Róbert Schulcz
Budapest University of Technology and Economics
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Róbert Schulcz.
international telecommunications network strategy and planning symposium | 2014
Zoltán Faigl; Zsolt Szabó; Róbert Schulcz
Integration of application layer traffic optimization (ALTO) in software-defined mobile networks could have several benefits for orchestration of endpoint selection for distributed services. ALTO can provide guidance, e.g., in the redirection of end users to appropriate in-network cache, content distribution network server or virtual network function instance during service chaining. ALTO service provides appropriate level of abstraction of network and cost maps, enforcing the policies of mobile network operator and optionally other actors, but keeping the privacy of network topology information. SDN controllers can enforce flow redirection and can dynamically provide abstracted network and cost maps to ALTO server. In this paper we present the operation of ALTO in software-defined networks from the point of view of mobile network operators, and describe our proof-of-concept implementation.
international conference on emerging security information, systems and technologies | 2009
Gábor György Gulyás; Róbert Schulcz; Sándor Imre
As social networking services are getting more and more common, the need for privacy enhancing options, sophisticated identity management and anonymity emerges. In this paper the authors propose using Role-Based Privacy as a response for these needs and introduce a novel model called Nexus-Identity Network that is capable of describing services extended with such functionality. The concerned principles of Role-Based Privacy are conferred in the paper and criteria are presented for anonymity. Conforming to the criteria the authors suggest storing the profiles of different identities in a tree hierarchy in a user-friendly manner. The analysis of anonymity shows that the network has a structure that can be easily interpreted similarly to graphs representing connections in regular social networks. The ease of profile management and network visualization are advantages of the Nexus-Identity Model which can make a social networking service privacy- and user-friendly as well.
international conference on indoor positioning and indoor navigation | 2010
Róbert Schulcz; Gábor Varga; László T. Tóth
The present research was conducted at the Budapest University of Technology in the field of indoor location using radio waves of Wi-Fi networks with a focus on practical application issues. Our goal was to enhance and combine existing algorithms and create an implementation that is efficient enough to enable real-time operation in 3D space in multi-level office environments while retaining the accuracy of more complex systems and allowing the addition of valuable context-sensitive features.
The 9th International Conference on Applied Informatics | 2015
Tamás Varga; Róbert Schulcz
Relay attacks are attacks on systems’ security involving a malicious third party interrupting communication between legitimate parties A and B. During a relay attack the malicious third party forwards messages between parties A and B without changing any of the messages thus relay attack can be interpreted as a special case of man-in-the-middle attacks. Its purpose is often eavesdropping on communication links but relay attack is also capable to change the chronology of events and extend the range of the communication link. The relay attack against RFID or NFC communication links is often implemented to impersonate a device at a distant location. In our work our goal is to discuss the general properties of attacks and specifically the relay attacks on RFID and NFC systems and to enumerate the relay attacks on RFID and NFC devices discussed in papers. Our work also contains thoughts of feasible defence techniques against the relay attacks.
bioinspired models of network, information, and computing systems | 2007
Borbala Katalin Benko; Róbert Schulcz
In this paper, we present the functionality mapping model that is used in the CASCADAS ACE model: external code libraries are transformed into services of an autonomic element. CASACDAS is an EU 6th Framework IST-FET project in the field of situated, autonomic communication; various research topics are organized around a common abstraction called Autonomic Communication Element (ACE). When designing this common abstraction, a big challenge is to define a natural, non-complex but flexible and expressive way for transforming existing code (libraries) into autonomic services of an ACE. In this paper, we introduce, explain, and discuss the developed model, and compare them with existing functionality mapping technologies.
Lecture Notes in Computer Science | 2003
Sándor Imre; László Pap; Ferenc Balázs; János Horváth Cz.; Róbert Schulcz; Sándor Szabó
The SONG project was formed in 2001, when research team of Mobile Communications and Computing Laboratory (MCL) at Budapest University of Technology and Economics (BUTE) joined the Inter-University Centre for Telecommunications and Informatics (ETIK). ETIK consists of academic research teams form BUTE and Eotvos Lorand University of Sciences (ELTE) and industrial partners among the leaders of information technology in Hungary. Industrial members are: Ericsson Communications Systems Hungary Ltd., KFKI Computer Systems Sc., Hungarian Telecommunications Sc., Sun Microsystems Hungary Ltd., Westel Mobile Telecommunications Sc., Compaq Computer Hungary Ltd., Antenna Hungaria Sc., Computer Science and Automation Research Institute of the Hungarian Academy of Sciences.
Archive | 2012
Gábor György Gulyás; Róbert Schulcz; Sándor Imre
Periodica Polytechnica Electrical Engineering | 2011
Gábor Varga; Róbert Schulcz
Archive | 2011
Róbert Schulcz; Gábor Varga
Archive | 2007
Borbala Katalin Benko; Tamas Katona; Róbert Schulcz