A secure electronic exam system A Huszti, A Petho Publicationes Mathematicae Debrecen 77 (3-4), 299-312, 2010 | 72 | 2010 |
A homomorphic encryption-based secure electronic voting scheme A Huszti Publ. Math. Debrecen 79 (3-4), 479-496, 2011 | 33 | 2011 |
Bases of canonical number systems in quartic algebraic number fields H Brunotte, A Huszti, A Pethő Journal de théorie des nombres de Bordeaux 18 (3), 537-557, 2006 | 27 | 2006 |
A simple authentication scheme for clouds A Huszti, N Oláh 2016 IEEE Conference on Communications and Network Security (CNS), 565-569, 2016 | 16 | 2016 |
Three-dimensional symmetric shift radix systems A Huszti, K Scheicher, P Surer, JM Thuswaldner ACTA ARITHMETICA-WARSZAWA- 129 (2), 147, 2007 | 16 | 2007 |
Scalable, password-based and threshold authentication for smart homes A Huszti, S Kovács, N Oláh International Journal of Information Security 21 (4), 707-723, 2022 | 14 | 2022 |
A secure electronic voting scheme A Huszti Periodica Polytechnica Electrical Engineering (Archives) 51 (3-4), 141-146, 2007 | 10 | 2007 |
Payment approval for PayWord L Aszalós, A Huszti Lecture Notes in Computer Science, 7690, 161-176, 2012 | 9 | 2012 |
Security analysis of a cloud authentication protocol using applied pi calculus A Huszti, N Oláh International Journal of Internet Protocol Technology 12 (1), 16-25, 2019 | 7 | 2019 |
Anonymous multi-vendor micropayment scheme based on bilinear maps A Huszti International Conference on Information Society (i-Society 2014), 25-30, 2014 | 5 | 2014 |
Multi-vendor payword with payment approval A Huszti Cryptology ePrint Archive, 2014 | 5 | 2014 |
Applying Spi-calculus for PayWord L Aszalós, A Huszti Proceedings of the 8th ICAI Conference, Eger, 295-302, 2010 | 5 | 2010 |
Secure Registration Protocol for the Internet of Drones Using Blockchain and Physical Unclonable Function Technology N Oláh, B Molnár, A Huszti Symmetry 15 (10), 1886, 2023 | 4 | 2023 |
Provably secure identity-based remote password registration C Bertók, A Huszti, S Kovács, N Oláh Cryptology ePrint Archive, 2022 | 3 | 2022 |
Bilinear pairing-based hybrid mixnet with anonymity revocation A Huszti, Z Kovács 2015 International Conference on Information Systems Security and Privacy …, 2015 | 3 | 2015 |
A multi-round bilinear-map-based secure password hashing scheme C Bertók, A Huszti, T Kádek, Z Jámbor 2022 IEEE 2nd Conference on Information Technology and Data Science (CITDS …, 2022 | 2 | 2022 |
Designin asymmetric authentication system J Folláth, A Huszti, A PETHO Proceedings of the 7th ICAI Conference, Eger, 53-61, 2007 | 2 | 2007 |
Hybrid anonymous message broadcast for vanets A Huszti, S Kovács, N Oláh 2021 17th International Conference on Wireless and Mobile Computing …, 2021 | 1 | 2021 |
Provably Secure Scalable Distributed Authentication for Clouds A Huszti, N Oláh International Conference on Cryptology and Network Security, 188-210, 2020 | 1 | 2020 |
Proving Anonymity for BILMIX. A Huszti, Z Kovács J. Univers. Comput. Sci. 24 (7), 892-915, 2018 | 1 | 2018 |