Cyber-Insurance and Internet Security

T. Moore, D. Pym, and C. Ioannidis, editors, Economics of Information Security and Privacy, Springer-Verlag, pages 229-247,, 2010. .
( Abstract, Bibtex )

M. Felegyhazi, C. Kreibich, V. Paxson

On the Potential of Proactive Domain Blacklisting,

at LEET 2010, 2010., San Jose, USA , April 27.
( Abstract, Bibtex )

L. Buttyán, D. Gessner, A. Hessler, P. Langendoerfer

Application of Wireless Sensor Networks in Critical Infrastructure Protection -- Challenges and Design Options

IEEE Wireless Communications Magazine, vol. 17, no. 5, October, 2010, pp. 44 - 49.
( Abstract, Bibtex )

L. Buttyán, L. Dóra, M. Felegyhazi, I. Vajda

Barter Trade Improves Message Delivery in Opportunistic Networks

Elsevier Ad Hoc Networks, vol. 8, no. 1, January 10, 2010, pp. 1-14.
( Abstract, PDF, Bibtex )

T. Paulik, Á. M. Földes, G. Gy. Gulyás

BlogCrypt: Private Content Publishing on the web

In: Proceedings of The Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2010), IEEE, Venice, Italy, July, 2010.
( Abstract, Bibtex )

I. Askoxylakis, B. Bencsáth, L. Buttyán, L. Dóra, V. Siris, A. Traganitis

N. Zorba, C. Skianis, and C. Verikoukis (eds),

Cross-layer security and resilience in wireless mesh networks

Cross Layer Designs in WLAN Systems, Troubador Publishing Ltd, Emerging Communication and Service Technologies Series, 2010.
( Bibtex )

T. Alpcan, L. Buttyán, J. Baras

Decision and Game Theory for Security

vol. LNCS 6442, Springer, 2010.
( Bibtex )

L. Buttyán, L. Dóra, F. Martinelli, M. Petrocchi

Fast Certificate-based Authentication Scheme in Multi-operator maintained Wireless Mesh Networks

Elsevier Computer Communications, vol. 33, April, 2010, pp. 907-922.
( Abstract, PDF, Bibtex )

L. Buttyán, T. V. Thong

Formal verification of secure ad-hoc network routing protocols using deductive model-checking

Proceedings of the IFIP Wireless and Mobile Networking Conference (WMNC), IFIP, Budapest, Hungary, October 18-20, 2010, pp. 1-6.
( Abstract, Bibtex )

L. Dóra, T. Holczer

Hide-and-Lie: Enhancing Application-level Privacy in Opportunistic Networks

In Proceedings of the Second International Workshop on Mobile Opportunistic Networking ACM/SIGMOBILE MobiOpp 2010, Pisa, Italy, February 22-23, 2010.
( Abstract, PDF, Bibtex )

G. Ács, L. Buttyán, L. Dóra

Misbehaving Router Detection in Link-state Routing for Wireless Mesh Networks

In Proceedings of the Second IEEE WoWMoM Workshop on Hot Topics in Mesh Networking (HotMESH'10), Montreal, Canada, June 14-17, 2010.
( Abstract, PDF, Bibtex )

L. Buttyán, P. Schaffer

PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks

International Journal of Distributed Sensor Networks, vol. 2010, no. Article ID 679205, 2010.
( Abstract, Bibtex )

L. Buttyán, T. Holczer

Perfectly Anonymous Data Aggregation in Wireless Sensor Networks

Proceedings of The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2010), IEEE, San Francisco, November 8-12, 2010.
( Abstract, PDF, Bibtex )

L. Buttyán, L. Czap, I. Vajda

Pollution Attack Defense for Coding Based Sensor Storage

Proceedings of the International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), IEEE, California, USA, June 7-9, 2010.
( Abstract, PDF, Bibtex )

L. Czap, I. Vajda

Secure Network Coding in DTNs

IEEE Communications Letters, 2010.
( Abstract, Bibtex )

L. Buttyán, L. Csik

Security Analysis of Reliable Transport Layer Protocols for Wireless Sensor Networks

Proceedings fof the IEEE Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS), IEEE, Seattle, USA, March 21-25, 2010, pp. 1-6.
( Abstract, Bibtex )

B. Bencsáth, Géza Szabó, I. Vajda

Védekezés e-mail-címkinyerõ támadások ellen

Szemelvények az OTKA támogatásával készült alapkutatások újabb eredményeibõl 2, OTKA, 2010, pp. 69-71.
( Bibtex )

R. Böhme, M. Felegyhazi

Optimal Security Investment with Penetration Testing

GameSec 2010, 2010. , Berlin, Germany, Nov 22-23.
( Abstract, Bibtex )

2009

N. Shetty, G. Schwartz, M. Felegyhazi, J. Walrand

Competitive Cyber-Insurance and Internet Security,

in Proceedings of WEIS 2009, WEIS 2009, London, England,, June 24-25 , 2009..
( Abstract, Bibtex )

B. Bencsáth, L. Buttyán, I. Vajda

Security of Communication Networks (In Hungarian)

Híradástechnika, vol. LXIV, August, 2009..
( Bibtex )

L. Buttyán, L. Dóra

An Authentication Scheme for QoS-aware Multi-operator maintained Wireless Mesh Networks

In Proceedings of the First IEEE WoWMoM Workshop on Hot Topics in Mesh Networking (HotMESH'09), IEEE, Kos, Greece, June 15, 2009.
( Abstract, PDF, Bibtex )

L. Buttyán, G. Pék, T. V. Thong

Consistency verification of stateful firewalls is not harder than the stateless case

Infocommunications Journal, vol. LXIV, no. 2009/2-3, March, 2009, pp. 1-8.
( Abstract, PDF, Bibtex )

L. Buttyán, P. Schaffer, I. Vajda

CORA: Correlation-based Resilient Aggregation in Sensor Networks

Elsevier Ad Hoc Networks, vol. 7, no. 6, 2009, pp. 1035-1050.
( Abstract, PDF, Bibtex )

M. Felegyhazi, M. Cagalj, J. P. Hubaux

Efficient MAC in Cognitive Radio Networks: A Game-Theoretic Approach

Transactions on Wireless Communications (TWC), , vol. 8, no. 4, April , 2009.
( Abstract, Bibtex )

G. Gy. Gulyás, R. Schulcz, S. Imre

Modeling Role-Based Privacy in Social Networking Services

In: Proceedings of The Third International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2009), IEEE, Athens, Greece, 2009, pp. 173-178.
( Abstract, Bibtex )

B. Bencsáth

New Approaches to Mitigate Network Denial-of-Service Problems

BME Informatikai Tudományok doktori iskola, November, 2009.
( PDF, Bibtex )

B. Bencsáth, L. Buttyán, I. Vajda

On the security of communication network: now and tomorrow

Infocommunications Journal, vol. LXIV., no. no. 4., 2009, pp. pp. 3-7..
( Bibtex )

L. Buttyán, T. Holczer

Private Cluster Head Election in Wireless Sensor Networks

Proceedings of the Fifth IEEE International Workshop on Wireless and Sensor Networks Security (WSNS'09), IEEE, IEEE, Macau SAR, PRC, October 12 , 2009, pp. 1048-1053.
( Abstract, PDF, Bibtex )

T. Holczer, P. Ardelean, N. Asaj, S. Cosenza, M. Müter, A. Held, B. Wiedersheim, P. Papadimitratos, F. Kargl, D. D. Cock

Secure Vehicle Communication (SeVeCom)

Demonstration. Mobisys, June, 2009.
( PDF, Bibtex )

I. Askoxylakis, B. Bencsáth, L. Buttyán, L. Dóra, V. Siris, D. Szili, I. Vajda

Securing Multi-operator Based QoS-aware Mesh Networks: Requirements and Design Options

Wireless Communications and Mobile Computing (Special Issue on QoS and Security in Wireless Networks), vol. 10, no. 5, 2009, pp. 622-646.
( Abstract, PDF, Bibtex )

L. Buttyán, T. Holczer, A. Weimerskirch, W. Whyte

SLOW: A Practical Pseudonym Changing Scheme for Location Privacy in VANETs

Proceedings of the IEEE Vehicular Networking Conference, IEEE, IEEE, Tokyo, Japan, October 28-29, 2009, pp. 1-8.
( Abstract, PDF, Bibtex )

A. Laszka, Varkonyi-Koczy, A.R., G. Pék, P. Varlaki

Universal Autonomous Robot Navigation Using Quasi Optimal Path Generation

4th IEEE Int. Conf. on Autonomous Robots and Agents (ICARA' 2009), 2009, February.
( Abstract, Bibtex )

2008

M. Raya, M. H. Manshaei, M. Felegyhazi, J. P. Hubaux

Revocation Games in Ephemeral Networks

in Proceedings of ACM CCS , ACM, Alexandria, VA, USA, Oct. 27-31, 2008. .
( Abstract, Bibtex )

G. Pék, A. Laszka, Varkonyi-Koczy, A.R.

An Improved Hybrid Navigation Method

7th Int. Conf. On Global Research and Education in Intelligent Systems (Inter-Akademia' 2008), 2008, September.
( Abstract, Bibtex )

G. Gy. Gulyás, R. Schulcz, S. Imre

Comprehensive Analysis of Web Privacy and Anonymous Web Browsers: Are Next Generation Services Based on Collaborative Filtering?

In: Joint SPACE and TIME Workshops, held by The Joint iTrust and PST Conferences on Privacy, Trust Management and Security, ?, Norway, Trondheim, 2008.
( Abstract, Bibtex )

B. Bencsáth, Géza Szabó, A. Szentgyörgyi

Introduction to the world of botnets (in Hungarian)

Híradástechnika (Pollák-Virág award), vol. LXIII, no. 11, November, 2008, pp. 10-15.
( PDF, Bibtex )

A. Mazloumian, M. H. Manshaei, M. Felegyhazi, J. P. Hubaux

Optimal Pricing Strategy for Wireless Social Community Networks

in Proceedings of the Economics of Networks, Systems, and Computation (NetEcon 2008), NetEcon, Seattle, August 22, 2008.
( Abstract, Bibtex )

L. Buttyán, P. Schaffer

PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks

International Journal of Distributed Sensor Networks, September, 2008.
( Abstract, Bibtex )

P. Papadimitratos, A. Kung, F. Kargl, Z. Ma, M. Raya, J. Freudiger, E. Schoch, T. Holczer, L. Buttyán, J. P. Hubaux

Secure vehicular communication systems: design and architecture

IEEE Communications Magazine, vol. 46, no. 11, November, 2008, pp. 100-109.
( Abstract, PDF, Bibtex )

F. Kargl, A. Kung, A. Held, G. Calandriello, T. V. Thong, B. Wiedersheim, E. Schoch, M. Müter, L. Buttyán, P. Papadimitratos, J. P. Hubaux

Secure vehicular communication systems: implementation, performance, and research challenges

IEEE Communications Magazine, vol. 46, no. 11, November, 2008, pp. 110-118.
( Abstract, PDF, Bibtex )

L. Buttyán, L. Czap, I. Vajda

Securing Coding Based Distributed Storage in Wireless Sensor Networks

IEEE Workshop on Wireless and Sensor Network Security (WSNS), Atlanta, Georgia, USA, September 29-October 2, 2008.
( Abstract, PDF, Bibtex )

L. Buttyán, J. P. Hubaux

Security and Cooperation in Wireless Networks

Cambridge University Press, 2008.
( Bibtex )

L. Buttyán, T. V. Thong

Security API analysis with the spi-calculus

Hiradástechnika, vol. LXIII, January, 2008, pp. 16-21.
( Abstract, PDF, Bibtex )

2007

A. Bohák, L. Buttyán, L. Dóra

An User Authentication Scheme for Fast Handover Between WiFi Access Points

In Proceedings of the Third Annual International Wireless Internet Conference, ACM, Austin, Texas, USA, October 22-23, 2007, pp. 1-6, (invited paper).
( Abstract, PDF, Bibtex )

P. Papadimitratos, L. Buttyán, J. P. Hubaux, F. Kargl, A. Kung, M. Raya

Architecture for Secure and Private Vehicular Communications

Proceedings of the International Conference on ITS Telecommunications (ITST), -, Sophia Antipolis, France, June 6-8, , 2007, pp. 1-6.
( Abstract, Bibtex )

L. Buttyán, L. Dóra, M. Felegyhazi, I. Vajda

Barter-based cooperation in delay-tolerant personal wireless networks

In Proceedings of the First IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications, IEEE Computer Society Press, Helsinki, Finland, June 18 , 2007, pp. 1-6.
( Abstract, PDF, Bibtex )

L. Buttyán, T. V. Thong

Biztonsági API analízis a spi-kalkulussal

Hiradástechnika, vol. LXII/8, August, 2007, pp. 43-49.
( Abstract, PDF, Bibtex )

P. Schaffer, I. Vajda

CORA: Correlation-based Resilient Aggregation in Sensor Networks

In Proceedings of the 10th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), ACM Press, Chania, Crete, Greece, October 22 - 26, 2007.
( Abstract, PDF, Bibtex )

B. Bencsáth, I. Vajda

Efficient Directory Harvest Attacks and Countermeasures

International Journal of Network Security, vol. 5, no. 3, 2007, pp. 264-273.
( Bibtex )

