According to our database1, Abdullatif Shikfa authored at least 24 papers between 2005 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Securing Aggregate Queries for DNA Databases.
IEEE Trans. Cloud Computing, 2019
Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices.
Computer Communications, 2019
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019
Substring search over encrypted data.
Journal of Computer Security, 2018
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
An efficient instance hiding scheme.
Proceedings of the Seventh Symposium on Information and Communication Technology, 2016
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
Semantic search over encrypted data.
Proceedings of the 20st International Conference on Telecommunications, 2013
Searchable Encryption Supporting General Boolean Expression Queries.
Proceedings of the Financial Cryptography and Data Security, 2013
Boolean symmetric searchable encryption.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Local key management in opportunistic networks.
On The Limits of Privacy Provided by Order-Preserving Encryption.
Bell Labs Technical Journal, 2012
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
The F_f-Family of Protocols for RFID-Privacy and Authentication.
IEEE Trans. Dependable Sec. Comput., 2011
Broker-Based Private Matching.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Privacy and confidentiality in context-based and epidemic forwarding.
Computer Communications, 2010
Bootstrapping security associations in opportunistic networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Security issues in opportunistic networks.
Proceedings of the Second International Workshop on Mobile Opportunistic Networking, 2010
Privacy in context-based and epidemic forwarding.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009
Privacy-Preserving Content-Based Publish/Subscribe Networks.
Proceedings of the Emerging Challenges for Security, 2009
Privacy in Content-Based Opportunistic Networks.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
The Ff-Family of Protocols for RFID-Privacy and Authentication.
IACR Cryptology ePrint Archive, 2008
Optimistic fair exchange for secure forwarding.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
User Profile Management in Converged Networks (Episode II): "Share your Data, Keep your Secrets".
Proceedings of the CIDR 2005, 2005