2020 - ACM Senior Member
His main research concerns Computer network, Wireless ad hoc network, Computer security, Mobile ad hoc network and Vehicular ad hoc network. His Computer network research integrates issues from Distributed computing and Security association. The Wireless ad hoc network study combines topics in areas such as Wireless network and Routing protocol.
His Computer security research is multidisciplinary, incorporating perspectives in Node, Software deployment and Wireless. His work deals with themes such as Adversary and Optimized Link State Routing Protocol, which intersect with Vehicular ad hoc network. His Ad hoc wireless distribution service research focuses on subjects like Adaptive quality of service multi-hop routing, which are linked to Delay-tolerant networking.
Levente Buttyán mostly deals with Computer network, Computer security, Wireless sensor network, Wireless ad hoc network and Distributed computing. His Computer network research is multidisciplinary, relying on both Key distribution in wireless sensor networks and Wireless network. His Computer security study frequently links to adjacent areas such as Internet privacy.
Levente Buttyán has included themes like Mobile ad hoc network, Node, Packet forwarding and Nash equilibrium in his Wireless ad hoc network study. The concepts of his Distributed computing study are interwoven with issues in Link-state routing protocol and Dynamic Source Routing. He interconnects Wireless Routing Protocol and Adaptive quality of service multi-hop routing in the investigation of issues within Ad hoc wireless distribution service.
The scientist’s investigation covers issues in Computer security, Cryptography, Computer network, Distributed computing and Wireless sensor network. Levente Buttyán combines subjects such as Session and Vehicular ad hoc network with his study of Computer security. His Cryptography research is multidisciplinary, incorporating elements of Object, Bootstrapping, Artificial intelligence and Obfuscation.
His Computer network study frequently involves adjacent topics like Fuzz testing. His research investigates the connection between Distributed computing and topics such as Robustness that intersect with issues in Network configuration, Adversarial system, Software deployment, Network topology and Denial-of-service attack. His study in Wireless sensor network is interdisciplinary in nature, drawing from both Wireless ad hoc network, Data security and Telecommunications.
Computer security, Cryptography, Malware, Computer network and Wireless sensor network are his primary areas of study. His research integrates issues of Control models, Order and Game theory in his study of Computer security. His Cryptographic primitive study in the realm of Cryptography interacts with subjects such as Work.
The various areas that Levente Buttyán examines in his Computer network study include Denial-of-service attack, Distributed computing and Robustness. His Distributed computing research includes themes of Hash chain, Overhead and Reliability. His Wireless sensor network study combines topics in areas such as Adversarial system, Software deployment, Hash function, Merkle tree and Protocol.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Stimulating cooperation in self-organizing mobile ad hoc networks
Levente Buttyán;Jean-Pierre Hubaux.
Mobile Networks and Applications (2003)
Self-organized public-key management for mobile ad hoc networks
S. Capkun;L. Buttyan;J.-P. Hubaux.
IEEE Transactions on Mobile Computing (2003)
The quest for security in mobile ad hoc networks
Jean-Pierre Hubaux;Levente Buttyán;Srdan Capkun.
mobile ad hoc networking and computing (2001)
Enforcing service availability in mobile ad-hoc WANs
Levente Buttyán;Jean-Pierre Hubaux.
mobile ad hoc networking and computing (2000)
Secure vehicular communication systems: design and architecture
P. Papadimitratos;L. Buttyan;T. Holczer;E. Schoch.
IEEE Communications Magazine (2008)
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Srdjan Čapkun;Levente Buttyán;Jean-Pierre Hubaux.
security of ad hoc and sensor networks (2003)
Self organization in mobile ad hoc networks: the approach of Terminodes
L. Blazevic;L. Buttyan;S. Capkun;S. Giordano.
IEEE Communications Magazine (2001)
Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks
Levente Buttyan;Jean-Pierre Hubaux.
(2001)
Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing
Levente Buttyan;Jean-Pierre Hubaux.
(2007)
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
M. Felegyhazi;J.-P. Hubaux;L. Buttyan.
IEEE Transactions on Mobile Computing (2006)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
École Polytechnique Fédérale de Lausanne
ETH Zurich
University of Ulm
ZapFraud
Royal Institute of Technology
University of Maryland, College Park
University of Melbourne
University of Maryland, College Park
University of Applied Sciences and Arts of Southern Switzerland
Rutgers, The State University of New Jersey
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: