% csauthors.net - beta - BibTeX bibliography of Refik Molva
@inproceedings{conf/crypto/BirdGHJKMY91,
title = {Systematic Design of Two-Party Authentication Protocols.},
year = {1991},
booktitle = {CRYPTO},
author = {{Ray Bird} and {Inder S. Gopal} and {Amir Herzberg} and {Philippe A. Janson} and {Shay Kutten} and {Refik Molva} and {Moti Yung}},
publisher = {Springer},
booktitle = {Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}
}
@article{journals/cn/JansonM91,
title = {Security in Open Networks and Distributed Systems.},
year = {1991},
journal = {Comput. Networks ISDN Syst.},
author = {{Philippe A. Janson} and {Refik Molva}}
}
@inproceedings{conf/esorics/MolvaTHZ92,
title = {KryptoKnight Authentication and Key Distribution System.},
year = {1992},
booktitle = {ESORICS},
author = {{Refik Molva} and {Gene Tsudik} and {Els Van Herreweghen} and {Stefano Zatti}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings}
}
@article{journals/ibmsj/JansonMZ92,
title = {Architectural Directions for Opening IBM Networks: The Case of OSI.},
year = {1992},
journal = {IBM Syst. J.},
author = {{Philippe A. Janson} and {Refik Molva} and {Stefano Zatti}}
}
@inproceedings{conf/sp/MolvaT93,
title = {Authentication method with impersonal token cards.},
year = {1993},
booktitle = {S&P},
author = {{Refik Molva} and {Gene Tsudik}},
publisher = {IEEE Computer Society},
booktitle = {1993 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}
}
@article{journals/jsac/BirdGHJKMY93,
title = {Systematic Design of a Family of Attack-Resistant Authentication Protocols.},
year = {1993},
journal = {IEEE J. Sel. Areas Commun.},
author = {{Ray Bird} and {Inder S. Gopal} and {Amir Herzberg} and {Philippe A. Janson} and {Shay Kutten} and {Refik Molva} and {Moti Yung}}
}
@inproceedings{conf/ccs/MolvaR94,
title = {Application Access Control at Network Level.},
year = {1994},
booktitle = {CCS},
author = {{Refik Molva} and {Erich Rütsche}},
publisher = {ACM},
booktitle = {CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994.}
}
@inproceedings{conf/wmcsa/SamfatM94,
title = {A Method Providing Identity Privacy to Mobile Users During Authentication.},
year = {1994},
booktitle = {WMCSA},
author = {{Didier Samfat} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {First Workshop on Mobile Computing Systems and Applications, WMCSA 1994, Santa Cruz, CA, USA, December 8-9, 1994}
}
@article{journals/network/MolvaST94,
title = {Authentication of mobile users.},
year = {1994},
journal = {IEEE Netw.},
author = {{Refik Molva} and {Didier Samfat} and {Gene Tsudik}}
}
@inproceedings{conf/mobicom/SamfatMA95,
title = {Untraceability in Mobile Networks.},
year = {1995},
booktitle = {MobiCom},
author = {{Didier Samfat} and {Refik Molva} and {N. Asokan}},
publisher = {ACM},
booktitle = {MOBICOM '95, Proceedings of the First Annual International Conference on Mobile Computing and Networking, Berkeley, CA, USA, November 13-15, 1995.}
}
@article{journals/ton/BirdGHJKMY95,
title = {The KryptoKnight family of light-weight protocols for authentication and key distribution.},
year = {1995},
journal = {IEEE/ACM Trans. Netw.},
author = {{Ray Bird} and {Inder S. Gopal} and {Amir Herzberg} and {Philippe A. Janson} and {Shay Kutten} and {Refik Molva} and {Moti Yung}}
}
@inproceedings{conf/esorics/ZattiMTTK96,
title = {Limitations of the Approach of Solving a Network's Security Problem with a Firewall.},
year = {1996},
booktitle = {ESORICS},
author = {{Stefano Zatti} and {Refik Molva} and {Angelo Tosi} and {Gene Tsudik} and {Helmut Kurth}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings}
}
@inproceedings{conf/icip/RocheDM96,
title = {Multi-resolution access control algorithm based on fractal coding.},
year = {1996},
booktitle = {ICIP (3)},
author = {{Stéphane Roche} and {Jean-Luc Dugelay} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16-19, 1996}
}
@inproceedings{conf/ismse/0003M96,
title = {A software platform for distributed multimedia applications.},
year = {1996},
booktitle = {MMSD},
author = {{Christian Blum 003} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the 1996 International Workshop on Multimedia Software Development, MMSD 1996, Berlin, Germany, March 25-26, 1996}
}
@article{journals/jcs/HauserJMTH96,
title = {Robust and Secure Password and Key Change Method.},
year = {1996},
journal = {J. Comput. Secur.},
author = {{Ralf C. Hauser} and {Philippe A. Janson} and {Refik Molva} and {Gene Tsudik} and {Els Van Herreweghen}}
}
@article{journals/jsac/BlumDMS97,
title = {A Development and Runtime Platform for Teleconferencing Applications.},
year = {1997},
journal = {IEEE J. Sel. Areas Commun.},
author = {{Christian Blum 003} and {Philippe Dubois} and {Refik Molva} and {Olivier Schaller}}
}
@article{journals/jsac/SamfatM97,
title = {IDAMN: An Intrusion Detection Architecture for Mobile Networks.},
year = {1997},
journal = {IEEE J. Sel. Areas Commun.},
author = {{Didier Samfat} and {Refik Molva}}
}
@article{journals/ipl/MolvaT98,
title = {Secret Sets and Applications.},