B. Bencsáth, M. A. Rónai

Empirical Analysis of Denial of Service Attack Against SMTP Servers

Proceedings of The 2007 International Symposium on Collaborative Technologies and Systems, IEEE, Orlando, Florida, USA, May 21-25 , 2007, pp. 72-79.
( PDF, PPT, Bibtex )

G. Avoine, L. Buttyán, T. Holczer, I. Vajda

Group-Based Private Authentication

In Proceedings of the International Workshop on Trust, Security, and Privacy for Ubiquitous Computing (TSPUC 2007), IEEE, Helsinki, Finland, Jun 18 , 2007.
( Abstract, PDF, Bibtex )

L. Buttyán, T. Holczer, I. Vajda

On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs

In Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS2007), Springer, Cambridge, UK, July 2-3, , 2007.
( Abstract, PDF, Bibtex )

L. Buttyán, P. Schaffer

PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks

In Proceedings of the 4th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), IEEE Press, Pisa, Italy, October 8-11, 2007.
( Abstract, PDF, Bibtex )

G. Ács, L. Buttyán

Secure Routing in Wireless Sensor Networks

in J. Lopez and J. Zhou (eds.): Wireless Sensor Network Security (Cryptology and Information Security Series), IOS Press, 2007.
( Abstract, Bibtex )

L. Buttyán, V. Gligor, D. Westhoff

Security and Privacy in Ad Hoc and Sensor Networks

vol. LNCS 4357, Springer, 2007.
( Bibtex )

G. Ács, L. Buttyán, I. Vajda

The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks

October 8-11, In Proceedings of the 3rd IEEE Workshop on Wireless and Sensor Networks Security (WSNS 2007), IEEE Press, Pisa, Italy, 2007.
( Abstract, PDF, Bibtex )

2006

G. Ács, L. Buttyán

A taxonomy of routing protocols for wireless sensor networks

Híradástechnika, December, 2006.
( Abstract, Bibtex )

I. Zs. Berta

How to accept an electronic signature?

Híradástechnika, 2006, vol. LXI, 2006, in Hungarian.
( Abstract, Bibtex )

B. Bencsáth, I. Vajda

Internet Denial of Service attacks in game theoretical model (in hungarian)

Alkalmazott Matematikai Lapok 23, 2006, pp. 335-348..
( Abstract, Bibtex )

G. Ács, L. Buttyán, I. Vajda

Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks

In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'06), October, 2006.
( Abstract, PDF, Bibtex )

L. Buttyán, T. Holczer, I. Vajda

Optimal Key-Trees for Tree-Based Private Authentication

In Proceedings of the International Workshop on Privacy Enhancing Technologies (PET), June, 2006, Springer.
( Abstract, PDF, Bibtex )

Géza Szabó, B. Bencsáth

Protection against DHA attack with central filtering (in hungarian)

Híradástechnika, vol. LXI, 05, 2006, pp. pp. 2-9.
( Bibtex )

G. Ács, L. Buttyán, I. Vajda

Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks

IEEE Transactions on Mobile Computing, vol. 5, no. 11, 2006.
( Abstract, Bibtex )

L. Buttyán, T. Holczer, I. Vajda

Providing Location Privacy in Automated Fare Collection Systems

In Proceedings of the 15th IST Mobile and Wireless Communication Summit, Mykonos, Greece, June, 2006.
( PDF, Bibtex )

L. Buttyán, P. Schaffer, I. Vajda

RANBAR: RANSAC-Based Resilient Aggregation in Sensor Networks

In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), ACM Press, Alexandria, VA, USA, October, 2006.
( Abstract, PDF, Bibtex )

L. Buttyán, P. Schaffer, I. Vajda

Resilient Aggregation with Attack Detection in Sensor Networks

Second IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS), IEEE Computer Society Press, Pisa, Italy, March, 2006.
( Abstract, PDF, Bibtex )

L. Buttyán, P. Schaffer, I. Vajda

Resilient Aggregation: Statistical Approaches

Chapter 10, in N.P.Mahalik (ed.): Sensor Networks and Configuration, Springer, 2006.
( Abstract, PDF, Bibtex )

T. Leinmueller, L. Buttyán, J. P. Hubaux, F. Kargl, P. Papadimitratos, M. Raya, E. Schoch

SEVECOM - Secure Vehicle Communication

IST Mobile Summit, ??, June, 2006.
( Abstract, Bibtex )

Géza Szabó, B. Bencsáth

Statistical analysis of the results of the DHA protection system (in hungarian)

Proceedings of Networkshop 2006 conference, NIIF, 2006.
( Abstract, PDF, Bibtex )

G. Ács, L. Buttyán

Útvonalválasztó protokollok vezeték nélküli szenzorhálózatokban

Híradástecnika, November, 2006.
( Abstract, Bibtex )

L. Buttyán, L. Dóra

WiFi biztonság - A jó, a rossz, és a csúf

Híradástechnika, May, 2006.
( Abstract, PDF, Bibtex )

2005

I. Zs. Berta, L. Buttyán, I. Vajda

A framework for the revocation of unintended digital signatures initiated by malicious terminals

IEEE Transactions on Secure and Dependable Computing, vol. (Vol. 2, No. 3), July-September, 2005, pp. 268-272, http://csdl2.computer.org/....
( Abstract, Bibtex )

G. Ács, L. Buttyán, I. Vajda

Ad hoc útvonalválasztó protokollok bizonyított biztonsága

Híradástechnika, March, 2005.
( Abstract, Bibtex )

B. Bencsáth, Géza Szabó

Components to improve the protection against spam and viruses

HSN LAB Workshop, Jun, 2005.
( Abstract, Bibtex )

M. Felegyhazi, J. P. Hubaux, L. Buttyán

Cooperative Packet Forwarding in Multi-Domain Sensor Networks

Proceedings of the First International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS 2005), March, 2005.
( Bibtex )

B. Bencsáth, I. Vajda

Efficient Directory Harvest Attacks

William McQuay and Waleed W. Smari, Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, IEEE, IEEE Computer Society, July, 2005, pp. 62- 68.
( Abstract, PDF, PS, Bibtex )

I. Zs. Berta

Mitigating the attacks of malicious terminals

BME, 2005, http://www.crysys.hu/~isti/phd.
( Abstract, PDF, Bibtex )

S. Capkun, J. P. Hubaux, L. Buttyán

Mobility Helps Peer-to-Peer Security

IEEE Transactions on Mobile Computing, to appear, 2005.
( Bibtex )

M. Felegyhazi, J. P. Hubaux, L. Buttyán

Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks

IEEE Transactions on Mobile Computing, to appear, 2005.
( Bibtex )

N. B. Salem, L. Buttyán, J. P. Hubaux, M. Jakobsson

Node Cooperation in Hybrid Ad hoc Networks

IEEE Transactions on Mobile Computing, to appear, 2005.
( Bibtex )

