Levente Buttyan
Cited by
Cited by
Stimulating cooperation in self-organizing mobile ad hoc networks
L Buttyán, JP Hubaux
Mobile Networks and Applications 8, 579-592, 2003
Self-organized public-key management for mobile ad hoc networks
S Capkun, L Buttyan, JP Hubaux
IEEE Transactions on mobile computing 2 (1), 52-64, 2003
The quest for security in mobile ad hoc networks
JP Hubaux, L Buttyán, S Capkun
Proceedings of the 2nd ACM international symposium on Mobile ad hoc …, 2001
Enforcing service availability in mobile ad-hoc WANs
L Buttyan, JP Hubaux
2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing …, 2000
Secure vehicular communication systems: design and architecture
P Papadimitratos, L Buttyan, T Holczer, E Schoch, J Freudiger, M Raya, ...
IEEE Communications magazine 46 (11), 100-109, 2008
SECTOR: secure tracking of node encounters in multi-hop wireless networks
S Čapkun, L Buttyán, JP Hubaux
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
Self organization in mobile ad hoc networks: the approach of Terminodes
L Blazevic, L Buttyan, S Capkun, S Giordano, JP Hubaux, JY Le Boudec
IEEE Communications Magazine 39 (6), 166-174, 2001
Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
L Buttyan, JP Hubaux
Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing
L Buttyan, JP Hubaux
Cambridge University Press, 2007
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
M Felegyhazi, JP Hubaux, L Buttyan
IEEE Transactions on Mobile computing 5 (5), 463-476, 2006
A micro-payment scheme encouraging collaboration in multi-hop cellular networks
M Jakobsson, JP Hubaux, L Buttyán
Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe …, 2003
Mobility helps security in ad hoc networks
S Čapkun, JP Hubaux, L Buttyan
Proceedings of the 4th ACM international symposium on Mobile ad hoc …, 2003
On the effectiveness of changing pseudonyms to provide location privacy in VANETs
L Buttyán, T Holczer, I Vajda
Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop …, 2007
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
NB Salem, L Buttyan, JP Hubaux, M Jakobsson
Proceedings of the 4th ACM international symposium on Mobile ad hoc …, 2003
Secure vehicular communication systems: implementation, performance, and research challenges
F Kargl, P Papadimitratos, L Buttyan, M Müter, E Schoch, B Wiedersheim, ...
IEEE Communications magazine 46 (11), 110-118, 2008
Architecture for secure and private vehicular communications
P Papadimitratos, L Buttyan, JP Hubaux, F Kargl, A Kung, M Raya
2007 7th International Conference on ITS Telecommunications, 1-6, 2007
Provably secure on-demand source routing in mobile ad hoc networks
G Acs, L Buttyan, I Vajda
IEEE transactions on Mobile Computing 5 (11), 1533-1546, 2006
Lightweight authentication protocols for low-cost RFID tags
I Vajda, L Buttyán
Second Workshop on Security in Ubiquitous Computing–Ubicomp 2003, 2003
The cousins of stuxnet: Duqu, flame, and gauss
B Bencsáth, G Pék, L Buttyán, M Felegyhazi
Future Internet 4 (4), 971-1003, 2012
VeRA-version number and rank authentication in RPL
A Dvir, L Buttyan
2011 IEEE eighth international conference on mobile ad-hoc and sensor …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20