Publications' List

2008

E. Tóth, Z. Hornák, G. Tóth: Protection system against Overload and Distributed Denial of Service Attacks
   Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX 2008, June 16-18, 2008, Szklarska Poreba, [ENG/PDF]

G. Tóth, G. Kőszegi, Z. Hornák: Case study: automated security testing on the Trusted Computing platform
   EUROSEC 2008 Workshop, March 11, 2008, Glasgow, [ENG/PDF]

G. Kőszegi, G. Tóth, Z. Hornák: Case study: automated security testing on the Trusted Computing platform,
   OpenTC Newsletter February 2008 [ENG/HTML]

2007

G. Kőszegi, G. Tóth, Z. Hornák: Automatizált biztonsági tesztelés tapasztalatai Trusted Computing területen
   Híradástechnika, 2007/11, [HU/PDF]

P. Cuoq, R. Drahtmüller, I. Evgeniev, V. Gueorguiev, P. Herzog, Z. Hornak, V. Prevosto, A. Puccetti (eds.), G. Toth: D07.2 V&V Report #2: Methodology definition, analyses results and certification
   OpenTC deliverable IST-027635/D07.02/1.2, [ENG/PDF]

2006

G. Tóth, Z. Hornák: The Chances of Successful Attacks against Continuous-time Mixes,
   Nordsec 2006 Conference, Linköping, 19-20 October, 2006, [ENG/PDF]

G. Tóth, Z. Hornák: Security testing with source-code-based fault injection,
   Híradástechnika, 2006/05, pp 22-25, [HU/PDF]

G. Tóth: iPod's hegemony challenged,
   INDICARE (The INformed DIalogue about Consumer Acceptability of DRM Solutions in Europe), [HTML]

G. Tóth, Z. Hornák: The APROB Channel: adaptive semi-real-time anonymous communication,
   I-NetSec 2006 Conference, Karlstad, 22-24 May 2006, [ENG/PDF]

2005

G. Tóth: Axmedis plus = technology + users + consumers,
   INDICARE (The INformed DIalogue about Consumer Acceptability of DRM Solutions in Europe), [HTML]

G. Tóth: Anonymity in Continuous-time Systems,
   12th BUTE-DMIS Minisymposium, Budapest, 8-9 February 2005, [ENG/PDF (abstract)] [HUN/PPT]

2004

G. Tóth, Z. Hornák: Network architecture to provide secure anonymous communication,
   Híradástechnika 2004/12, pp. 26-28, [ENG/PDF]

G. Tóth, Z. Hornák, F. Vajda: Measuring Anonymity Revisited,
   Nordsec 2004 Workshop, Helsinki, 4-5 November 2004, [ENG/PDF] [ENG/PPT]

G. Tóth: DRM and privacy - friends or foes?,
   INDICARE (The INformed DIalogue about Consumer Acceptability of DRM Solutions in Europe), [HTML]

G. Tóth, Z. Hornák: Framework for the Integration of Anonymity Techniques,
   HISEC 2004 Conference, 26-27 October 2004, [ENG/PDF]

G. Tóth: Contest of formats,
   INDICARE (The INformed DIalogue about Consumer Acceptability of DRM Solutions in Europe), [HTML]

G. Tóth, Z. Hornák: Measuring Anonymity in a Non-adaptive, Real-time System,
   PETWorkshop 2004, Toronto, Canada, 26-28 May 2004, [ENG/PDF] [ENG/PS] [ENG/PPT]
   © Springer LNCS

G. Tóth: General-Purpose Secure Anonymity Architecture,
   11th BUTE-DMIS Minisymposium, Budapest, 3-4 February 2004, [ENG/PDF (abstract)]

2003

G. Tóth, Z. Hornák: Measuring Anonymity in a Passive, Real-time System,
   ESORICS'03 (poster), Gjovik, Norway, 13-15 October 2003, [ENG/PDF (abstract)] [ENG/PDF (poster)]

G. Tóth, Z. Hornák: Measure for Anonymity
   IWCIT'03, Gliwice, Poland, 2003. szeptember 22-23. [ENG/PDF] [ENG/PPT]

G. Tóth: Source Hiding Property of an Observable Black-box Channel,
   10th BME-DMIS Minisymposium, Budapest, Hungary, 4-5 February 2003, [ENG/PDF (abstract)] [ENG/PS (abstract)]

2002

G. Tóth: Anonymity Enhancing Protocol,
   Masters thesis, 2002, [GER/PDF (abstract)] [ENG/PDF (abstract)] [GER/PDF] [GER/PPT]

GERGELYTOTH99_AT_GMAIL.COM