Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privátszféra védő protokollok vezeték nélküli hálózatokban. Budapest University of Technology and Economics, Hungary, (2013)Privacy pitfalls of releasing in-vehicle network data., , , , , and . Veh. Commun., (February 2023)Hide-and-Lie: enhancing application-level privacy in opportunistic networks., and . MobiOpp, page 135-142. ACM, (2010)Perfectly anonymous data aggregation in wireless sensor networks., and . MASS, page 513-518. IEEE Computer Society, (2010)VeRA - Version Number and Rank Authentication in RPL., , and . MASS, page 709-714. IEEE Computer Society, (2011)CryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot., , , , and . SmartGridSec, volume 8448 of Lecture Notes in Computer Science, page 181-192. Springer, (2014)Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks., and . IJDSN, (2011)Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic., , and . SoftCOM, page 1-6. IEEE, (2018)Traffic analysis attacks and countermeasures in wireless body area sensor networks., and . WOWMOM, page 1-6. IEEE Computer Society, (2012)Private Cluster Head Election in Wireless Sensor Networks., and . MASS, page 1048-1053. IEEE Computer Society, (2009)