Secure vehicular communication systems: design and architecture P Papadimitratos, L Buttyan, T Holczer, E Schoch, J Freudiger, M Raya, ... IEEE Communications magazine 46 (11), 100-109, 2008 | 732 | 2008 |
On the effectiveness of changing pseudonyms to provide location privacy in VANETs L Buttyán, T Holczer, I Vajda Security and Privacy in Ad-hoc and Sensor Networks: 4th European Workshop …, 2007 | 356 | 2007 |
VeRA-version number and rank authentication in RPL A Dvir, L Buttyan 2011 IEEE eighth international conference on mobile ad-hoc and sensor …, 2011 | 283 | 2011 |
Slow: A practical pseudonym changing scheme for location privacy in vanets L Buttyán, T Holczer, A Weimerskirch, W Whyte 2009 IEEE vehicular networking conference (VNC), 1-8, 2009 | 220 | 2009 |
CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot DI Buza, F Juhász, G Miru, M Félegyházi, T Holczer Smart Grid Security: Second International Workshop, SmartGridSec 2014 …, 2014 | 123 | 2014 |
Secure and reliable clustering in wireless sensor networks: a critical survey P Schaffer, K Farkas, Á Horváth, T Holczer, L Buttyán Computer Networks 56 (11), 2726-2741, 2012 | 81 | 2012 |
Optimal key-trees for tree-based private authentication L Buttyán, T Holczer, I Vajda International Workshop on Privacy Enhancing Technologies, 332-350, 2006 | 68 | 2006 |
Group-based private authentication G Avoine, L Buttyant, T Holczer, I Vajda 2007 IEEE International Symposium on a World of Wireless, Mobile and …, 2007 | 61 | 2007 |
Spontaneous cooperation in multi-domain sensor networks L Buttyán, T Holczer, P Schaffer Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop …, 2005 | 40 | 2005 |
Private cluster head election in wireless sensor networks L Buttyán, T Holczer 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009 | 37 | 2009 |
Message format and field semantics inference for binary protocols using recorded network traffic G Ládi, L Buttyán, T Holczer 2018 26th International Conference on Software, Telecommunications and …, 2018 | 26 | 2018 |
Traffic analysis attacks and countermeasures in wireless body area sensor networks L Buttyan, T Holczer 2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012 | 25 | 2012 |
Hide-and-Lie: enhancing application-level privacy in opportunistic networks L Dóra, T Holczer Proceedings of the Second International Workshop on Mobile Opportunistic …, 2010 | 14 | 2010 |
The design and implementation of a PLC honeypot for detecting cyber attacks against industrial control systems T Holczer, M Félegyházi, L Buttyán Proceedings of International Conference on Computer Security in a Nuclear …, 2015 | 13 | 2015 |
Perfectly anonymous data aggregation in wireless sensor networks L Buttyán, T Holczer The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems …, 2010 | 11 | 2010 |
Privacy pitfalls of releasing in-vehicle network data A Gazdag, S Lestyán, M Remeli, G Ács, T Holczer, G Biczók Vehicular Communications 39, 100565, 2023 | 10 | 2023 |
Anonymous aggregator election and data aggregation in wireless sensor networks T Holczer, L Buttyán International Journal of Distributed Sensor Networks 7 (1), 828414, 2011 | 8 | 2011 |
Vehicular can traffic based microtracking for accident reconstruction A Gazdag, T Holczer, L Buttyán, Z Szalay Vehicle and Automotive Engineering 2: Proceedings of the 2nd VAE2018 …, 2018 | 7 | 2018 |
Attacking IEC 60870-5-104 protocol P György, T Holczer 1st Conference on information technology and data science (CITDS), 140-150, 2020 | 6 | 2020 |
Protocol state machine reverse engineering with a teaching-learning approach G Székely, G Ládi, T Holczer, L Buttyán Acta Cybernetica 25 (2), 517-535, 2021 | 4 | 2021 |