Géza Szabó, Gábor Szabó

Possible protection methods against DHA attacks by the attackers recognition and centralized ban (in hungarian)

Networkshop 2005 Konferencia, 2005.
( Abstract, PDF, Bibtex )

G. Ács, L. Buttyán, I. Vajda

Provable Security for Ad Hoc Routing Protocols

Híradástechnika, June, 2005.
( Abstract, Bibtex )

G. Ács, L. Buttyán, I. Vajda

Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks

In Proceedings of the Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), Visegrád, Hungary, July 13-14, 2005, 2005.
( Abstract, PDF, Bibtex )

L. Buttyán, T. Holczer, P. Schaffer

Spontaneous Cooperation in Multi-domain Sensor Networks

In Proceedings of the 2nd European Workshop on Security and Privacy in Ad-hoc and Sensor Networks (ESAS), Springer, Visegrád, Hungary, July, 2005.
( Abstract, PDF, Bibtex )

I. Zs. Berta, L. Buttyán, I. Vajda

Standards for Product Security Assessment

Chapter 53, in IT Security Handbook, edited by Hossein Bidgoli, John Wiley and Sons, 2005, (to appear).
( Bibtex )

I. Vajda, L. Buttyán, L. Dóra

Statistical Wormhole Detection in Sensor Networks

Refik Molva, Gene Tsudik, Dirk Westhoff, Lecture Notes in Computer Science, Springer-Verlag GmbH, 2005, pp. Volume 3813/ 2005, pp. 128 - 141, Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005.
( Abstract, PDF, Bibtex )

Gábor Szabó, Géza Szabó

The applied Spam-filtering methods and the Sender ID in Hungary (in hungarian)

Proceedings of Networkshop 2005 conference, 2005.
( Abstract, PDF, Bibtex )

2004

L. Buttyán, J. P. Hubaux, S. Capkun

A Formal Model of Rational Exchange and Its Application to the Analysis of Syverson's Protocol

Journal on Computer Security, vol. 12, no. 3-4, 2004, pp. 551-587.
( Abstract, PDF, PS, Bibtex )

B. Bencsáth, T. Tuzson, B. Tóth, T. Tiszai, G. Szappanos, E. Rigó, Sz. Pásztor, M. Pásztor, P. Papp, P. Orvos, P. Mátó, B. Martos, L. Kún, Z. Kincses, T. Horváth, M. Juhász, B. K. Erdélyi, A. Bogár, G. Vid

Az informatikai hálózati infrastruktúra biztonsági kockázatai és kontrolljai

IHM - MTA-SZTAKI, 2004.
( Abstract, PDF, Bibtex )

B. Bencsáth

Az internetes vírus- és spamvédelem rendszerszemléletben

HISEC 2004 konferencia, 10., 2004, Budapest, in Hungarian.
( Abstract, PDF, PPT, Bibtex )

M. Felegyhazi, J. P. Hubaux, L. Buttyán

Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks -- the Dynamic Case

Proceedings of the 2nd Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2004), March, 2004.
( Bibtex )

I. Zs. Berta, I. Vajda, L. Buttyán, B. Bencsáth, T. Veiland

HUNEID - Hungarian Electronic ID smart card specifications

Ministry of Informatics and Telecommunications (www.ihm.hu), http://www.itktb.hu/engine.aspx?page=showcontent&content=ias, 2004.
( Bibtex )

L. Buttyán, T. Holczer, P. Schaffer

Incentives for Cooperation in Multi-hop Wireless Networks

Híradástechnika, vol. LIX, no. 3, March, 2004, pp. 30--34, (in Hungarian).
( Abstract, PDF, Bibtex )

L. Buttyán, I. Vajda

Kriptográfia és alkalmazásai

Typotex Kiadó, 2004, Budapest, 445p.
( Bibtex )

I. Zs. Berta, I. Vajda

Limitations of humans when using malicious terminals

Tatra Mountains Mathematical Publications, vol. 29, 2004, pp. 1-16.
( Abstract, PDF, Bibtex )

I. Zs. Berta, L. Buttyán, I. Vajda

Mitigating the Untrusted Terminal Problem Using Conditional Signatures

Proceedings of International Conference on Information Technology ITCC 2004, IEEE, Las Vegas, NV, USA, April, 2004.
( Abstract, PDF, Bibtex )

L. Zombik, L. Buttyán

Modelling Location Reveal Attacks in Mobile Systems

Periodica Polytechnica, vol. 48, no. 1-2, 2004, pp. 85-100.
( Bibtex )

I. Zs. Berta, L. Buttyán, I. Vajda

Privacy Protecting Protocols for Revokable Digital Signatures

Proceedings of Cardis 2004, Toulouse, France (to appear), Kluwer, 2004.
( Abstract, PDF, Bibtex )

B. Bencsáth, I. Vajda

Protection Against DDoS Attacks Based On Traffic Level Measurements

Waleed W. Smari, William McQuay, 2004 International Symposium on Collaborative Technologies and Systems, The Society for Modeling and Simulation International, San Diego, CA, USA, January, 2004, pp. 22-28., Simulation series vol 36. no. 1., ISBN 1-56555-272-5.
( Abstract, PDF, PS, Bibtex )

G. Ács, L. Buttyán, I. Vajda

Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks

http://eprint.iacr.org/ under report number 2004/159., March, 2004.
( Abstract, Bibtex )

I. Zs. Berta, B. Bencsáth

Sending authentic messages from malicious terminals

Proceedings of the Networkshop 2004 Conference, NIIF, Hungary, 2004.
( Abstract, Bibtex )

B. Bencsáth

The problems and connections of network virus protection and the protection against denial of service attacks

Proceedings of the Networkshop 2004 Conference, NIIF, Hungary, 2004.
( Abstract, PDF, PPT, Bibtex )

L. Buttyán, I. Vajda

Towards Provable Security for Ad Hoc Routing Protocols

Proceedings of the 2nd ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2004), ACM, October, 2004.
( Bibtex )

B. Bencsáth, I. Vajda

Trap E-mail Address for Combating E-mail Viruses

Proceedings of SoftCOM 2004 12. International conference on software, telecommunications and computer networks, University of Split, October, 2004, pp. 220-224.
( PDF, PS, Bibtex )

I. Zs. Berta

Why are not digital signatures spreading as quickly as it was expected?

