Abdullatif Shikfa

According to our database1, Abdullatif Shikfa authored at least 24 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Securing Aggregate Queries for DNA Databases.
IEEE Trans. Cloud Computing, 2019

Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices.
Computer Communications, 2019

Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

2018
Substring search over encrypted data.
Journal of Computer Security, 2018

2017
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
An efficient instance hiding scheme.
Proceedings of the Seventh Symposium on Information and Communication Technology, 2016

2014
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Semantic search over encrypted data.
Proceedings of the 20st International Conference on Telecommunications, 2013

Searchable Encryption Supporting General Boolean Expression Queries.
Proceedings of the Financial Cryptography and Data Security, 2013

Boolean symmetric searchable encryption.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Local key management in opportunistic networks.
IJCNDS, 2012

On The Limits of Privacy Provided by Order-Preserving Encryption.
Bell Labs Technical Journal, 2012

Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
The F_f-Family of Protocols for RFID-Privacy and Authentication.
IEEE Trans. Dependable Sec. Comput., 2011

Broker-Based Private Matching.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

2010
Privacy and confidentiality in context-based and epidemic forwarding.
Computer Communications, 2010

Bootstrapping security associations in opportunistic networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Security issues in opportunistic networks.
Proceedings of the Second International Workshop on Mobile Opportunistic Networking, 2010

2009
Privacy in context-based and epidemic forwarding.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

Privacy-Preserving Content-Based Publish/Subscribe Networks.
Proceedings of the Emerging Challenges for Security, 2009

Privacy in Content-Based Opportunistic Networks.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
The Ff-Family of Protocols for RFID-Privacy and Authentication.
IACR Cryptology ePrint Archive, 2008

2007
Optimistic fair exchange for secure forwarding.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

2005
User Profile Management in Converged Networks (Episode II): "Share your Data, Keep your Secrets".
Proceedings of the CIDR 2005, 2005


  Loading...