Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Refik Molva
@article{DBLP:journals/sap/VasilopoulosOME23, author = {Dimitrios Vasilopoulos and Melek {\"{O}}nen and Refik Molva and Kaoutar Elkhiyaoui}, title = {Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance{\textdagger}}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.137}, doi = {10.1002/SPY2.137}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/VasilopoulosOME23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/VasilopoulosOM19, author = {Dimitrios Vasilopoulos and Melek {\"{O}}nen and Refik Molva}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {{PORTOS:} Proof of Data Reliability for Real-World Distributed Outsourced Storage}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {173--186}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007927301730186}, doi = {10.5220/0007927301730186}, timestamp = {Tue, 06 Jun 2023 14:58:02 +0200}, biburl = {https://dblp.org/rec/conf/icete/VasilopoulosOM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/GrittiOM19, author = {Cl{\'{e}}mentine Gritti and Melek {\"{O}}nen and Refik Molva}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {Privacy-preserving delegable authentication in the internet of things}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {861--869}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297365}, doi = {10.1145/3297280.3297365}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/GrittiOM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GrittiOMSP18, author = {Cl{\'{e}}mentine Gritti and Melek {\"{O}}nen and Refik Molva and Willy Susilo and Thomas Plantard}, title = {Device Identification and Personal Data Attestation in Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {4}, pages = {1--25}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.12.31.001}, doi = {10.22667/JOWUA.2018.12.31.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GrittiOMSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RompayMO18, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, editor = {Aziz Mohaisen and Qian Wang}, title = {Secure and Scalable Multi-User Searchable Encryption}, booktitle = {Proceedings of the 6th International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {15--25}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3201595.3201597}, doi = {10.1145/3201595.3201597}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RompayMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VasilopoulosEMO18, author = {Dimitrios Vasilopoulos and Kaoutar Elkhiyaoui and Refik Molva and Melek {\"{O}}nen}, editor = {Aziz Mohaisen and Qian Wang}, title = {{POROS:} Proof of Data Reliability for Outsourced Storage}, booktitle = {Proceedings of the 6th International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {27--37}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3201595.3201600}, doi = {10.1145/3201595.3201600}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VasilopoulosEMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/AzraouiOM18, author = {Monir Azraoui and Melek {\"{O}}nen and Refik Molva}, editor = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Donald Ferguson and Markus Helfert and Claus Pahl}, title = {Framework for Searchable Encryption with {SQL} Databases}, booktitle = {Proceedings of the 8th International Conference on Cloud Computing and Services Science, {CLOSER} 2018, Funchal, Madeira, Portugal, March 19-21, 2018}, pages = {57--67}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006666100570067}, doi = {10.5220/0006666100570067}, timestamp = {Mon, 30 Apr 2018 14:55:48 +0200}, biburl = {https://dblp.org/rec/conf/closer/AzraouiOM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KeufferMC18, author = {Julien Keuffer and Refik Molva and Herv{\'{e}} Chabanne}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Efficient Proof Composition for Verifiable Computation}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11098}, pages = {152--171}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99073-6\_8}, doi = {10.1007/978-3-319-99073-6\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KeufferMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/RompayMO18, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {393--408}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_23}, doi = {10.1007/978-3-030-01950-1\_23}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/RompayMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/GrittiOM18, author = {Cl{\'{e}}mentine Gritti and Melek {\"{O}}nen and Refik Molva}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {{CHARIOT:} Cloud-Assisted Access Control for the Internet of Things}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514217}, doi = {10.1109/PST.2018.8514217}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/GrittiOM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/GrittiMO18, author = {Cl{\'{e}}mentine Gritti and Refik Molva and Melek {\"{O}}nen}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Lightweight secure bootstrap and message attestation in the internet of things}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {775--782}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167218}, doi = {10.1145/3167132.3167218}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/GrittiMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RompayMO18, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, title = {Secure and Scalable Multi-User Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2018}, url = {http://eprint.iacr.org/2018/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RompayMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrittiOM18, author = {Cl{\'{e}}mentine Gritti and Melek {\"{O}}nen and Refik Molva}, title = {{CHARIOT:} Cloud-Assisted Access Control for the Internet of Things}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2018}, url = {https://eprint.iacr.org/2018/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrittiOM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/RompayMO17, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, title = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {3}, pages = {168}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0034}, doi = {10.1515/POPETS-2017-0034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/RompayMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nss/2017, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2}, doi = {10.1007/978-3-319-64701-2}, isbn = {978-3-319-64700-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RompayMO17, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, title = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2017}, url = {http://eprint.iacr.org/2017/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RompayMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChabanneKM17, author = {Herv{\'{e}} Chabanne and Julien Keuffer and Refik Molva}, title = {Embedded Proofs for Verifiable Neural Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1038}, year = {2017}, url = {http://eprint.iacr.org/2017/1038}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChabanneKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VasilopoulosOEM16, author = {Dimitrios Vasilopoulos and Melek {\"{O}}nen and Kaoutar Elkhiyaoui and Refik Molva}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Elli Androulaki and Michael K. Reiter}, title = {Message-Locked Proofs of Retrievability with Secure Deduplication}, booktitle = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop, {CCSW} 2016, Vienna, Austria, October 28, 2016}, pages = {73--83}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996429.2996433}, doi = {10.1145/2996429.2996433}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VasilopoulosOEM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ElkhiyaouiOAM16, author = {Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Monir Azraoui and Refik Molva}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Efficient Techniques for Publicly Verifiable Delegation of Computation}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {119--128}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897910}, doi = {10.1145/2897845.2897910}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ElkhiyaouiOAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LeontiadisEOM15, author = {Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, editor = {Michael K. Reiter and David Naccache}, title = {{PUDA} - Privacy and Unforgeability for Data Aggregation}, booktitle = {Cryptology and Network Security - 14th International Conference, {CANS} 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9476}, pages = {3--18}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26823-1\_1}, doi = {10.1007/978-3-319-26823-1\_1}, timestamp = {Mon, 02 Jan 2023 08:05:35 +0100}, biburl = {https://dblp.org/rec/conf/cans/LeontiadisEOM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AzraouiEOM15, author = {Monir Azraoui and Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, title = {Publicly verifiable conjunctive keyword search in outsourced databases}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {619--627}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346876}, doi = {10.1109/CNS.2015.7346876}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AzraouiEOM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PuzioMOL15, author = {Pasquale Puzio and Refik Molva and Melek {\"{O}}nen and Sergio Loureiro}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {PerfectDedup: Secure Data Deduplication}, booktitle = {Data Privacy Management, and Security Assurance - 10th International Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9481}, pages = {150--166}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29883-2\_10}, doi = {10.1007/978-3-319-29883-2\_10}, timestamp = {Sun, 25 Oct 2020 22:34:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/PuzioMOL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/RompayMO15, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Multi-user Searchable Encryption in the Cloud}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {299--316}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_17}, doi = {10.1007/978-3-319-23318-5\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/RompayMO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeontiadisEOM15, author = {Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, title = {{PUDA} - Privacy and Unforgeability for Data Aggregation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2015}, url = {http://eprint.iacr.org/2015/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeontiadisEOM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkhiyaouiOM15, author = {Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, title = {Online-Offline Homomorphic Signatures for Polynomial Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {954}, year = {2015}, url = {http://eprint.iacr.org/2015/954}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkhiyaouiOM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcc/PuzioMOL14, author = {Pasquale Puzio and Refik Molva and Melek {\"{O}}nen and Sergio Loureiro}, title = {Block-level De-duplication with Encrypted Data}, journal = {Open J. Cloud Comput.