Cryptography:

  Cryptology ePrint Archive Reports: 2013

I.Vajda.  The UC approach: an application view.  Cryptology ePrint Archive Report 2013/072. http://eprint.iacr.org/2013/072.pdf


 
Cryptology ePrint Archive Reports: 2012

I.Vajda.  On instance separation in the UC-framework.  Cryptology ePrint Archive Report 2012/302. http://eprint.iacr.org/2012/302.pdf



Cryptology ePrint Archive Reports:
2011

I.Vajda. UC framework for anonymous communication. Cryptology ePrint Archive Report 2011/682. http://eprint.iacr.org/2011/682.pdf
I.Vajda. Non-malleable public key encryption in BRSIM/UC. Cryptology ePrint Archive Report 2011/470. http://eprint.iacr.org/2011/470.pdf
I.Vajda. New look at impossibility result on Dolev-Yao models with hashes. Cryptology ePrint Archive Report 2011/335. http://eprint.iacr.org/2011/335.pdf

I.Vajda.  Framework for Security Proofs for Reactive Routing Protocols in Multi-Hop Wireless Networks. Cryptology ePrint Archive Report 2011/237. http://eprint.iacr.org/2011/220.pdf

I.Vajda.  Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA.  Cryptology ePrint Archive Report 2011/103. http://eprint.iacr.org/2011/103.pdf



Cryptology ePrint Archive Reports: 2010

L.Czap, I.Vajda. Signatures for Multi-source Network Coding. Cryptology ePrint Archive Report 2010/328. http://eprint.iacr.org/2010/328.pdf


Journal papers:

L. Czap, I. Vajda. Secure Network Coding in DTNs. IEEE COMMUNICATIONS LETTERS 15:(1) pp. 28-30. (2011)
G. Acs, L. Buttyan, I. Vajda. Provably secure on-demand source routing in mobile ad hoc networks. IEEE TRANSACTIONS ON MOBILE COMPUTING 5:(11) pp. 1533-1546. (2006)
I. Zs. Berta, L. Buttyan, I. Vajda. A framework for the revocation of unintended digital signatures initiated by malicious terminals. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2:(3) pp. 268-272. (2005)
L. Buttyan, I. Vajda. Searching for the Best Linear-approximation of DES-like Cryptosystems. ELECTRONICS LETTERS 31:(11) pp. 873-874. (1995)

 

Conference publications:

G. Ács, L. Buttyán, I. Vajda. The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks. In: Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on. Pisa, Italy, 2007.10.08-2007.10.11. IEEE, pp. 1-6.
L. Buttyán, T. Holczer, I. Vajda. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. In: Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS2007)). Cambridge, UK, 2007.07.02-2007.07.03. Berlin ; Heidelberg: Springer-Verlag, pp. 129-141. (Lecture Notes in Computer Science; 4572.)
Avoine Gildas, L. Buttyán, T. Holczer, I. Vajda.  Group-Based Private Authentication. In: World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on. Espoo, Finnland, 2007.06.18-2007.06.21. pp. 1-6.

L. Buttyán, T. Holczer, I. Vajda. Optimal Key-Trees for Tree-Based Private Authentication. In: 6th International Workshop on Privacy Enhancing Technologies. Cambridge, UK, 2006.06.28-2006.06.30. Berlin ; Heidelberg: Springer-Verlag, pp. 332-350.  (Lecture Notes in Computer Science) Vol. 4258.

G. Ács, L. Buttyán, I. Vajda. Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks. In: Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN). Alexandria, USA, 2006.10.30. ACM Press, pp. 49-58.
G. Ács, L. Buttyán, I. Vajda. Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. In: Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005). Visegrád, Hungary, 2005.07.13-2005.07.14. Berlin ; Heidelberg: Springer-Verlag, pp. 113-127. (Lecture notes in computer science; 3813.)
L. Buttyán, I. Vajda. Towards Provable Security for Ad Hoc Routing Protocols. In: Proceedings of the 2nd ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2004). Washington, USA, 2004.10.25-2004.10.27. ACM Press, pp. 94-105. 
I.Zs. Berta, L. Buttyán, I. Vajda. Privacy Protecting Protocols for Revokable Digital Signatures. In: Privacy Protecting Protocols for Revokable Digital Signatures: Proceedings of Cardis 2004. Toulouse, France, 2004.07.05-2004.07.09. Kluwer Academic Publishers, pp. 137-143.
I. Zs. Berta, L. Buttyán, I. Vajda. Mitigating the Untrusted Terminal Problem Using Conditional Signatures. In: Proceedings of International Conference on Information Technology ITCC 2004. Las Vegas, USA, 2004.04.05-2004.04.07. IEEE, pp. 12-16
I. Vajda, L. Buttyán. Lightweight Authentication Protocols for Low-Cost RFID Tags. In: 2nd Workshop on Security in Ubiquitous Computing, in conjunction with Ubicomp 2003. Seattle, USA, 2003.10.12-2003.10.15. pp. 1-11.