You are here

Huszti Andrea

Huszti Andrea

Name: Huszti Andrea
Other profiles: MTMT
Profession: IT specialist

Publication list

Uploaded publications:
25
Publications in DEA:
25
OA:
2
Date range:
2006-2022
2022
  1. Bertók, C., Huszti, A., Kovács, S., Oláh, N.: Provably Secure Identity-Based Remote Password Registration.
    Publ. Math. Debr. 100 (Suppl.), 533-565, 2022.
    Journal metrics:
    Q2 Mathematics (miscellaneous) (2021)
  2. Huszti, A., Kovács, S., Oláh, N.: Scalable, password-based and threshold authentication for smart homes.
    Int. J. Inf. Secur. 21 707-723, 2022.
    Journal metrics:
    Q2 Computer Networks and Communications (2021)
    Q2 Information Systems (2021)
    Q2 Safety, Risk, Reliability and Quality (2021)
    Q2 Software (2021)
2021
  1. Huszti, A., Kovács, S., Oláh, N.: Hybrid anonymous message broadcast for VANETs.
    In: 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, Piscataway, 103-108, 2021. ISBN: 9781665428545
2020
  1. Huszti, A., Oláh, N.: Provably Secure Scalable Distributed Authentication for Clouds.
    In: Cryptology and Network Security. Eds.: Stephan Krenn, Haya Shulman, Serge Vaudenay, Springer, Cham, 188-210, 2020, (Lecture Notes in Computer Science, ISSN 0302-9743 ; 12579) ISBN: 9783030654108
2019
  1. Huszti, A., Oláh, N.: Provably Secure Authenticated Key Agreement with Key Confirmation for Distributed Systems.
    In: International Conference for Internet Technology and Secured Transactions, Infonomics Society, London, 69-75, 2019. ISBN: 9781913572068
  2. Huszti, A., Kovács, Z.: Proving Anonymity for BILMIX.
    J. Univers. Comput. Sci. 24 (7), 892-915, 2019.
    Journal metrics:
    Q2 Computer Science (miscellaneous)
    Q4 Theoretical Computer Science
  3. Huszti, A., Oláh, N.: Security analysis of a cloud authentication protocol using applied pi-calculus.
    Int. J. Internet Prot. Technol. 12 (1), 16-25, 2019.
    Journal metrics:
    Q4 Computer Networks and Communications
2018
  1. Huszti, A., Oláh, N.: Identity-Based Cloud Authentication Protocol.
    In: The 11th Conference of PhD Students in Computer Science : Volume of short papers, University of Szeged, Szeged, 33-36, 2018.
2016
  1. Huszti, A., Oláh, N.: A simple authentication scheme for clouds.
    In: 2016 IEEE Conference on Communications and Network Security. Ed.: Jie Wu, IEEE Computer Society, Washingon, 565-569, 2016. ISBN: 9781509030651
2015
  1. Huszti, A., Kovács, Z.: Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation.
    In: ICISSP 2015 : Proceedings of the 1st International Conference on Information Systems Security and Privacy, February 9-11, 2015, in ESEO, Angers, Loire Valley, France. Eds.: Olivier Camp [et al.], Scitepress, Setúbal, 238-245, 2015. ISBN: 9789897580819
2014
  1. Huszti, A.: Anonymous multi-vendor micropayment scheme based on bilinear maps.
    International Conference on Information Society (i-Society) 25-30, 2014.
2013
  1. Huszti, A.: Multi-Vendor PayWord with Payment Approval.
    In: Proceedings of The 2013 International Conference on Security & Management / (ed.) Kevin Diami, Hamid R. Arabnia, CSREA Press, Las Vegas, 265-271, 2013. ISBN: 1601322593
2012
