Cryptology ePrint Archive Reports: 2013
I.Vajda. The UC approach: an application view. Cryptology ePrint Archive Report 2013/072. http://eprint.iacr.org/2013/072.pdf |
Cryptology ePrint
Archive Reports: 2012
I.Vajda. On instance separation in the UC-framework. Cryptology ePrint Archive Report 2012/302. http://eprint.iacr.org/2012/302.pdf |
I.Vajda. UC framework for anonymous communication. Cryptology ePrint Archive Report 2011/682. http://eprint.iacr.org/2011/682.pdf |
I.Vajda. Non-malleable public key encryption in BRSIM/UC. Cryptology ePrint Archive Report 2011/470. http://eprint.iacr.org/2011/470.pdf |
I.Vajda. New look at impossibility result on Dolev-Yao models with hashes. Cryptology ePrint Archive Report 2011/335. http://eprint.iacr.org/2011/335.pdf |
I.Vajda. Framework for Security Proofs for Reactive Routing Protocols in Multi-Hop Wireless Networks. Cryptology ePrint Archive Report 2011/237. http://eprint.iacr.org/2011/220.pdf |
I.Vajda. Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA. Cryptology ePrint Archive Report 2011/103. http://eprint.iacr.org/2011/103.pdf |
L.Czap, I.Vajda. Signatures for Multi-source Network Coding. Cryptology ePrint Archive Report 2010/328. http://eprint.iacr.org/2010/328.pdf |
Journal papers:
L. Czap, I. Vajda. Secure Network Coding in DTNs. IEEE COMMUNICATIONS LETTERS 15:(1) pp. 28-30. (2011) |
G. Acs, L. Buttyan, I. Vajda. Provably secure on-demand source routing in mobile ad hoc networks. IEEE TRANSACTIONS ON MOBILE COMPUTING 5:(11) pp. 1533-1546. (2006) |
I. Zs. Berta, L. Buttyan, I. Vajda. A framework for the revocation of unintended digital signatures initiated by malicious terminals. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2:(3) pp. 268-272. (2005) |
L. Buttyan, I. Vajda. Searching for the Best Linear-approximation of DES-like Cryptosystems. ELECTRONICS LETTERS 31:(11) pp. 873-874. (1995) |
Conference publications:
G. Ács, L. Buttyán, I. Vajda. The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks. In: Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE Internatonal Conference on. Pisa, Italy, 2007.10.08-2007.10.11. IEEE, pp. 1-6. |
L. Buttyán, T. Holczer, I. Vajda. On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs. In: Proceedings of the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS2007)). Cambridge, UK, 2007.07.02-2007.07.03. Berlin ; Heidelberg: Springer-Verlag, pp. 129-141. (Lecture Notes in Computer Science; 4572.) |
Avoine Gildas, L. Buttyán, T. Holczer, I. Vajda. Group-Based Private Authentication. In: World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on. Espoo, Finnland, 2007.06.18-2007.06.21. pp. 1-6. |
L. Buttyán, T. Holczer, I. Vajda. Optimal Key-Trees for Tree-Based Private Authentication. In: 6th International Workshop on Privacy Enhancing Technologies. Cambridge, UK, 2006.06.28-2006.06.30. Berlin ; Heidelberg: Springer-Verlag, pp. 332-350. (Lecture Notes in Computer Science) Vol. 4258. |
G. Ács, L. Buttyán, I. Vajda. Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks. In: Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN). Alexandria, USA, 2006.10.30. ACM Press, pp. 49-58. |
G. Ács, L. Buttyán, I. Vajda. Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks. In: Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005). Visegrád, Hungary, 2005.07.13-2005.07.14. Berlin ; Heidelberg: Springer-Verlag, pp. 113-127. (Lecture notes in computer science; 3813.) |
L. Buttyán, I. Vajda. Towards Provable Security for Ad Hoc Routing Protocols. In: Proceedings of the 2nd ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2004). Washington, USA, 2004.10.25-2004.10.27. ACM Press, pp. 94-105. |
I.Zs. Berta, L. Buttyán, I. Vajda. Privacy Protecting Protocols for Revokable Digital Signatures. In: Privacy Protecting Protocols for Revokable Digital Signatures: Proceedings of Cardis 2004. Toulouse, France, 2004.07.05-2004.07.09. Kluwer Academic Publishers, pp. 137-143. |
I. Zs. Berta, L. Buttyán, I. Vajda. Mitigating the Untrusted Terminal Problem Using Conditional Signatures. In: Proceedings of International Conference on Information Technology ITCC 2004. Las Vegas, USA, 2004.04.05-2004.04.07. IEEE, pp. 12-16 |
I. Vajda, L. Buttyán. Lightweight Authentication Protocols for Low-Cost RFID Tags. In: 2nd Workshop on Security in Ubiquitous Computing, in conjunction with Ubicomp 2003. Seattle, USA, 2003.10.12-2003.10.15. pp. 1-11. |