Follow
László Czap
László Czap
Verified email at hu.ibm.com
Title
Cited by
Cited by
Year
Detection and recovery from pollution attacks in coding-based distributed storage schemes
L Buttyán, L Czap, I Vajda
IEEE transactions on dependable and secure computing 8 (6), 824-838, 2011
372011
Secret message capacity of erasure broadcast channels with feedback
L Czap, VM Prabhakaran, C Fragouli, S Diggavi
Information Theory Workshop (ITW), 2011 IEEE, 65-69, 2011
302011
Broadcasting private messages securely
L Czap, VM Prabhakaran, S Diggavi, C Fragouli
Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on …, 2012
282012
Secure Network Coding with Erasures and Feedback
L Czap, V Prabhakaran, S Diggavi, C Fragouli
Allerton, 2013
212013
Secure Network Coding with Erasures and Feedback
L Czap, V Prabhakaran, S Diggavi, C Fragouli
Allerton, 2013
212013
Secret Communication over Broadcast Erasure Channels with State-feedback
L Czap, VM Prabhakaran, C Fragouli, SN Diggavi
IEEE Transactions on Information Theory 61 (9), 4788-4808, 2015
192015
Securing coding based distributed storage in wireless sensor networks
L Buttyán, L Czap, I Vajda
2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems …, 2008
132008
Signatures for Multi-source Network Coding.
L Czap, I Vajda
IACR Cryptology ePrint Archive 2010, 328, 2010
112010
Creating Secrets Out of Packet Erasures
I Safaka, L Czap, K Argyraki, C Fragouli
IEEE Transactions on Information Forensics and Security 11 (6), 1177-1191, 2016
102016
Pollution Attack Defense for Coding Based Sensor Storage
L Buttyán, L Czap, I Vajda
Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2010 IEEE …, 2010
102010
Triangle Network Secrecy
L Czap, VM Prabhakaran, S Diggavi, C Fragouli
IEEE International Symposium on Information Theory (ISIT), 2014
92014
Exploiting common randomness: A resource for network secrecy
L Czap, VM Prabhakaran, S Diggavi, C Fragouli
Information Theory Workshop (ITW), 2013 IEEE, 1-5, 2013
92013
LP formulations for secrecy over erasure networks with feedback
A Papadopoulos, L Czap, C Fragouli
International Symposium on Information Theory (ISIT), 2015
72015
Secret Message Capacity of a Line Network
A Papadopoulos, L Czap, C Fragouli
52nd Annual Allerton Conference on Communication, Control, and Computing, 2014
72014
Wireless Network Security: Building on Erasures
C Fragouli, VM Prabhakaran, L Czap, SN Diggavi
Proceedings of the IEEE 103 (10), 1826-1840, 2015
62015
Towards Unconditional Tor-Like Anonymity
I Safaka, L Czap, K Argyraki, C Fragouli
The 2015 IEEE International Sumposium on Network Coding (NetCod)-Invited Paper, 2015
42015
Secure Network Coding in DTNs
L Czap, I Vajda
IEEE Communications Letters 15 (1), 28-30, 2011
42011
Securing broadcast against dishonest receivers
L Czap, VM Prabhakaran, S Diggavi, C Fragouli
2013 International Symposium on Network Coding (NetCod), 1-6, 2013
32013
Secure Capacity Region for Erasure Broadcast Channels with Feedback
L Czap, VM Prabhakaran, S Diggavi, C Fragouli
Arxiv preprint arXiv:1110.5741, 2011
32011
Achievable secrecy in arbitrary erasure networks with feedback
L Czap, A Papadopoulos, C Fragouli
Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference …, 2014
22014
The system can't perform the operation now. Try again later.
Articles 1–20