Refik Molva

According to our database1, Refik Molva authored at least 132 papers between 1991 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Privacy-preserving delegable authentication in the internet of things.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
Device Identification and Personal Data Attestation in Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Secure and Scalable Multi-User Searchable Encryption.
IACR Cryptol. ePrint Arch., 2018

CHARIOT: Cloud-Assisted Access Control for the Internet of Things.
IACR Cryptol. ePrint Arch., 2018

Lightweight secure bootstrap and message attestation in the internet of things.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Efficient Proof Composition for Verifiable Computation.
Proceedings of the Computer Security, 2018

Framework for Searchable Encryption with SQL Databases.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018

POROS: Proof of Data Reliability for Outsourced Storage.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018

2017
A Leakage-Abuse Attack Against Multi-User Searchable Encryption.
Proc. Priv. Enhancing Technol., 2017

Embedded Proofs for Verifiable Neural Networks.
IACR Cryptol. ePrint Arch., 2017

2016
Message-Locked Proofs of Retrievability with Secure Deduplication.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

Efficient Techniques for Publicly Verifiable Delegation of Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
PUDA - Privacy and Unforgeability for Data Aggregation.
IACR Cryptol. ePrint Arch., 2015

Online-Offline Homomorphic Signatures for Polynomial Functions.
IACR Cryptol. ePrint Arch., 2015

Multi-user Searchable Encryption in the Cloud.
Proceedings of the Information Security - 18th International Conference, 2015

PerfectDedup: Secure Data Deduplication.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Publicly verifiable conjunctive keyword search in outsourced databases.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Block-level De-duplication with Encrypted Data.
Open J. Cloud Comput., 2014

Private and Dynamic Time-Series Data Aggregation with Trust Relaxation.
IACR Cryptol. ePrint Arch., 2014

Privacy preserving delegated word search in the cloud.
IACR Cryptol. ePrint Arch., 2014

A P2P based usage control enforcement scheme resilient to re-injection attacks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Privacy Preserving Statistics in the Smart Grid.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

StealthGuard: Proofs of Retrievability with Hidden Watchdogs.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems".
Secur. Commun. Networks, 2013

PSP: Private and secure payment with RFID.
Comput. Commun., 2013

Secure Alert Tracking in Supply Chain.
Proceedings of the SECRYPT 2013, 2013

ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Privacy Preserving Similarity Detection for Data Analysis.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
Local key management in opportunistic networks.
Int. J. Commun. Networks Distributed Syst., 2012

T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags.
IACR Cryptol. ePrint Arch., 2012

PRICE: Privacy preserving incentives for cooperation enforcement.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks.
Proceedings of the Fifth Workshop on Social Network Systems, 2012

Accountability for cloud and other future Internet services.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Secure Product Tracking in Supply Chain.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
The F_f-Family of Protocols for RFID-Privacy and Authentication.
IEEE Trans. Dependable Secur. Comput., 2011

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems.
J. Netw. Comput. Appl., 2011

CHECKER: On-site checking in RFID-based supply chains.
IACR Cryptol. ePrint Arch., 2011

PRISM - Privacy-Preserving Search in MapReduce.
IACR Cryptol. ePrint Arch., 2011

Research challenges towards the Future Internet.
Comput. Commun., 2011

Message from the workshop chairs.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Safebook: A distributed privacy preserving Online Social Network.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Catch the Jammer in Wireless Sensor Network.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Broker-Based Private Matching.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Analysis of Privacy in Online Social Networks from the Graph Theory Perspective.
Proceedings of the Global Communications Conference, 2011

Demo: the f<sub>f</sub> hardware prototype for privacy-preserving RFID authentication.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
ROTIV: RFID Ownership Transfer with Issuer Verification.
IACR Cryptol. ePrint Arch., 2010

Tracker: Security and Privacy for RFID-based Supply Chains.
IACR Cryptol. ePrint Arch., 2010

A provably secure secret handshake with dynamic controlled matching.
Comput. Secur., 2010

Privacy and confidentiality in context-based and epidemic forwarding.
Comput. Commun., 2010

Secret interest groups (SIGs) in social networks with an implementation on Facebook.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Bootstrapping security associations in opportunistic networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Federated Secret Handshakes with Support for Revocation.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
Confidentiality and integrity for data aggregation in WSN using peer monitoring.
Secur. Commun. Networks, 2009

Efficient Access Control for Wireless Sensor Data.
Int. J. Wirel. Inf. Networks, 2009

PPS: Privacy Preserving Statistics using RFID Tags.
IACR Cryptol. ePrint Arch., 2009

Safebook: A privacy-preserving online social network leveraging on real-life trust.
IEEE Commun. Mag., 2009

Efficient Access Control forWireless Sensor Data.
Ad Hoc Sens. Wirel. Networks, 2009

Privacy in context-based and epidemic forwarding.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

Privacy-Preserving Content-Based Publish/Subscribe Networks.
Proceedings of the Emerging Challenges for Security, 2009

On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network.
Proceedings of the Privacy and Identity Management for Life, 2009

Leveraging Social Links for Trust and Privacy in Networks.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

New Directions in RFID Security.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Secret Handshakes with Revocation Support.
Proceedings of the Information, Security and Cryptology, 2009

Privacy in Content-Based Opportunistic Networks.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions.
IEEE Trans. Syst. Man Cybern. Part C, 2008