year = {1998},
journal = {Inf. Process. Lett.},
author = {{Refik Molva} and {Gene Tsudik}}
}
@inproceedings{conf/ccs/MolvaP99,
title = {Scalable Multicast Security in Dynamic Groups.},
year = {1999},
booktitle = {CCS},
author = {{Refik Molva} and {Alain Pannetrat}},
publisher = {ACM},
booktitle = {CCS '99, Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, November 1-4, 1999.}
}
@article{journals/cn/Molva99,
title = {Internet security architecture.},
year = {1999},
journal = {Comput. Networks},
author = {{Refik Molva}}
}
@inproceedings{conf/ecoopw/MolvaB00,
title = {Mobile Code, Internet Security, and E-Commerce.},
year = {2000},
booktitle = {ECOOP Workshops},
author = {{Refik Molva} and {Françoise Baude}},
publisher = {Springer},
booktitle = {Object-Oriented Technology, ECOOP 2000 Workshops, Panels, and Posters, Sophia Antipolis and Cannes, France, June 12-16, 2000, Proceedings}
}
@inproceedings{conf/esorics/MolvaR00,
title = {A Distributed Access Control Model for Java.},
year = {2000},
booktitle = {ESORICS},
author = {{Refik Molva} and {Yves Roudier}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings}
}
@article{journals/adt/MolvaO00,
title = {Éditorial - Sécurité dans les réseaux.},
year = {2000},
journal = {Ann. des Télécommunications},
author = {{Refik Molva} and {Rolf Oppliger}}
}
@article{journals/tissec/MolvaP00,
title = {Scalable multicast security with dynamic recipient groups.},
year = {2000},
journal = {ACM Trans. Inf. Syst. Secur.},
author = {{Refik Molva} and {Alain Pannetrat}}
}
@article{journals/ecr/LoureiroMP01,
title = {Secure Data Collection with Updates.},
year = {2001},
journal = {Electron. Commer. Res.},
author = {{Sergio Loureiro} and {Refik Molva} and {Alain Pannetrat}}
}
@inproceedings{conf/cms/MichiardiM02,
title = {Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks.},
year = {2002},
booktitle = {Communications and Multimedia Security},
author = {{Pietro Michiardi} and {Refik Molva}},
publisher = {Kluwer},
booktitle = {Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia}
}
@inproceedings{conf/cms/PannetratM02,
title = {Multiple layer encryption for multicast groups.},
year = {2002},
booktitle = {Communications and Multimedia Security},
author = {{Alain Pannetrat} and {Refik Molva}},
publisher = {Kluwer},
booktitle = {Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia}
}
@inproceedings{conf/cms/RoudierFVM02,
title = {Enabling adaptive and secure extranets.},
year = {2002},
booktitle = {Communications and Multimedia Security},
author = {{Yves Roudier} and {Olivier Fouache} and {Pierre Vannel} and {Refik Molva}},
publisher = {Kluwer},
booktitle = {Advanced Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia}
}
@inproceedings{conf/iscc/PannetratM02,
title = {Authenticating real time packet streams and multicasts.},
year = {2002},
booktitle = {ISCC},
author = {{Alain Pannetrat} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy}
}
@inproceedings{conf/networking/MolvaP02,
title = {Network Security in the Multicast Framework.},
year = {2002},
booktitle = {NETWORKING Tutorials},
author = {{Refik Molva} and {Alain Pannetrat}},
publisher = {Springer},
booktitle = {Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]}
}
@inproceedings{conf/ifip6-8/MolvaM03,
title = {Security in Ad Hoc Networks.},
year = {2003},
booktitle = {PWC},
author = {{Refik Molva} and {Pietro Michiardi}},
publisher = {Springer},
booktitle = {Personal Wireless Communications, IFIP-TC6 8th International Conference, PWC 2003, Venice, Italy, September 23-25, 2003, Proceedings}
}
@inproceedings{conf/ndss/PannetratM03,
title = {Efficient Multicast Packet Authentication.},
year = {2003},
booktitle = {NDSS},
author = {{Alain Pannetrat} and {Refik Molva}},
publisher = {The Internet Society},
booktitle = {Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, San Diego, California, USA}
}
@inproceedings{conf/eurongi/AltmanBKMM04,
title = {Some Game-Theoretic Problems in Wireless Ad-Hoc Networks.},
year = {2004},
booktitle = {EuroNGI Workshop},
author = {{Eitan Altman} and {Vivek S. Borkar} and {Arzad Alam Kherani} and {Pietro Michiardi} and {Refik Molva}},
publisher = {Springer},
booktitle = {Wireless Systems and Mobility in Next Generation Internet, First International Workshop of the EURO-NGI Network of Excellence, Dagstuhl Castle, Germany, June 7-9, 2004, Revised Selected Papers}
}
@inproceedings{conf/globecom/OnenM04,
title = {Reliable group rekeying with a customer perspective.},
year = {2004},
booktitle = {GLOBECOM},
author = {{Melek Önen} and {Refik Molva}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November - 3 December 2004}
}
@inproceedings{conf/icc/OnenM04,
title = {Denial of service prevention in satellite networks.},
year = {2004},
booktitle = {ICC},
author = {{Melek Önen} and {Refik Molva}},
publisher = {IEEE},
booktitle = {Proceedings of IEEE International Conference on Communications, ICC 2004, Paris, France, 20-24 June 2004}
}
@inproceedings{conf/icpads/OnenM04,
