Passive attack against the M2AP mutual authentication protocol for RFID tags M Bárász, B Boros, P Ligeti, K Lója, D Nagy Proc. of First International EURASIP Workshop on RFID Technology, 76-83, 2007 | 90 | 2007 |
Breaking LMAP M Bárász, B Boros, P Ligeti, K Lója, DA Nagy International Conference on RFID Security 2007, 2007 | 74 | 2007 |
On an infinite family of graphs with information ratio 2 − 1/k L Csirmaz, P Ligeti Computing 85, 127-136, 2009 | 32 | 2009 |
Reconstruction of matrices from submatrices G Kós, P Ligeti, P Sziklai Mathematics of Computation 78 (267), 1733-1747, 2009 | 19 | 2009 |
A decentralized and scalable model for resource discovery in IoT network MBM Kamel, B Crispo, P Ligeti 2019 international conference on wireless and mobile computing, networking …, 2019 | 18 | 2019 |
Attred: Attribute based resource discovery for iot MBM Kamel, Y Yan, P Ligeti, C Reich Sensors 21 (14), 4721, 2021 | 17 | 2021 |
Subwords in reverse-complement order PL Erdős, P Ligeti, P Sziklai, DC Torney Annals of Combinatorics 10 (4), 415-430, 2006 | 16 | 2006 |
Erdős–Pyber theorem for hypergraphs and secret sharing L Csirmaz, P Ligeti, G Tardos Graphs and Combinatorics 31, 1335-1346, 2015 | 14 | 2015 |
A secure federated data-driven evolutionary multi-objective optimization algorithm Q Liu, Y Yan, P Ligeti, Y Jin IEEE Transactions on Emerging Topics in Computational Intelligence, 2023 | 13 | 2023 |
Attribute-based encryption in cloud computing environment Y Yan, MBM Kamel, P Ligeti 2020 International Conference on Computing, Electronics & Communications …, 2020 | 12 | 2020 |
Distributed Address Table (DAT): A decentralized model for end-to-end communication in IoT MBM Kamel, P Ligeti, A Nagy, C Reich Peer-to-peer networking and applications, 1-16, 2022 | 9 | 2022 |
Attribute verifier for internet of things MBM Kamel, Y Yan, P Ligeti, C Reich 2022 32nd International Telecommunication Networks and Applications …, 2022 | 7 | 2022 |
Sdabe: Efficient encryption in decentralized cp-abe using secret sharing MBM Kamel, P Ligeti, C Reich 2022 International Conference on Electrical, Computer and Energy …, 2022 | 6 | 2022 |
A decentralized resource discovery using attribute based encryption for internet of things MBM Kamel, Y Yan, P Ligeti, C Reich 2020 4th Cyber Security in Networking Conference (CSNet), 1-3, 2020 | 6 | 2020 |
Some applications of finite geometry for secure network coding SL Fancsali, P Ligeti Journal of Mathematical Cryptology 2 (3), 209-225, 2008 | 6 | 2008 |
D3vn: Decentralized abe-based distributed data validation network MBM Kamel, P Ligeti, C Reich Proceedings of Seventh International Congress on Information and …, 2022 | 5 | 2022 |
Security verification of key exchange in ciphertext-policy attribute based encryption B Bat-Erdene, Y Yan, MBM Kamel, P Ligeti 2022 7th International Conference on Signal and Image Processing (ICSIP …, 2022 | 5 | 2022 |
Poster: ODABE: Outsourced Decentralized CP-ABE in Internet of Things MBM Kamel, P Ligeti, C Reich International Conference on Applied Cryptography and Network Security, 611-615, 2022 | 5 | 2022 |
On the information ratio of graphs without high-degree neighbors M Gyarmati, P Ligeti Discrete Applied Mathematics 304, 55-62, 2021 | 5 | 2021 |
Lamred: location-aware and decentralized multi-layer resource discovery for IoT MB Kamel, P Ligeti, C Reich Acta Cybernetica 25 (2), 319-349, 2021 | 5 | 2021 |