MBA dissertation, Buckinghamshire Chilterns University College, Buckinghamshire Business School, Számalk Open Business School, 2004.
( PDF, Bibtex )

2003

N. B. Salem, L. Buttyán, J. P. Hubaux, M. Jakobsson

A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks

4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003), June, 2003.
( Abstract, Bibtex )

B. Bencsáth, L. Buttyán, I. Vajda

A game based analysis of the client puzzle approach to defend against DoS attacks

Proceedings of SoftCOM 2003 11. International conference on software, telecommunications and computer networks, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split, 2003, pp. 763-767.
( Abstract, PDF, PS, Bibtex )

M. Jakobsson, J. P. Hubaux, L. Buttyán

A Micropayment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks

Proceedings of Financial Crypto 2003, La Guadeloupe, January, 2003.
( Abstract, Bibtex )

I. Zs. Berta, I. Vajda

Documents from Malicious Terminals

SPIE's Microtechnologies for the New Millenium 2003, Bioengineered and Bioinspired Systems, Grand Canaria, Spain, 2003.
( Abstract, PDF, Bibtex )

M. Felegyhazi, L. Buttyán, J. P. Hubaux

Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks -- the Static Case

8th International Conference on Personal Wireless Communications (PWC 2003), September, 2003.
( Abstract, PDF, PPT, Bibtex )

F. Gaertner, L. Buttyán, K. Kursawe

From Fault-Tolerance to Security and Back

IEEE Distributed Systems Online, vol. 4, no. 9, 2003.
( Bibtex )

I. Zs. Berta, I. Berta

Hardware and Software Security I

Elektrotechnika, vol. 2003/10, 2003, pp. 4.
( PDF, Bibtex )

I. Zs. Berta, I. Berta

Hardware and Software Security II

Elektrotechnika, vol. 2003/11, 2003, pp. 4.
( PDF, Bibtex )

I. Vajda, L. Buttyán

Lightweight Authentication Protocols for Low-Cost RFID Tags

2nd Workshop on Security in Ubiquitous Computing, in conjunction with Ubicomp 2003, October, 2003.
( Abstract, Bibtex )

I. Vajda, I. Zs. Berta

Limitations of users when using malicious terminals

Third Central European Conference on Cryptography (Tatracrypt'03), 2003.
( Bibtex )

S. Capkun, J. P. Hubaux, L. Buttyán

Mobility Helps Security in Ad Hoc Networks

4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003), June, 2003.
( Abstract, Bibtex )

L. Buttyán, J. P. Hubaux

Report on a Working Session on Security in Wireless Ad Hoc Networks

ACM Mobile Computing and Communications Review (MC2R), vol. 7, no. 1, March, 2003.
( PDF, Bibtex )

S. Capkun, L. Buttyán, J. P. Hubaux

SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks

Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003), ACM, October, 2003.
( Abstract, Bibtex )

S. Capkun, L. Buttyán, J. P. Hubaux

Self-Organized Public-Key Management for Mobile Ad Hoc Networks

IEEE Transactions on Mobile Computing, vol. 2, no. 1, January-March, 2003.
( Abstract, Bibtex )

L. Buttyán, J. P. Hubaux

Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks

ACM/Kluwer Mobile Networks and Applications, vol. 8, no. 5, October, 2003.
( PDF, Bibtex )

2002

L. Buttyán, S. Capkun, J. P. Hubaux

A Formal Analysis of Syverson`s Rational Exchange Protocol

Proceedings of IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, June, 2002.
( Abstract, PDF, Bibtex )

B. Bencsáth, I. Vajda

A game theoretical approach to optimizing of protection against DoS attacks

presented on the Second Central European Conference on Cryptography (Hajducrypt), Július, 2002, (no proceedings).
( Bibtex )

B. Bencsáth

CVE-2002-0399

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0399, 2002.
( Abstract, Bibtex )

L. Buttyán, I. Zs. Berta, I. Vajda

Eliminating Man-in-the-Middle attacks of Malicious Terminals

Workshop organised by the IST Coordination Point of the Ministry of Education, Budapest, 2002.
( Abstract, Bibtex )

B. Bencsáth, I. Zs. Berta

Empiric examination of random number generators of smart cards

HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia, BME, 2002.
( PDF, Bibtex )

I. Zs. Berta, Z. Á. Mann

Evaluating Elliptic Curve Cryptography on PC and Smart Card

Periodica Polytechnica, Electrical Engineering, vol. 46/1-2, 2002, pp. 47-75.
( PDF, PS, Bibtex )

I. Vajda

Extraction of random bits for cryptographic purposes

Tatra Mountains Mathematical Publications, vol. 25, 2002, pp. 91-107.
( PS, Bibtex )

I. Verók

Formal Verification of JavaCard Application Security Properties

HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia, Budapest University of Technology and Economics, 2002.
( PDF, Bibtex )

I. Zs. Berta, I. Berta

Hardware and Software Security

Magyar Elektrotechnikai Egyesület XLIX. vándorgyülés, Sopron, 2002.
( Bibtex )

I. Zs. Berta, I. Vajda

Message Authentication using Smart Card and Biometry

Second Central European Conference on Cryptography (HajduCrypt) 2002, Debrecen, Hungary, 2002.
( Abstract, Bibtex )

L. Buttyán, S. Capkun, J. P. Hubaux

Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph

Proceedings of The ACM New Security Paradigms Workshop 2002, Norfolk, Virginia Beach, USA, September, 2002, pp. 8.
( Abstract, PDF, Bibtex )

I. Zs. Berta

The problem of sending authentic messages from insecure terminals

HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia, BME, 2002.
( Bibtex )

2001

I. Verók

A Mobile Agent Bidirectional One-to-Many Communications Framework

BME, 2001.
( Bibtex )

N. B. Salem, L. Buttyán

A Payment Scheme for Broadcast Multimedia Streams

Proceedings of 6th IEEE Symposium on Computers and Communications, Hammamet, Tunisia, July, 2001.
( Abstract, PS, Bibtex )

L. Buttyán

Building Blocks for Secure Services: Authenticated Key Transport and Rational Exchange Protocols

Swiss Federal Institute of Technology (EPFL), December, 2001.
( Abstract, PDF, Bibtex )

I. Verók

Cahoots: A Mobile Agent Bidirectional One-to-Many Communications Framework

Budapest University of Technology and Economics, 2001.
( PDF, Bibtex )

B. Bencsáth, I. Vajda

Collecting randomness from the net

Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security 2001, Kluwer, May, 2001, pp. 105-111.
( Abstract, PDF, PS, Bibtex )

I. Zs. Berta, Z. Á. Mann

Cryptographic application of programmable smart cards

Proceedings of NetWorkshop'2001, 2001.
( PDF, Bibtex )

L. Buttyán, A. Nagy, I. Vajda

Efficient Multi-Party Challenge-Response Protocols for Entity Authentication

Periodica Polytechnica, vol. 45, no. 1, April, 2001, pp. 43-64.
( Abstract, PDF, Bibtex )

L. Buttyán, E. Wiedmer, E. Lauper

Method for transmitting payment information between a terminal and a third equipment

May, 2001, International Patent Application.
( Bibtex )