title = {Group Rekeying with a Customer Perspective.},
year = {2004},
booktitle = {ICPADS},
author = {{Melek Önen} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {10th International Conference on Parallel and Distributed Systems, ICPADS 2004, Newport Beach, CA, USA, July 7-9, 2004}
}
@inproceedings{conf/itrust/BussardMR04,
title = {History-Based Signature or How to Trust Anonymous Documents.},
year = {2004},
booktitle = {iTrust},
author = {{Laurent Bussard} and {Refik Molva} and {Yves Roudier}},
publisher = {Springer},
booktitle = {Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings}
}
@inproceedings{conf/percom/BussardM04,
title = {One-Time Capabilities for Authorizations without Trust.},
year = {2004},
booktitle = {PerCom},
author = {{Laurent Bussard} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 14-17 March 2004, Orlando, FL, USA}
}
@inproceedings{conf/percom/BussardRM04,
title = {Untraceable Secret Credentials: Trust Establishment with Privacy.},
year = {2004},
booktitle = {PerCom Workshops},
author = {{Laurent Bussard} and {Yves Roudier} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, USA}
}
@inproceedings{conf/spw/BussardM04,
title = {Establishing Trust with Privacy.},
year = {2004},
booktitle = {Security Protocols Workshop},
author = {{Laurent Bussard} and {Refik Molva}},
publisher = {Springer},
booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}
}
@inproceedings{conf/colcom/MontagutM05,
title = {Enabling pervasive execution of workflows.},
year = {2005},
booktitle = {CollaborateCom},
author = {{Frederic Montagut} and {Refik Molva}},
publisher = {IEEE Computer Society / ICST},
booktitle = {Proceedings of the 1st International Conference on Collaborative Computing: Networking, Applications and Worksharing, San Jose, CA, USA, December 19-21, 2005}
}
@inproceedings{conf/fc/BaggaM05,
title = {Policy-Based Cryptography and Applications.},
year = {2005},
booktitle = {Financial Cryptography},
author = {{Walid Bagga} and {Refik Molva}},
publisher = {Springer},
booktitle = {Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}
}
@inproceedings{conf/networking/AltmanKMM05,
title = {Non-cooperative Forwarding in Ad-Hoc Networks.},
year = {2005},
booktitle = {NETWORKING},
author = {{Eitan Altman} and {Arzad Alam Kherani} and {Pietro Michiardi} and {Refik Molva}},
publisher = {Springer},
booktitle = {NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings}
}
@article{journals/adhoc/Molva05,
title = {Analysis of coalition formation and cooperation strategies in mobile ad hoc networks.},
year = {2005},
journal = {Ad Hoc Networks},
author = {{Pietro Michiardi} and {Refik Molva}}
}
@inproceedings{conf/ccs/BaggaMC06,
title = {Policy-based encryption schemes from bilinear pairings.},
year = {2006},
booktitle = {AsiaCCS},
author = {{Walid Bagga} and {Refik Molva} and {Stefano Crosta}},
publisher = {ACM},
booktitle = {Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006}
}
@inproceedings{conf/edoc/MontagutM06,
title = {Towards Transactional PervasiveWorkflows.},
year = {2006},
booktitle = {EDOC},
author = {{Frederic Montagut} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 16-20 October 2006, Hong Kong, China}
}
@inproceedings{conf/icws/MontagutM06,
title = {Augmenting Web Services Composition with Transactional Requirements.},
year = {2006},
booktitle = {ICWS},
author = {{Frederic Montagut} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {2006 IEEE International Conference on Web Services (ICWS 2006), 18-22 September 2006, Chicago, Illinois, USA}
}
@inproceedings{conf/isw/BaggaM06,
title = {Collusion-Free Policy-Based Encryption.},
year = {2006},
booktitle = {ISC},
author = {{Walid Bagga} and {Refik Molva}},
publisher = {Springer},
booktitle = {Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}
}
@inproceedings{conf/scn/BaggaCM06,
title = {Proof-Carrying Proxy Certificates.},
year = {2006},
booktitle = {SCN},
author = {{Walid Bagga} and {Stefano Crosta} and {Refik Molva}},
publisher = {Springer},
booktitle = {Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings}
}
@inproceedings{conf/sec/MichiardiM06,
title = {Identity Based Message Authentication for Dynamic Networks.},
year = {2006},
booktitle = {SEC},
author = {{Pietro Michiardi} and {Refik Molva}},
publisher = {Springer},
booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden}
}
@inproceedings{journals/entcs/BaggaCMM07,
title = {Establishment of Ad-Hoc Communities through Policy-Based Cryptography.},
year = {2006},
booktitle = {WCAN@ICALP},
author = {{Walid Bagga} and {Stefano Crosta} and {Pietro Michiardi} and {Refik Molva}},
publisher = {Elsevier},
booktitle = {Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2006, Venice, Italy, July 16, 2006}
}
@inproceedings{conf/IEEEscc/MontagutM07,
title = {Enforcing Integrity of Execution in Distributed Workflow Management Systems.},
year = {2007},
booktitle = {IEEE SCC},
author = {{Frederic Montagut} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {2007 IEEE International Conference on Services Computing (SCC 2007), 9-13 July 2007, Salt Lake City, Utah, USA}
