• 6194 Citations
  • 35 h-Index
19952019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2019

IoT hacking - A primer

Papp, D., Tamás, K. & Buttyán, L., jan. 1 2019, In : Infocommunications Journal. 11, 2, p. 2-13 12 p.

Research output: Article

1 Citation (Scopus)
2018
2 Citations (Scopus)
2013

Designing robust network topologies for wireless sensor networks in adversarial environments

Laszka, A., Buttyán, L. & Szeszlér, D., aug. 2013, In : Pervasive and Mobile Computing. 9, 4, p. 546-563 18 p.

Research output: Article

9 Citations (Scopus)

On automating the verification of secure ad-hoc network routing protocols

Thong, T. V. & Buttyán, L., ápr. 1 2013, In : Telecommunication Systems. 52, 4, p. 2611-2635 25 p.

Research output: Article

2 Citations (Scopus)
2012

The cousins of Stuxnet: Duqu, Flame, and Gauss

Bencsáth, B., Pék, G., Buttyán, L. & Félegyházi, M., 2012, In : Future Internet. 4, 4, p. 971-1003 33 p.

Research output: Article

96 Citations (Scopus)
2011
3 Citations (Scopus)
16 Citations (Scopus)
2010

Application of wireless sensor networks in critical infrastructure protection: Challenges and design options

Buttyán, L., Gessner, D., Hessler, A. & Langendoerfer, P., okt. 1 2010, In : IEEE Wireless Communications. 17, 5, p. 44-49 6 p., 5601957.

Research output: Article

56 Citations (Scopus)

Barter trade improves message delivery in opportunistic networks

Buttyán, L., Dóra, L., Félegyházi, M. & Vajda, I., jan. 1 2010, In : Ad Hoc Networks. 8, 1, p. 1-14 14 p.

Research output: Article

70 Citations (Scopus)

Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks

Buttyán, L., Dóra, L., Martinelli, F. & Petrocchi, M., máj. 17 2010, In : Computer Communications. 33, 8, p. 907-922 16 p.

Research output: Article

3 Citations (Scopus)
42 Citations (Scopus)

Securing multi-operator-based QoS-aware mesh networks: Requirements and design options

Buttyán, L., Askoxylakis, I., Bencsáth, B., Dóra, L., Siris, V., Szili, D. & Vajda, I., máj. 1 2010, In : Wireless Communications and Mobile Computing. 10, 5, p. 622-646 25 p.

Research output: Article

6 Citations (Scopus)
2009

CORA: Correlation-based resilient aggregation in sensor networks

Buttyán, L., Schaffer, P. & Vajda, I., aug. 1 2009, In : Ad Hoc Networks. 7, 6, p. 1035-1050 16 p.

Research output: Article

13 Citations (Scopus)
2008

Secure vehicular communication systems: Implementation, performance, and research challenges - [Topics in automotive networking]

Kargl, F., Papadimitratos, P., Buttyan, L., Müter, M., Schoch, E., Wiedersheim, N., Thong, T. V., Calandriello, G., Held, A., Kung, A. & Hubaux, J. P., 2008, In : IEEE Communications Magazine. 46, 11, p. 110-118 9 p.

Research output: Article

151 Citations (Scopus)

Secure vehicular communication systems: Design and architecture

Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., Ma, Z., Kargl, F., Kung, A. & Hubaux, J. P., 2008, In : IEEE Communications Magazine. 46, 11, p. 100-109 10 p.

Research output: Article

339 Citations (Scopus)
2006

Mobility helps peer-to-peer security

Capkun, S., Hubaux, J. P. & Buttyan, L., jan. 2006, In : IEEE Transactions on Mobile Computing. 5, 1, p. 43-51 9 p.

Research output: Article

87 Citations (Scopus)

Nash equilibria of packet forwarding strategies in wireless ad hoc networks

Félegyházi, M. & Buttyán, L., szept. 2006, In : IEEE Transactions on Mobile Computing. 5, 5, p. 463-475 13 p.

Research output: Article

251 Citations (Scopus)

Node cooperation in hybrid ad hoc networks

Salem, N. B., Buttyán, L., Hubaux, J. P. & Jakobsson, M., júl. 2006, In : IEEE Transactions on Mobile Computing. 5, 4, p. 365-376 12 p.

Research output: Article

70 Citations (Scopus)
2005
8 Citations (Scopus)
2004

A formal model of rational exchange and its application to the analysis of Syverson's protocol

Buttyán, L., Hubaux, J. P. & Čapkun, S., 2004, In : Journal of Computer Security. 12, 3-4 SPEC. ISS., p. 551-587 37 p.

Research output: Article

17 Citations (Scopus)

Modelling location reveal attacks in mobile systems

Zömbik, L. & Buttyán, L., jan. 1 2004, In : Periodica Polytechnica Electrical Engineering. 48, 1-2, p. 85-100 16 p.

Research output: Article

2003
Open Access
9 Citations (Scopus)

Self-organized public-key management for mobile ad hoc networks

Capkun, S., Buttyán, L. & Hubaux, J. P., jan. 2003, In : IEEE Transactions on Mobile Computing. 2, 1, p. 52-64 13 p.

Research output: Article

613 Citations (Scopus)

Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks

Buttyán, L. & Hubaux, J. P., okt. 2003, In : Mobile Networks and Applications. 8, 5, p. 579-592 14 p.

Research output: Article

738 Citations (Scopus)
2001

Self-organization in mobile ad hoc networks: The approach of terminodes

Blažević, L., Buttyán, L., Čapkun, S., Giordano, S., Hubaux, J. P. & Le Boudec, J. Y., jún. 1 2001, In : IEEE Communications Magazine. 39, 6, p. 166-173 8 p.

Research output: Article

249 Citations (Scopus)
2000

A Pessimistic approach to trust in mobile agent platforms

Wilhelm, U. G., Staamann, S. M. & ButtyaÁn, L., 2000, In : IEEE Internet Computing. 4, 5, p. 40-48 9 p.

Research output: Article

20 Citations (Scopus)

Extensions to an authentication technique proposed for the global mobility network

Buttyán, L., Gbaguidi, C., Staamann, S. & Wilhelm, U., 2000, In : IEEE Transactions on Communications. 48, 3, p. 373-376 4 p.

Research output: Article

48 Citations (Scopus)

Removing the financial incentive to cheat in micropayment schemes

Buttyán, L., jan. 20 2000, In : Electronics Letters. 36, 2, p. 132-133 2 p.

Research output: Article

25 Citations (Scopus)
1995

Searching for the best linear approximation of DES-like cryptosystems

Buttyan, L. & Vajda, I., máj. 25 1995, In : Electronics Letters. 31, 11, p. 873-874 2 p.

Research output: Article

3 Citations (Scopus)