L. Buttyán, J. P. Hubaux

Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks

no. DSC/2001/001, EPFL-DI-ICA, January, 2001.
( Abstract, PS, Bibtex )

M. Hegedüs

On-line tõzsdei kereskedési adatfeldolgozó rendszer fejlesztése és statisztikai elemzések napon belüli kereskedéshez

BME, 2001.
( Bibtex )

M. Perényi

On-line tõzsdei kereskedési adatfeldolgozó rendszer fejlesztése és statisztikai elemzések napon belüli kereskedéshez

BME, 2001.
( Bibtex )

I. Berta

Programozható chipkártya biztonsági alkalmazásai

BME, 2001.
( Bibtex )

L. Buttyán, J. P. Hubaux

Rational Exchange -- A Formal Model Based on Game Theory

Proceedings of 2nd International Workshop on Electronic Commerce (WELCOM 2001), Heidelberg, Germany, November, 2001.
( Abstract, PS, Bibtex )

I. Zs. Berta

Security of programmable smart cards

Budapest University of Technology and Economics, 2001.
( Abstract, PDF, Bibtex )

L. Blazevic, L. Buttyán, S. Capkun, S. Giordano, J. P. Hubaux, J. Y. Le Boudec

Self-Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes

IEEE Communications Magazine, vol. 39, no. 6, June, 2001.
( Abstract, PS, Bibtex )

L. Buttyán, J. P. Hubaux

Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks

no. DSC/2001/046, EPFL-DI-ICA, August, 2001.
( Abstract, PS, Bibtex )

J. P. Hubaux, L. Buttyán, S. Capkun

The Quest for Security in Mobile Ad Hoc Networks

Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, USA, October, 2001.
( Abstract, PS, Bibtex )

2000

I. Verók

A Decentralized Marketplace Composed of Mobile Intelligent Agents

Scientific student circles (TDK), 2000.
( PDF, Bibtex )

U. Wilhelm, S. Staamann, L. Buttyán

A Pessimistic Approach to Trust in Mobile Agent Platforms

IEEE Internet Computing, vol. 4, no. 5, September, 2000, pp. 40-48.
( PDF, Bibtex )

I. Zs. Berta, Z. Á. Mann

Analysis of public key cryptography based on elliptic curves in smart card and PC environment

Scientific student circles (TDK) 2000, Budapest University of Technology and Economics, 2000.
( Bibtex )

S. Tihanyi

Biztonságos anonim hálózati kommunikációs rendszer

BME, 2000.
( Bibtex )

Design and Analysis of a Bluetooth Network Optimization Algorithm

Students' Scientific Conference, TU Budapest, October, 2000, in Hungarian.
( Abstract, PDF, Bibtex )

L. Buttyán, J. P. Hubaux

Enforcing Service Availability in Mobile Ad-Hoc WANs

Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, USA, August, 2000.
( Abstract, PS, Bibtex )

L. Buttyán, J. P. Hubaux

Enforcing Service Availability in Mobile Ad-Hoc WANs

no. DSC/2000/025, EPFL-DI-ICA, May, 2000.
( Abstract, PDF, Bibtex )

L. Györfi, Á. Jordán, I. Vajda

Exact decoding error probability for slow frequency hopping

European Transactions on Telecommunication, vol. 11, no. 2, March/April, 2000, pp. 183-190.
( Bibtex )

L. Buttyán, C. Gbaguidi, S. Staamann, U. Wilhelm

Extensions to an Authentication Technique Proposed for the Global Mobility Network

IEEE Transactions on Communications, vol. 48, no. 3, March, 2000.
( Abstract, PDF, Bibtex )

Handover Analysis in a Wireless Mobile IP Network

12. Távközlési és Informatikai Hálózatok Szeminárium és Kiállítás, 2000, Sopron, Hungary, October 4-6, in Hungarian.
( Abstract, PDF, Bibtex )

B. Bencsáth, S. Tihanyi

Home-made methods for enhancing network security (in Hungarian)

Magyar Távközlés, vol. X, no. 4, 2000, pp. 22-27..
( PDF, Bibtex )

L. Györfi, S. Gyõri, I. Vajda

Információ- és kódelmélet

Typotex Kiadó, 2000, 376 p..
( Bibtex )

B. Korossy Khayll

Intelligens ügynök az elektronikus kereskedelemban

BME, 2000.
( Bibtex )

L. Buttyán, E. Wiedmer, E. Lauper

Method for securing communications between a terminal and an additional user equipment

September, 2000, International Patent Application.
( Bibtex )

T. Németh

Nyilvános kulcsú kriptográfiai megoldás elektronikus banki szolgáltatásra

BME, 2000.
( Bibtex )

I. Zs. Berta, Z. Á. Mann

Programmable smart cards and their security

Magyar Távközlés, 4, 2000.
( PDF, Bibtex )

L. Buttyán

Removing the financial incentive to cheat in micropayment schemes

IEE Electronics Letters, vol. 36, no. 2, January, 2000, pp. 132-133.
( Abstract, PDF, Bibtex )

B. Bencsáth

Simple, free encrypted tunnels using linux

Presented on Networkshop 2000, Gödöllõ, Hungary, 2000, http://nws.iif.hu/NwScd/docs/nevjegy/nj74.htm.
( Bibtex )

Smart Card technológiát alkalmazó Internetes fizetési rendszer

BME, 2000.
( Bibtex )

I. Zs. Berta, Z. Á. Mann

Smart Cards - Present and Future

Híradástechnika, Journal on C5, 12, 2000.
( PDF, Bibtex )

I. Vajda, B. Bencsáth, A. Bognár

Tanulmány a napvilágra került Elender jelszavakról

Apr., 2000.
( Abstract, Bibtex )

J. P. Hubaux, J. Y. Le Boudec, S. Giordano, M. Hamdi, L. Blazevic, L. Buttyán, M. Vojnovic

Toward Mobile Ad-Hoc WANs: Terminodes

no. DSC/2000/006, EPFL-DI-ICA, February, 2000.
( Abstract, PDF, Bibtex )

Gy. Miklós, M. Felegyhazi

Traffic Dependent Bluetooth Scatternet Optimization Procedure

US patent, May, 2000, Nr: 09/666529.
( Bibtex )

B. Bencsáth

Virtuális magánhálózatok kiépítése és auditálása

BME, 2000.
( Bibtex )

1999

L. Buttyán, J. P. Hubaux

Accountable Anonymous Access to Services in Mobile Communication Systems

Proceedings of 18th IEEE Symposium on Reliable Distributed Systems, Workshop on Electronic Commerce, Lausanne, Switzerland, October, 1999, pp. 384-389.
( Abstract, PS, Bibtex )

L. Buttyán, J. P. Hubaux

Accountable Anonymous Service Usage in Mobile Communication Systems

no. SSC/99/16, EPFL-DI-ICA, May, 1999.
( Abstract, PS, Bibtex )