}
@inproceedings{conf/IEEEscc/SvirskasCMB07,
title = {Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach.},
year = {2007},
booktitle = {IEEE SCW},
author = {{Adomas Svirskas} and {Carine Courbis} and {Refik Molva} and {Justinas Bedzinskas}},
publisher = {IEEE Computer Society},
booktitle = {2007 IEEE International Conference on Services Computing - Workshops (SCW 2007), 9-13 July 2007, Salt Lake City, Utah, USA}
}
@inproceedings{conf/colcom/SvirskasIM07,
title = {Towards secure and trusted collaboration environment for European public sector.},
year = {2007},
booktitle = {CollaborateCom},
author = {{Adomas Svirskas} and {Jelena Isachenkova} and {Refik Molva}},
publisher = {IEEE Computer Society / ICST},
booktitle = {Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007}
}
@inproceedings{conf/esorics/MontagutM07,
title = {Traceability and Integrity of Execution in Distributed Workflow Management Systems.},
year = {2007},
booktitle = {ESORICS},
author = {{Frederic Montagut} and {Refik Molva}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}
}
@inproceedings{conf/esorics/PietroM07,
title = {Information Confinement, Privacy, and Security in RFID Systems.},
year = {2007},
booktitle = {ESORICS},
author = {{Roberto Di Pietro} and {Refik Molva}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}
}
@inproceedings{conf/ewsn/OnenM07,
title = {Secure Data Aggregation with Multiple Encryption.},
year = {2007},
booktitle = {EWSN},
author = {{Melek Önen} and {Refik Molva}},
publisher = {Springer},
booktitle = {Wireless Sensor Networks, 4th European Conference, EWSN 2007, Delft, The Netherlands, January 29-31, 2007, Proceedings}
}
@inproceedings{conf/mobiquitous/OnenSM07,
title = {Optimistic fair exchange for secure forwarding.},
year = {2007},
booktitle = {MobiQuitous},
author = {{Melek Önen} and {Abdullatif Shikfa} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, USA}
}
@inproceedings{journals/entcs/CrescenzoM08,
title = {Preface.},
year = {2007},
booktitle = {WCAN@ICALP},
author = {{Giovanni Di Crescenzo} and {Refik Molva}},
publisher = {Elsevier},
booktitle = {Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007}
}
@inproceedings{conf/pimrc/SorniottiMG08,
title = {Efficient access control for wireless sensor data.},
year = {2008},
booktitle = {PIMRC},
author = {{Alessandro Sorniotti} and {Refik Molva} and {Laurent Gomez}},
publisher = {IEEE},
booktitle = {Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France}
}
@inproceedings{conf/saso/AllenCCDLMMPSW08,
title = {Social Networking for Pervasive Adaptation.},
year = {2008},
booktitle = {SASO Workshops},
author = {{Stuart M. Allen} and {Marco Conti} and {Jon Crowcroft} and {Robin Dunbar} and {Pietro Liò} and {José Fernando Mendes} and {Refik Molva} and {Andrea Passarella} and {Ioannis Stavrakakis} and {Roger M. Whitaker}},
publisher = {IEEE Computer Society},
booktitle = {Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, SASO 2008, Workshops Proceedings, October 20-24, 2008, Venice, Italy}
}
@article{journals/iacr/BlassKMNS08,
title = {The Ff-Family of Protocols for RFID-Privacy and Authentication.},
year = {2008},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Erik-Oliver Blass} and {Anil Kurmus} and {Refik Molva} and {Guevara Noubir} and {Abdullatif Shikfa}}
}
@article{journals/jwsr/MontagutMG08,
title = {Automating the Composition of Transactional Web Services.},
year = {2008},
journal = {Int. J. Web Serv. Res.},
author = {{Frederic Montagut} and {Refik Molva} and {Silvan Tecumseh Golega}}
}
@article{journals/tsc/MontagutM08,
title = {Bridging Security and Fault Management within Distributed Workflow Management Systems.},
year = {2008},
journal = {IEEE Trans. Serv. Comput.},
author = {{Frederic Montagut} and {Refik Molva}}
}
@article{journals/tsmc/MontagutMG08,
title = {The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions.},
year = {2008},
journal = {IEEE Trans. Syst. Man Cybern. Part C},
author = {{Frederic Montagut} and {Refik Molva} and {Silvan Tecumseh Golega}}
}
@inproceedings{conf/aina/ShikfaOM09,
title = {Privacy in Content-Based Opportunistic Networks.},
year = {2009},
booktitle = {AINA Workshops},
author = {{Abdullatif Shikfa} and {Melek Önen} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009}
}
@inproceedings{conf/icisc/SorniottiM09,
title = {Secret Handshakes with Revocation Support.},
year = {2009},
booktitle = {ICISC},
author = {{Alessandro Sorniotti} and {Refik Molva}},
publisher = {Springer},
booktitle = {Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}
}
@inproceedings{conf/ifip11-4/BlassM09,
title = {New Directions in RFID Security.},
year = {2009},
booktitle = {iNetSeC},
author = {{Erik-Oliver Blass} and {Refik Molva}},
publisher = {Springer},
booktitle = {iNetSec 2009 - Open Research Problems in Network Security - IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers}
}
@inproceedings{conf/ifip11-4/CutilloMS09,
