István Vajda
According to our database1,
István Vajda
authored at least 53 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
IACR Cryptol. ePrint Arch., 2022
2019
CoRR, 2019
Rotor Fault Detection under Fast-varying Dynamic Load based on Adaptive Morlet Wavelet Transform.
Proceedings of the 13th IEEE International Symposium on Applied Computational Intelligence and Informatics, 2019
2018
EAI Endorsed Trans. Energy Web, 2018
2017
Proceedings of the 25th International Conference on Software, 2017
2016
Int. J. Inf. Sec., 2016
2014
Int. J. Secur. Networks, 2014
2013
2012
2011
Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes.
IEEE Trans. Dependable Secur. Comput., 2011
IACR Cryptol. ePrint Arch., 2011
Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks.
IACR Cryptol. ePrint Arch., 2011
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA.
IACR Cryptol. ePrint Arch., 2011
2010
Securing multi-operator-based QoS-aware mesh networks: requirements and design options.
Wirel. Commun. Mob. Comput., 2010
Ad Hoc Networks, 2010
Proceedings of the IEEE International Conference on Sensor Networks, 2010
2009
Ad Hoc Networks, 2009
2008
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008
Proceedings of the Algorithmic Learning Theory, 19th International Conference, 2008
2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Proceedings of the 10th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2007
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
2006
IEEE Trans. Mob. Comput., 2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
Modelling adversaries and security objectives for routing protocols in wireless sensor networks.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
2005
A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals.
IEEE Trans. Dependable Secur. Comput., 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005
2004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2002
Proceedings of the 1st IEEE International Workshop on Electronic Design, 2002
2001
Collecting randomness from the net.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001
2000
1998
1995
IEEE Trans. Commun., 1995
1993
Constructions of protocol sequences for multiple access collision channel without feedback.
IEEE Trans. Inf. Theory, 1993
1991
Comments on 'Code-division multiple-access techniques in optical fiber networks. II. Systems performance analysis' by J.A. Salehi and C.A. Brackett.
IEEE Trans. Commun., 1991
1990
Proceedings of the Applied Algebra, 1990
1987