M. Felegyhazi, Cs. Szabó, V. Tímár

An Experimental Analysis of Mobile IP in a Wireless Environment

Students' Scientific Conference, TU Budapest, October, 1999, in Hungarian.
( Abstract, PDF, Bibtex )

L. Buttyán, S. Staamann, A. Coignet, E. Ruggiano, U. Wilhelm, M. Zweiacker

Closed User Groups in Internet Service Centres

Proceedings of DAIS`99, Helsinki, June, 1999.
( Abstract, PS, Bibtex )

B. Bencsáth

CVE-1999-1496

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1496, 1999.
( Abstract, Bibtex )

L. Buttyán

Formal methods in the design of cryptographic protocols (state of the art)

no. SSC/1999/38, EPFL-DI-ICA, November, 1999.
( Abstract, PS, Bibtex )

D. Labanc

Internetes értékpapír-megbízásokat kezelõ rendszer

1999.
( Bibtex )

U. Wilhelm, S. Staamann, L. Buttyán

Introducing Trusted Third Parties to the Mobile Agent Paradigm

in J. Vitek, C. Jensen: Proceedings of Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer-Verlag (LNCS 1603), 1999.
( Abstract, PS, Bibtex )

S. Staamann, U. Wilhelm, L. Buttyán

Multilateral Security in Middleware Based Telecommunications Architectures

in G. Mueller, K. Rannenberg, Proceedings of Multilateral Security in Communications, Addison-Wesley, 1999.
( Abstract, PS, Bibtex )

I. Zs. Berta, Z. Á. Mann

Possibilities of authenticity using intelligent smart card

Scientific student circles (TDK) 1999, Budapest University of Technology and Economics, 1999.
( Abstract, PDF, Bibtex )

B. Bencsáth, S. Tihanyi

Problem areas of the security aspects of network operating systems

Scientific student groups (TDK) 1999, 1999.
( PDF, Bibtex )

I. Kiss

SmartCardos mobiltelefonokkal megvalósított biztonságos elektronikus fizetõeszköz

BME, 1999.
( Bibtex )

L. Buttyán, J. P. Hubaux

Toward a Formal Model of Fair Exchange - a Game Theoretic Approach

no. SSC/1999/39, EPFL-DI-ICA, December, 1999.
( Abstract, PDF, Bibtex )

1998

C. Gbaguidi, S. Staamann, U. Wilhelm, L. Buttyán

A Note on an Authentication Technique Based on Distributed Security Management for the Global Mobility Network

no. SSC/98/18, EPFL-DI-ICA, April, 1998.
( Abstract, PS, Bibtex )

L. Buttyán, S. Staamann, U. Wilhelm

A Simple Logic for Authentication Protocol Design

Proceedings of IEEE Computer Security Foundations Workshop, Rockport, MA, USA, June, 1998, pp. 153-162.
( Abstract, PS, Bibtex )

L. Györfi, I. Vajda

Analysis of Protocol Sequences for Slow Frequency Hopping

Wireless Networks, vol. 4, 1998, pp. 411-418.
( Bibtex )

S. Csibi, L. Györfi, I. Vajda

Analysis of Protocol Sequences for Slow Frequency Hopping

Proceedings of the 1998 International Zürich Seminar on Broadband Communication (IEEE Catalog No.98TH8277), 1998, pp. 237-242.
( Bibtex )

S. Staamann, U. Wilhelm, L. Buttyán

CrySTINA: Security in the Telecommunications Information Networking Architecture

no. SSC/98/4, EPFL-DI-ICA, January, 1998.
( Abstract, PS, Bibtex )

Á. Csernitzky

Internetes telebanki szolgáltatás és a szerver oldali adatbiztonsága

BME, 1998.
( Bibtex )

Á. Jordán, I. Vajda

On the distribution of Hamming correlation of cyclically permutable subsets of RS codes

Proceedings of the II. International Workshop on Optimal Codes'98, Sazopol,Bulgaria, June 9-15, 1998, pp. 144-150.
( Bibtex )

Á. Jordán, I. Vajda

On the Hamming correlation distribution of SFH signature sequence sets

roceedings of the IEEE ISSSTA '98 (IEEE Fifth International Symposium on Spread Sectrum Techniques & Applications), Sun City, South Africa, September 2-4, 1998, pp. 676-680.
( Bibtex )

U. Wilhelm, S. Staamann, L. Buttyán

On the Problem of Trust in Mobile Agent Systems

Proceedings of Internet Society`s Symposium on Network and Distributed System Security, San Diego, CA, USA, March, 1998.
( Abstract, PS, Bibtex )

U. Wilhelm, S. Staamann, L. Buttyán

Protecting the Itinerary of Mobile Agents

Proceedings of ECOOP Workshop on Mobile Object Systems: Secure Internet Mobile Communications, Brussels, Belgium, June, 1998.
( Abstract, PS, Bibtex )

S. Staamann, U. Wilhelm, L. Buttyán

Security in the Telecommunication Information Networking Architecture - the CrySTINA Approach

no. SSC/98/4, EPFL-DI-ICA, January, 1998.
( Abstract, PS, Bibtex )

S. Staamann, U. Wilhelm, L. Buttyán

Security in TINA

Proceedings of IFIP-SEC`98, Wienna-Budapest, August, 1998.
( Abstract, PS, Bibtex )

1997

Zs. Nagy

A hitelkártyás vásárlás SET (Secure Electronic Transaction) draft standard adatbiztonsági protokolljának vizsgálata

BME, 1997.
( Bibtex )

Zs. Szabadi

Biztonságos kommunikáció X400 MTA és Web Browser ügyfél alkalmazás között

BME, 1997.
( Bibtex )

L. Buttyán

Data Security Issues of Computer Networks

Magyar Távközlés (Selected Papers from the Hungarian Telecommunications), 1997, pp. 50-57..
( Bibtex )

L. Buttyán, I. Vajda

On the Design of Strong Bit Permutations and Substitutions

Budapest University of Technology, January, 1997.
( Bibtex )

I. Vajda, L. Buttyán

On the Design of Substitution-Permutation Ciphers

Budapest University of Technology, January, 1997.
( Bibtex )

S. Staamann, U. Wilhelm, A. Schiper, L. Buttyán, J. P. Hubaux

Security in the Telecommunication Information Networking Architecture - the CrySTINA Approach

Proceedings of TINA`97, November, 1997.
( Abstract, PS, Bibtex )

1996

L. Buttyán

Data Security Issues of Computer Networks (in Hungarian)

Magyar Távközlés, vol. VII., no. 4., April, 1996, pp. 11-19..
( Bibtex )

1995

I. Vajda

Code construction for FH/CDMA channels

IEEE Transactions on Communications, vol. 43, no. 10, October, 1995.
( Bibtex )