title = {Leveraging Social Links for Trust and Privacy in Networks.},
year = {2009},
booktitle = {iNetSeC},
author = {{Leucio Antonio Cutillo} and {Refik Molva} and {Thorsten Strufe}},
publisher = {Springer},
booktitle = {iNetSec 2009 - Open Research Problems in Network Security - IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers}
}
@inproceedings{conf/primelife/CutilloMS09,
title = {On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network.},
year = {2009},
booktitle = {PrimeLife},
author = {{Leucio Antonio Cutillo} and {Refik Molva} and {Thorsten Strufe}},
publisher = {Springer},
booktitle = {Privacy and Identity Management for Life - 5th IFIP WG 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers}
}
@inproceedings{conf/sec/ShikfaOM09,
title = {Privacy-Preserving Content-Based Publish/Subscribe Networks.},
year = {2009},
booktitle = {SEC},
author = {{Abdullatif Shikfa} and {Melek Önen} and {Refik Molva}},
publisher = {Springer},
booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}
}
@inproceedings{conf/wowmom/CutilloMS09,
title = {Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network.},
year = {2009},
booktitle = {WOWMOM},
author = {{Leucio Antonio Cutillo} and {Refik Molva} and {Thorsten Strufe}},
publisher = {IEEE Computer Society},
booktitle = {10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM 2009, Kos Island, Greece, 15-19 June, 2009}
}
@inproceedings{conf/wowmom/ShikfaOM09,
title = {Privacy in context-based and epidemic forwarding.},
year = {2009},
booktitle = {WOWMOM},
author = {{Abdullatif Shikfa} and {Melek Önen} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {10th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM 2009, Kos Island, Greece, 15-19 June, 2009}
}
@article{journals/ahswn/SorniottiMG09,
title = {Efficient Access Control forWireless Sensor Data.},
year = {2009},
journal = {Ad Hoc Sens. Wirel. Networks},
author = {{Alessandro Sorniotti} and {Refik Molva} and {Laurent Gomez}}
}
@article{journals/cm/CutilloMS09,
title = {Safebook: A privacy-preserving online social network leveraging on real-life trust.},
year = {2009},
journal = {IEEE Commun. Mag.},
author = {{Leucio Antonio Cutillo} and {Refik Molva} and {Thorsten Strufe}}
}
@article{journals/iacr/BlassEM09,
title = {PPS: Privacy Preserving Statistics using RFID Tags.},
year = {2009},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Erik-Oliver Blass} and {Kaoutar Elkhiyaoui} and {Refik Molva}}
}
@article{journals/ijwin/SorniottiMGTLS09,
title = {Efficient Access Control for Wireless Sensor Data.},
year = {2009},
journal = {Int. J. Wirel. Inf. Networks},
author = {{Alessandro Sorniotti} and {Refik Molva} and {Laurent Gomez} and {Christophe Trefois} and {Annett Laube} and {Piervito Scaglioso}}
}
@article{journals/scn/PietroMM09,
title = {Confidentiality and integrity for data aggregation in WSN using peer monitoring.},
year = {2009},
journal = {Secur. Commun. Networks},
author = {{Roberto Di Pietro} and {Pietro Michiardi} and {Refik Molva}}
}
@inproceedings{conf/icics/SorniottiM10,
title = {Federated Secret Handshakes with Support for Revocation.},
year = {2010},
booktitle = {ICICS},
author = {{Alessandro Sorniotti} and {Refik Molva}},
publisher = {Springer},
booktitle = {Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}
}
@inproceedings{conf/percom/MolvaO10,
title = {IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs.},
year = {2010},
booktitle = {PerCom Workshops},
author = {{Refik Molva} and {Melek Önen}},
publisher = {IEEE Computer Society},
booktitle = {Eigth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings}
}
@inproceedings{conf/percom/ShikfaOM10,
title = {Bootstrapping security associations in opportunistic networks.},
year = {2010},
booktitle = {PerCom Workshops},
author = {{Abdullatif Shikfa} and {Melek Önen} and {Refik Molva}},
publisher = {IEEE Computer Society},
booktitle = {Eigth Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings}
}
@inproceedings{conf/sac/SorniottiM10,
title = {Secret interest groups (SIGs) in social networks with an implementation on Facebook.},
year = {2010},
booktitle = {SAC},
author = {{Alessandro Sorniotti} and {Refik Molva}},
publisher = {ACM},
booktitle = {Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}
}
@article{journals/comcom/ShikfaOM10,
title = {Privacy and confidentiality in context-based and epidemic forwarding.},
year = {2010},
journal = {Comput. Commun.},
author = {{Abdullatif Shikfa} and {Melek Önen} and {Refik Molva}}
}
@article{journals/compsec/SorniottiM10,
title = {A provably secure secret handshake with dynamic controlled matching.},
year = {2010},
journal = {Comput. Secur.},
author = {{Alessandro Sorniotti} and {Refik Molva}}
}
@article{journals/iacr/BlassEM10,
title = {Tracker: Security and Privacy for RFID-based Supply Chains.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Erik-Oliver Blass} and {Kaoutar Elkhiyaoui} and {Refik Molva}}
}
@article{journals/iacr/ElkhiyaouiBM10,
