Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Buttyán, Levente
add a person with the name Buttyán, Levente
 

Other publications of authors with the same name

Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks., , , and . Computer Communications, 33 (8): 907-922 (2010)Misbehaving router detection in link-state routing for wireless mesh networks., , and . WOWMOM, page 1-6. IEEE Computer Society, (2010)Invitation-Oriented TGDH: Key Management for Dynamic Groups in an Asynchronous Communication Model., , and . ICPP Workshops, page 269-276. IEEE Computer Society, (2012)Modelling adversaries and security objectives for routing protocols in wireless sensor networks., , and . SASN, page 49-58. ACM, (2006)Towards provable security for ad hoc routing protocols., and . SASN, page 94-105. ACM, (2004)A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals., , and . IEEE Trans. Dependable Sec. Comput., 2 (3): 268-272 (2005)Extensions to an authentication technique proposed for the global mobility network., , , and . IEEE Trans. Communications, 48 (3): 373-376 (2000)PoDSy 2003: Principles of Dependable Systems., , and . DSN, page 763. IEEE Computer Society, (2003)An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks., and . WOWMOM, page 1-6. IEEE Computer Society, (2009)CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap., , and . SysSec@DIMVA, page 75-78. IEEE, (2011)