Abdullatif Shikfa

According to our database1, Abdullatif Shikfa authored at least 24 papers between 2005 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Securing Aggregate Queries for DNA Databases.
IEEE Trans. Cloud Computing, 2019

Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices.
Computer Communications, 2019

Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

Substring search over encrypted data.
Journal of Computer Security, 2018

A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

An efficient instance hiding scheme.
Proceedings of the Seventh Symposium on Information and Communication Technology, 2016

A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Semantic search over encrypted data.
Proceedings of the 20st International Conference on Telecommunications, 2013

Searchable Encryption Supporting General Boolean Expression Queries.
Proceedings of the Financial Cryptography and Data Security, 2013

Boolean symmetric searchable encryption.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Local key management in opportunistic networks.
IJCNDS, 2012

On The Limits of Privacy Provided by Order-Preserving Encryption.
Bell Labs Technical Journal, 2012

Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

The F_f-Family of Protocols for RFID-Privacy and Authentication.
IEEE Trans. Dependable Sec. Comput., 2011

Broker-Based Private Matching.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Privacy and confidentiality in context-based and epidemic forwarding.
Computer Communications, 2010

Bootstrapping security associations in opportunistic networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Security issues in opportunistic networks.
Proceedings of the Second International Workshop on Mobile Opportunistic Networking, 2010

Privacy in context-based and epidemic forwarding.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

Privacy-Preserving Content-Based Publish/Subscribe Networks.
Proceedings of the Emerging Challenges for Security, 2009

Privacy in Content-Based Opportunistic Networks.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

The Ff-Family of Protocols for RFID-Privacy and Authentication.
IACR Cryptology ePrint Archive, 2008

Optimistic fair exchange for secure forwarding.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

User Profile Management in Converged Networks (Episode II): "Share your Data, Keep your Secrets".
Proceedings of the CIDR 2005, 2005