title = {ROTIV: RFID Ownership Transfer with Issuer Verification.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kaoutar Elkhiyaoui} and {Erik-Oliver Blass} and {Refik Molva}}
}
@inproceedings{conf/ccs/BlassEMSV11,
title = {Demo: the ff hardware prototype for privacy-preserving RFID authentication.},
year = {2011},
booktitle = {CCS},
author = {{Erik-Oliver Blass} and {Kaoutar Elkhiyaoui} and {Refik Molva} and {Olivier Savry} and {Cédric Vérhilac}},
publisher = {ACM},
booktitle = {Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011}
}
@inproceedings{conf/globecom/CutilloMO11,
title = {Analysis of Privacy in Online Social Networks from the Graph Theory Perspective.},
year = {2011},
booktitle = {GLOBECOM},
author = {{Leucio Antonio Cutillo} and {Refik Molva} and {Melek Önen}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Communications Conference, GLOBECOM 2011, 5-9 December 2011, Houston, Texas, USA}
}
@inproceedings{conf/pet/ShikfaOM11,
title = {Broker-Based Private Matching.},
year = {2011},
booktitle = {PETS},
author = {{Abdullatif Shikfa} and {Melek Önen} and {Refik Molva}},
publisher = {Springer},
booktitle = {Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings}
}
@inproceedings{conf/pimrc/SunMOWZ11,
title = {Catch the Jammer in Wireless Sensor Network.},
year = {2011},
booktitle = {PIMRC},
author = {{Yanqiang Sun} and {Refik Molva} and {Melek Önen} and {Xiaodong Wang 002} and {Xingming Zhou}},
publisher = {IEEE},
booktitle = {IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2011, Toronto, ON, Canada, September 11-14, 2011}
}
@inproceedings{conf/wowmom/CutilloMO11,
title = {Safebook: A distributed privacy preserving Online Social Network.},
year = {2011},
booktitle = {WOWMOM},
author = {{Leucio Antonio Cutillo} and {Refik Molva} and {Melek Önen}},
publisher = {IEEE Computer Society},
booktitle = {12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM 2011, Lucca, Italy, 20-24 June, 2011}
}
@inproceedings{conf/wowmom/DasNMTZ11,
title = {Message from the workshop chairs.},
year = {2011},
booktitle = {WOWMOM},
author = {{Sajal K. Das 001} and {Guevara Noubir} and {Refik Molva} and {Gene Tsudik} and {Nan Zhang 004}},
publisher = {IEEE Computer Society},
booktitle = {12th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM 2011, Lucca, Italy, 20-24 June, 2011}
}
@article{journals/comcom/ContiCFJKLMMMUZ11,
title = {Research challenges towards the Future Internet.},
year = {2011},
journal = {Comput. Commun.},
author = {{Marco Conti} and {Song Chong} and {Serge Fdida} and {Weijia Jia 001} and {Holger Karl} and {Ying-Dar Lin} and {Petri Mähönen} and {Martin Maier 001} and {Refik Molva} and {Steve Uhlig} and {Moshe Zukerman}}
}
@article{journals/iacr/BlassPMO11,
title = {PRISM - Privacy-Preserving Search in MapReduce.},
year = {2011},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Erik-Oliver Blass} and {Roberto Di Pietro} and {Refik Molva} and {Melek Önen}}
}
@article{journals/iacr/ElkhiyaouiBM11,
title = {CHECKER: On-site checking in RFID-based supply chains.},
year = {2011},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kaoutar Elkhiyaoui} and {Erik-Oliver Blass} and {Refik Molva}}
}
@article{journals/jnca/PietroM11,
title = {An optimal probabilistic solution for information confinement, privacy, and security in RFID systems.},
year = {2011},
journal = {J. Netw. Comput. Appl.},
author = {{Roberto Di Pietro} and {Refik Molva}}
}
@article{journals/tdsc/BlassKMNS11,
title = {The F_f-Family of Protocols for RFID-Privacy and Authentication.},
year = {2011},
journal = {IEEE Trans. Dependable Secur. Comput.},
author = {{Erik-Oliver Blass} and {Anil Kurmus} and {Refik Molva} and {Guevara Noubir} and {Abdullatif Shikfa}}
}
@inproceedings{conf/cisc/KhalfaouiMG12,
title = {Secure Product Tracking in Supply Chain.},
year = {2012},
booktitle = {Inscrypt},
author = {{Mehdi Khalfaoui} and {Refik Molva} and {Laurent Gomez}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}
}
@inproceedings{conf/cloudcom/PearsonTCSMRFMLJLRL12,
title = {Accountability for cloud and other future Internet services.},
year = {2012},
booktitle = {CloudCom},
author = {{Siani Pearson} and {Vasilios Tountopoulos} and {Daniele Catteddu} and {Mario Südholt} and {Refik Molva} and {Christoph Reich} and {Simone Fischer-Hübner} and {Christopher Millard} and {Volkmar Lotz} and {Martin Gilje Jaatun} and {Ronald Leenes} and {Chunming Rong} and {Javier López 001}},
publisher = {IEEE Computer Society},
booktitle = {4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6, 2012}
}
@inproceedings{conf/sns/CutilloMO12,
title = {Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks.},
year = {2012},
booktitle = {SNS},
author = {{Leucio Antonio Cutillo} and {Refik Molva} and {Melek Önen}},
publisher = {ACM},
booktitle = {Proceedings of the Fifth Workshop on Social Network Systems, Bern, Switzerland, April 10, 2012}
}
@inproceedings{conf/wowmom/CutilloMO12,
title = {PRICE: Privacy preserving incentives for cooperation enforcement.},
year = {2012},
booktitle = {WOWMOM},