Bridging Security and Fault Management within Distributed Workflow Management Systems.
IEEE Trans. Serv. Comput., 2008

Automating the Composition of Transactional Web Services.
Int. J. Web Serv. Res., 2008

The F<sub>f</sub>-Family of Protocols for RFID-Privacy and Authentication.
IACR Cryptol. ePrint Arch., 2008

Preface.
Electron. Notes Theor. Comput. Sci., 2008

Social Networking for Pervasive Adaptation.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

Efficient access control for wireless sensor data.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

2007
Establishment of Ad-Hoc Communities through Policy-Based Cryptography.
Electron. Notes Theor. Comput. Sci., 2007

Optimistic fair exchange for secure forwarding.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Secure Data Aggregation with Multiple Encryption.
Proceedings of the Wireless Sensor Networks, 2007

Information Confinement, Privacy, and Security in RFID Systems.
Proceedings of the Computer Security, 2007

Traceability and Integrity of Execution in Distributed Workflow Management Systems.
Proceedings of the Computer Security, 2007

Towards secure and trusted collaboration environment for European public sector.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach.
Proceedings of the 2007 IEEE International Conference on Services Computing, 2007

Enforcing Integrity of Execution in Distributed Workflow Management Systems.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
Identity Based Message Authentication for Dynamic Networks.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Proof-Carrying Proxy Certificates.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Collusion-Free Policy-Based Encryption.
Proceedings of the Information Security, 9th International Conference, 2006

Augmenting Web Services Composition with Transactional Requirements.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Towards Transactional PervasiveWorkflows.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

Policy-based encryption schemes from bilinear pairings.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks.
Ad Hoc Networks, 2005

Non-cooperative Forwarding in Ad-Hoc Networks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Policy-Based Cryptography and Applications.
Proceedings of the Financial Cryptography and Data Security, 2005

Enabling pervasive execution of workflows.
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005

2004
Establishing Trust with Privacy.
Proceedings of the Security Protocols, 2004

Untraceable Secret Credentials: Trust Establishment with Privacy.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

One-Time Capabilities for Authorizations without Trust.
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 2004

History-Based Signature or How to Trust Anonymous Documents.
Proceedings of the Trust Management, Second International Conference, 2004

Group Rekeying with a Customer Perspective.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Denial of service prevention in satellite networks.
Proceedings of IEEE International Conference on Communications, 2004

Reliable group rekeying with a customer perspective.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Some Game-Theoretic Problems in Wireless Ad-Hoc Networks.
Proceedings of the Wireless Systems and Mobility in Next Generation Internet, 2004

2003
Efficient Multicast Packet Authentication.
Proceedings of the Network and Distributed System Security Symposium, 2003

Security in Ad Hoc Networks.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

2002
Network Security in the Multicast Framework.
Proceedings of the Advanced Lectures on Networking, 2002

Authenticating real time packet streams and multicasts.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

Enabling adaptive and secure extranets.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Multiple layer encryption for multicast groups.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks.
Proceedings of the Advanced Communications and Multimedia Security, 2002

2001
Secure Data Collection with Updates.
Electron. Commer. Res., 2001

2000
Scalable multicast security with dynamic recipient groups.
ACM Trans. Inf. Syst. Secur., 2000

Éditorial - Sécurité dans les réseaux.
Ann. des Télécommunications, 2000

A Distributed Access Control Model for Java.
Proceedings of the Computer Security, 2000

Mobile Code, Internet Security, and E-Commerce.
Proceedings of the Object-Oriented Technology, 2000

1999
Internet security architecture.
Comput. Networks, 1999

Scalable Multicast Security in Dynamic Groups.
Proceedings of the CCS '99, 1999

1998
Secret Sets and Applications.
Inf. Process. Lett., 1998

1997
IDAMN: An Intrusion Detection Architecture for Mobile Networks.
IEEE J. Sel. Areas Commun., 1997

A Development and Runtime Platform for Teleconferencing Applications.
IEEE J. Sel. Areas Commun., 1997

1996
Robust and Secure Password and Key Change Method.
J. Comput. Secur., 1996

A software platform for distributed multimedia applications.
Proceedings of the 1996 International Workshop on Multimedia Software Development, 1996

Multi-resolution access control algorithm based on fractal coding.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

Limitations of the Approach of Solving a Network's Security Problem with a Firewall.
Proceedings of the Computer Security, 1996

1995
The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw., 1995

Untraceability in Mobile Networks.
Proceedings of the MOBICOM '95, 1995

1994
A Method Providing Identity Privacy to Mobile Users During Authentication.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

Application Access Control at Network Level.
Proceedings of the CCS '94, 1994

1993
Systematic Design of a Family of Attack-Resistant Authentication Protocols.
IEEE J. Sel. Areas Commun., 1993

Authentication method with impersonal token cards.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

1992
Architectural Directions for Opening IBM Networks: The Case of OSI.
IBM Syst. J., 1992

KryptoKnight Authentication and Key Distribution System.
Proceedings of the Computer Security, 1992

1991
Security in Open Networks and Distributed Systems.
Comput. Networks ISDN Syst., 1991

Systematic Design of Two-Party Authentication Protocols.
Proceedings of the Advances in Cryptology, 1991


  Loading...