K. Rassay

Nyílt számítógépes hálózatok adatvédelmi kérdései

BME, 1995.
( Bibtex )

I. Vajda, L. Buttyán

On Design Criteria of Conventional Block Ciphers (in Hungarian)

Hiradástechnika, vol. XLVI., March, 1995, pp. 10-18., (awarded with the Pollak-Virag Award of the Hungarian Telecommunication Scientific Society).
( Bibtex )

L. Buttyán

S-box Design, (in Hungarian)

Budapest University of Technology, May, 1995.
( Bibtex )

L. Buttyán, I. Vajda

Searching for the best linear approximation of DES-like cryptosystems

IEE Electronics Letters, vol. 31, no. 11, May, 1995, pp. 873-874.
( Bibtex )

1994

I. Vajda

Code Constructions for Code Division Multiple Access Channels

Journal on Communications, vol. XLV, March, 1994, pp. 2-9.
( Bibtex )

1993

L. Györfi, I. Vajda

Construction of Protocol Sequences for Multiple-Access Collision Channels

Proceedings of the 1993 IEEE International Symposium on Information Theory, San Antonio, USA, Jan 17-22, 1993, pp. 157.
( Bibtex )

I. Vajda

Hibakorlátozó kódolás

Chapter 7, in Géher K. (ed.): Híradástechnika, Mûszaki Könyvkiadó, 1993.
( Bibtex )

I. Vajda

Spread Spectrum Principle Based Wireless Telecommunication Networks

Magyar Távközlés, 1993, pp. 43-49, Selected papers 1993.
( Bibtex )

1992

I. Vajda

Code sequences for FH-CDMA channels

Proceedings of IEEE Symposium on Spread Spectrum Techniques and Applications, Yokohama, Japan, 1992, pp. 195-197.
( Bibtex )

L. Györfi, I. Vajda

Construction of Protocol Sequences for Multiple-Access Collision Channel without Feedback

IEEE Transactions on Information Theory, vol. 39, no. 5, September, 1992, pp. 1762-1765.
( Bibtex )

Gy. Hernádi

Lokális számítógéphálózatok algoritmikus adatvédelme

BME, 1992.
( Bibtex )

1991

T. Nemetz, I. Vajda

A cryptographic element based on number system conversion

Proceedings of 1991 IEEE International Symposium on Information Theory, Budapest, Hungary, 1991, pp. 127.
( Bibtex )

T. Nemetz, I. Vajda

Bevezetés az algoritmikus adatvédelembe

Az elektronika újabb eredményei 9.kötet, Akadémiai Kiadó, 1991, Budapest.
( Bibtex )

I. Vajda

Comments on Code-Division Multiple Access Techniques in Optical Fiber Networks

IEEE Transactions on Communications, vol. 39, no. 2, February, 1991, pp. 196.
( Bibtex )

T. Szántó

Reed-Solomon kódok alkalmazási lehetõségei az adatvédelemben

BME, 1991.
( Bibtex )

I. Vajda

Side information gained from signal matrices in FFH spread spectrum systems

Electronics and Communications, vol. 45, no. 2, March, 1991, pp. 70-76, Hirzel Verlag.
( Bibtex )

I. Vajda, T. Nemetz

Substitution of characters in q-ary m-sequences

Lecture Notes in Computer Science 508, 1991, pp. 96-105, Springer-Verlag.
( Bibtex )

1990

I. Vajda

AGC based hard detected FFH signal matrices

IEE Electronics Letters, vol. 26, no. 3, February, 1990, pp. 218-219.
( Bibtex )

I. Vajda

On random code-hopping DS/SSMA systems

Proceedings of IEEE Symposium on Spread Spectrum Techniques and Applications, London, 1990, pp. 47-52.
( Bibtex )

1987

I. Vajda, G. Einarsson

Code acquisition for a frequency hopping system

IEEE Transactions on Communications, vol. 35, no. 5, May, 1987, pp. 566-568.
( Bibtex )

G. Einarsson, I. Vajda, L. Molnár

Error probability of a code-division multiple-access frequency-hopping system

Electronics and Communications, vol. 41, no. 6, December, 1987, pp. 356-364, Hirzel Verlag.
( Bibtex )

I. Vajda, J. Landsmann

Some results on generation of shift-register sequences with large linear complexity

Proceedings of Applied Algebra, Algebraic Algorithms and Error Control Codes, AAECC-5, Menorca, Spain, June 15-19, 1987, pp. 81.
( Bibtex )

1985

I. Vajda

More on modelling and performance evaluation for frequency coded multiple access channels

Proceedings of U.R.S.I. XXIst General Assembly, Florence, Italy, 1985, pp. 104.
( Bibtex )

1983

I. Vajda

A coding rule for frequency-hopped multiple access channels

Problems of Control and Information Theory, vol. 13, no. 5, 1983, pp. 331-335.
( Bibtex )

L. Györfi, I. Vajda

Block coding and correlation decoding for an M-user weighted adder channel

Problems of Control and Information Theory, vol. 12, no. 6, 1983, pp. 405-417.
( Bibtex )

L. Molnár, I. Vajda

Decoding error probability of the Einarsson-code for frequency-hopped multiple access channel

Problems of Control and Information Theory, vol. 13, no. 2, 1983, pp. 109-120.
( Bibtex )

1982

I. Vajda

Hibajavító kódolás és mûszaki alkalmazásai

BME Mérnöktovábbképzõ Intézet, 1982.
( Bibtex )

1980

S. Csibi, L. Györfi, Z. Györfi, I. Vajda

Information transmission with intermediate storage under the special conditions of microcomputers

Periodica Polytechnica, vol. 24, 1980, pp. 222-227.
( Bibtex )

L. Györfi, I. Vajda

Upper bound on the error probability of detection in non-Gaussian noise

Problems of Control and Information Theory, vol. 9, no. 3, 1980, pp. 215-224.
( Bibtex )

1979

I. Vajda, I. Kerekes, L. Györfi, H. Gomez

Remarks on a coding technique for asynchronous multiple access communication

Problems of Control and Information Theory, vol. 9, no. 4, 1979, pp. 287-296.
( Bibtex )

1978

I. Vajda

Adaptive Gaussian detection without a priori symbol synchronization

Problems of Control and Information Theory, vol. 9, no. 2, 1978, pp. 133-140.
( Bibtex )

L. Györfi, Z. Györfi, I. Vajda

Bayesian decision with rejection

Problems of Control and Information Theory, vol. 8, no. 5, 1978, pp. 445-452.
( Bibtex )

1977

L. Györfi, Z. Györfi, I. Vajda

A strong law of large numbers and some applications

Studia Scientiarum Mathematicarum Hungarica, vol. 12, 1977, pp. 233-244.
( Bibtex )