author = {{Leucio Antonio Cutillo} and {Refik Molva} and {Melek Önen}},
publisher = {IEEE Computer Society},
booktitle = {2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June 25-28, 2012}
}
@article{journals/iacr/ElkhiyaouiBM12,
title = {T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags.},
year = {2012},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kaoutar Elkhiyaoui} and {Erik-Oliver Blass} and {Refik Molva}}
}
@article{journals/ijcnds/ShikfaOM12,
title = {Local key management in opportunistic networks.},
year = {2012},
journal = {Int. J. Commun. Networks Distributed Syst.},
author = {{Abdullatif Shikfa} and {Melek Önen} and {Refik Molva}}
}
@inproceedings{conf/cgc/LeontiadisOMCC13,
title = {Privacy Preserving Similarity Detection for Data Analysis.},
year = {2013},
booktitle = {CGC},
author = {{Iraklis Leontiadis} and {Melek Önen} and {Refik Molva} and {Martin J. Chorley} and {Gualtiero B. Colombo}},
publisher = {IEEE Computer Society},
booktitle = {2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30 - October 2, 2013}
}
@inproceedings{conf/cloudcom/PuzioMOL13,
title = {ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage.},
year = {2013},
booktitle = {CloudCom (1)},
author = {{Pasquale Puzio} and {Refik Molva} and {Melek Önen} and {Sergio Loureiro}},
publisher = {IEEE Computer Society},
booktitle = {IEEE 5th International Conference on Cloud Computing Technology and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5, 2013, Volume 1}
}
@inproceedings{conf/secrypt/KhalfaouiMG13,
title = {Secure Alert Tracking in Supply Chain.},
year = {2013},
booktitle = {SECRYPT},
author = {{Mehdi Khalfaoui} and {Refik Molva} and {Laurent Gomez}},
publisher = {SciTePress},
booktitle = {SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013}
}
@article{journals/comcom/BlassKMS13,
title = {PSP: Private and secure payment with RFID.},
year = {2013},
journal = {Comput. Commun.},
author = {{Erik-Oliver Blass} and {Anil Kurmus} and {Refik Molva} and {Thorsten Strufe}}
}
@article{journals/scn/0005MJ13,
title = {Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems".},
year = {2013},
journal = {Secur. Commun. Networks},
author = {{Peng Liu 005} and {Refik Molva} and {Jiwu Jing}}
}
@inproceedings{conf/esorics/AzraouiEMO14,
title = {StealthGuard: Proofs of Retrievability with Hidden Watchdogs.},
year = {2014},
booktitle = {ESORICS (1)},
author = {{Monir Azraoui} and {Kaoutar Elkhiyaoui} and {Refik Molva} and {Melek Önen}},
publisher = {Springer},
booktitle = {Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I}
}
@inproceedings{conf/icdcsw/LeontiadisMO14,
title = {Privacy Preserving Statistics in the Smart Grid.},
year = {2014},
booktitle = {ICDCS Workshops},
author = {{Iraklis Leontiadis} and {Refik Molva} and {Melek Önen}},
publisher = {IEEE Computer Society},
booktitle = {34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014}
}
@inproceedings{conf/wowmom/LeontiadisMO14,
title = {A P2P based usage control enforcement scheme resilient to re-injection attacks.},
year = {2014},
booktitle = {WoWMoM},
author = {{Iraklis Leontiadis} and {Refik Molva} and {Melek Önen}},
publisher = {IEEE Computer Society},
booktitle = {Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014, Sydney, Australia, June 19, 2014}
}
@article{journals/iacr/ElkhiyaouiOM14,
title = {Privacy preserving delegated word search in the cloud.},
year = {2014},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kaoutar Elkhiyaoui} and {Melek Önen} and {Refik Molva}}
}
@article{journals/iacr/LeontiadisEM14,
title = {Private and Dynamic Time-Series Data Aggregation with Trust Relaxation.},
year = {2014},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Iraklis Leontiadis} and {Kaoutar Elkhiyaoui} and {Refik Molva}}
}
@article{journals/ojcc/PuzioMOL14,
title = {Block-level De-duplication with Encrypted Data.},
year = {2014},
journal = {Open J. Cloud Comput.},
author = {{Pasquale Puzio} and {Refik Molva} and {Melek Önen} and {Sergio Loureiro}}
}
@inproceedings{conf/cns/AzraouiEOM15,
title = {Publicly verifiable conjunctive keyword search in outsourced databases.},
year = {2015},
booktitle = {CNS},
author = {{Monir Azraoui} and {Kaoutar Elkhiyaoui} and {Melek Önen} and {Refik Molva}},
publisher = {IEEE},
booktitle = {2015 IEEE Conference on Communications and Network Security, CNS 2015, Florence, Italy, September 28-30, 2015}
}
@inproceedings{conf/esorics/PuzioMOL15,
title = {PerfectDedup: Secure Data Deduplication.},
year = {2015},
booktitle = {DPM/QASA@ESORICS},
author = {{Pasquale Puzio} and {Refik Molva} and {Melek Önen} and {Sergio Loureiro}},
publisher = {Springer},
booktitle = {Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers}
}
@inproceedings{conf/isw/RompayMO15,
title = {Multi-user Searchable Encryption in the Cloud.},
year = {2015},
booktitle = {ISC},
author = {{Cédric Van Rompay} and {Refik Molva} and {Melek Önen}},
publisher = {Springer},
booktitle = {Information Security - 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}