  1. Huszti, A., Aszalós, L.: Payment approval for PayWord.
    In: Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers. / Dong Hoon Lee, Mot Yung (eds.), Springer, Berlin ; New York, 161-176, 2012, (Lecture Notes in Computer Science ; 7690)
2011
  1. Huszti, A.: A Homomorphic Encryption-Based Secure Electronic Voting Scheme.
    Publ. Math.-Debr. 79 (3-4), 479-496, 2011.
    Journal metrics:
    Q3 Mathematics (miscellaneous)
  2. Aszalós, L., Huszti, A.: Applying Spi-calculus for PayWord.
    In: Proceedings of The 8th International Conference on Applied Informatics : Eger, Hungary, January 27 - 30, 2010. Ed.: Attila Egri-Nagy [et al.], [Eszterházy Károly Főiskola], [Eger], 295-302, [2011]. ISBN: 9789639894723
  3. Huszti, A.: Experiment-based Definitions for Electronic Exam Systems.
    In: MATCOS-10 : Proceedings of the Mini-Conference on Applied Theoretical Computer Science. Ed.: Andrej Brodnik, Gábor Galambos, University of Primorska Press, Koper, 127-130, 2011.
  4. Huszti, A., Kovács, Z.: Univerzális kriptográfiai protokoll e-felmérésekhez.
    In: Informatika a felsőoktatásban 2011 konferencia [elektronikus dokumentum] : konferencia kiadvány. Szerk.: Cser László, Herdon Miklós, Debreceni Egyetem Informatikai Kar, Debrecen, 592-600, 2011.
2010
  1. Huszti, A., Pethő, A.: A secure electronic exam system.
    Publ. Math., Debrecen. 77 (3-4), 299-312, 2010.
    Journal metrics:
    Q2 Mathematics (miscellaneous)
  2. Folláth, J., Huszti, A., Pethő, A.: Informatikai biztonság és kriptográfia.
    Kempelen Farkas Digitális Tankönyvtár, Debrecen, 237 p., 2010.
2008
  1. Huszti, A., Pethő, A.: A secure electronic exam system.
    In: Informatika a felsőoktatásban 2008. Konferencia. [elektronikus dokumentum]. Szerk.: Pethő Attila, Herdon Miklós, Debreceni Egyetem Informatikai Kar, Debrecen, , 2008.
2007
  1. Huszti, A.: A secure electronic voting scheme.
    Per. Polytech. Electr. Eng. 51 (3-4), 141-146, 2007.
  2. Folláth, J., Huszti, A., Pethő, A.: Designin asymmetric authentication system.
    In: Proceedings of the 7th International Conference on Applied Informatics, Eger, Hungary, January 28-31, 2007.. Szerk.: Emőd Kovács, Péter Olajos, Tibor Tómács, BVB Nyomda és Kiadó, Eger, 55-63, 2007.
  3. Huszti, A., Scheicher, K., Surer, P., Thuswaldner, J.: Three-dimensional symmetric shift radix systems.
    Acta Arith. 129 147-166, 2007.
    Journal metrics:
    Q2 Algebra and Number Theory
2006
  1. Pethő, A., Brunotte, H., Huszti, A.: Bases of canonical number systems in quartic algebraic number fields.
    J. Theor. Nr. Bordx. 18 537-557, 2006.
    Journal metrics:
    Q3 Algebra and Number Theory
updated: 2023-03-26, 01:20

SCImago quartiles of
scientific journal articles

Number of scientific articles: 9
Q2 5 (55.6%)
Q3 2 (22.2%)
Q4 1 (11.1%)
N/A 1 (11.1%)
-
OK

SCImago subject areas and categories

Mathematics (6)
Mathematics (miscellaneous) (3)
Algebra and Number Theory (2)
Theoretical Computer Science (1)
Computer Science (3)
Computer Networks and Communications (2)
Computer Science (miscellaneous) (1)
Information Systems (1)
Software (1)
Engineering (1)
Safety, Risk, Reliability and Quality (1)

Genre chart

Year chart

Language chart