}
@article{journals/iacr/ElkhiyaouiOM15,
title = {Online-Offline Homomorphic Signatures for Polynomial Functions.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Kaoutar Elkhiyaoui} and {Melek Önen} and {Refik Molva}}
}
@article{journals/iacr/LeontiadisEOM15,
title = {PUDA - Privacy and Unforgeability for Data Aggregation.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Iraklis Leontiadis} and {Kaoutar Elkhiyaoui} and {Melek Önen} and {Refik Molva}}
}
@inproceedings{conf/ccs/ElkhiyaouiOAM16,
title = {Efficient Techniques for Publicly Verifiable Delegation of Computation.},
year = {2016},
booktitle = {AsiaCCS},
author = {{Kaoutar Elkhiyaoui} and {Melek Önen} and {Monir Azraoui} and {Refik Molva}},
publisher = {ACM},
booktitle = {Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}
}
@inproceedings{conf/ccs/VasilopoulosOEM16,
title = {Message-Locked Proofs of Retrievability with Secure Deduplication.},
year = {2016},
booktitle = {CCSW},
author = {{Dimitrios Vasilopoulos} and {Melek Önen} and {Kaoutar Elkhiyaoui} and {Refik Molva}},
publisher = {ACM},
booktitle = {Proceedings of the 2016 ACM on Cloud Computing Security Workshop, CCSW 2016, Vienna, Austria, October 28, 2016}
}
@article{journals/iacr/ChabanneKM17,
title = {Embedded Proofs for Verifiable Neural Networks.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Hervé Chabanne} and {Julien Keuffer} and {Refik Molva}}
}
@article{journals/popets/RompayMO17,
title = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption.},
year = {2017},
journal = {Proc. Priv. Enhancing Technol.},
author = {{Cédric Van Rompay} and {Refik Molva} and {Melek Önen}}
}
@inproceedings{conf/ccs/VasilopoulosEMO18,
title = {POROS: Proof of Data Reliability for Outsourced Storage.},
year = {2018},
booktitle = {SCC@AsiaCCS},
author = {{Dimitrios Vasilopoulos} and {Kaoutar Elkhiyaoui} and {Refik Molva} and {Melek Önen}},
publisher = {ACM},
booktitle = {Proceedings of the 6th International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}
}
@inproceedings{conf/closer/AzraouiOM18,
title = {Framework for Searchable Encryption with SQL Databases.},
year = {2018},
booktitle = {CLOSER},
author = {{Monir Azraoui} and {Melek Önen} and {Refik Molva}},
publisher = {SciTePress},
booktitle = {Proceedings of the 8th International Conference on Cloud Computing and Services Science, CLOSER 2018, Funchal, Madeira, Portugal, March 19-21, 2018.}
}
@inproceedings{conf/esorics/KeufferMC18,
title = {Efficient Proof Composition for Verifiable Computation.},
year = {2018},
booktitle = {ESORICS (1)},
author = {{Julien Keuffer} and {Refik Molva} and {Hervé Chabanne}},
publisher = {Springer},
booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I}
}
@inproceedings{conf/icics/RompayMO18,
title = {Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage.},
year = {2018},
booktitle = {ICICS},
author = {{Cédric Van Rompay} and {Refik Molva} and {Melek Önen}},
publisher = {Springer},
booktitle = {Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings}
}
@inproceedings{conf/sac/GrittiMO18,
title = {Lightweight secure bootstrap and message attestation in the internet of things.},
year = {2018},
booktitle = {SAC},
author = {{Clémentine Gritti} and {Refik Molva} and {Melek Önen}},
publisher = {ACM},
booktitle = {Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018, Pau, France, April 09-13, 2018}
}
@article{journals/iacr/GrittiOM18,
title = {CHARIOT: Cloud-Assisted Access Control for the Internet of Things.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Clémentine Gritti} and {Melek Önen} and {Refik Molva}}
}
@article{journals/iacr/RompayMO18,
title = {Secure and Scalable Multi-User Searchable Encryption.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Cédric Van Rompay} and {Refik Molva} and {Melek Önen}}
}
@article{journals/jowua/GrittiOMSP18,
title = {Device Identification and Personal Data Attestation in Networks.},
year = {2018},
journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
author = {{Clémentine Gritti} and {Melek Önen} and {Refik Molva} and {Willy Susilo} and {Thomas Plantard}}
}
@inproceedings{conf/icete/VasilopoulosOM19,
title = {PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage.},
year = {2019},
booktitle = {ICETE (2)},
author = {{Dimitrios Vasilopoulos} and {Melek Önen} and {Refik Molva}},
publisher = {SciTePress},
booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019.}
}
@inproceedings{conf/sac/GrittiOM19,
title = {Privacy-preserving delegable authentication in the internet of things.},
year = {2019},
booktitle = {SAC},
author = {{Clémentine Gritti} and {Melek Önen} and {Refik Molva}},
publisher = {ACM},
booktitle = {Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, April 8-12, 2019}
}
@article{journals/sap/VasilopoulosOME23,
title = {Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance†.},
year = {2023},
journal = {Secur. Priv.},
author = {{Dimitrios Vasilopoulos} and {Melek Önen} and {Refik Molva} and {Kaoutar Elkhiyaoui}}
}