}, volume = {1}, number = {1}, pages = {10--18}, year = {2014}, url = {https://nbn-resolving.org/urn:nbn:de:101:1-201705194448}, urn = {urn:nbn:de:101:1-201705194448}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ojcc/PuzioMOL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LeontiadisEM14, author = {Iraklis Leontiadis and Kaoutar Elkhiyaoui and Refik Molva}, editor = {Dimitris Gritzalis and Aggelos Kiayias and Ioannis G. Askoxylakis}, title = {Private and Dynamic Time-Series Data Aggregation with Trust Relaxation}, booktitle = {Cryptology and Network Security - 13th International Conference, {CANS} 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8813}, pages = {305--320}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12280-9\_20}, doi = {10.1007/978-3-319-12280-9\_20}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/LeontiadisEM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AzraouiEMO14, author = {Monir Azraoui and Kaoutar Elkhiyaoui and Refik Molva and Melek {\"{O}}nen}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {StealthGuard: Proofs of Retrievability with Hidden Watchdogs}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {239--256}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_14}, doi = {10.1007/978-3-319-11203-9\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AzraouiEMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/LeontiadisMO14, author = {Iraklis Leontiadis and Refik Molva and Melek {\"{O}}nen}, title = {Privacy Preserving Statistics in the Smart Grid}, booktitle = {34th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014}, pages = {182--187}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCSW.2014.16}, doi = {10.1109/ICDCSW.2014.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/LeontiadisMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ElkhiyaouiOM14, author = {Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Privacy Preserving Delegated Word Search in the Cloud}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {137--150}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005054001370150}, doi = {10.5220/0005054001370150}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ElkhiyaouiOM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/LeontiadisMO14, author = {Iraklis Leontiadis and Refik Molva and Melek {\"{O}}nen}, title = {A {P2P} based usage control enforcement scheme resilient to re-injection attacks}, booktitle = {Proceeding of {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2014, Sydney, Australia, June 19, 2014}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/WoWMoM.2014.6918974}, doi = {10.1109/WOWMOM.2014.6918974}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/LeontiadisMO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeontiadisEM14, author = {Iraklis Leontiadis and Kaoutar Elkhiyaoui and Refik Molva}, title = {Private and Dynamic Time-Series Data Aggregation with Trust Relaxation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2014}, url = {http://eprint.iacr.org/2014/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeontiadisEM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkhiyaouiOM14, author = {Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, title = {Privacy preserving delegated word search in the cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2014}, url = {http://eprint.iacr.org/2014/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkhiyaouiOM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BlassKMS13, author = {Erik{-}Oliver Blass and Anil Kurmus and Refik Molva and Thorsten Strufe}, title = {{PSP:} Private and secure payment with {RFID}}, journal = {Comput. Commun.}, volume = {36}, number = {4}, pages = {468--480}, year = {2013}, url = {https://doi.org/10.1016/j.comcom.2012.10.012}, doi = {10.1016/J.COMCOM.2012.10.012}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/BlassKMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/0005MJ13, author = {Peng Liu and Refik Molva and Jiwu Jing}, title = {Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems"}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1522--1523}, year = {2013}, url = {https://doi.org/10.1002/sec.947}, doi = {10.1002/SEC.947}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/0005MJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgc/LeontiadisOMCC13, author = {Iraklis Leontiadis and Melek {\"{O}}nen and Refik Molva and Martin J. Chorley and Gualtiero B. Colombo}, title = {Privacy Preserving Similarity Detection for Data Analysis}, booktitle = {2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30 - October 2, 2013}, pages = {547--552}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CGC.2013.92}, doi = {10.1109/CGC.2013.92}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cgc/LeontiadisOMCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/PuzioMOL13, author = {Pasquale Puzio and Refik Molva and Melek {\"{O}}nen and Sergio Loureiro}, title = {ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage}, booktitle = {{IEEE} 5th International Conference on Cloud Computing Technology and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5, 2013, Volume 1}, pages = {363--370}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CloudCom.2013.54}, doi = {10.1109/CLOUDCOM.2013.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/PuzioMOL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KhalfaouiMG13, author = {Mehdi Khalfaoui and Refik Molva and Laurent Gomez}, editor = {Pierangela Samarati}, title = {Secure Alert Tracking in Supply Chain}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {219--229}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223169/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KhalfaouiMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/ShikfaOM12, author = {Abdullatif Shikfa and Melek {\"{O}}nen and Refik Molva}, title = {Local key management in opportunistic networks}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {9}, number = {1/2}, pages = {97--116}, year = {2012}, url = {https://doi.org/10.1504/IJCNDS.2012.047898}, doi = {10.1504/IJCNDS.2012.047898}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/ShikfaOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KhalfaouiMG12, author = {Mehdi Khalfaoui and Refik Molva and Laurent Gomez}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {Secure Product Tracking in Supply Chain}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {351--370}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_22}, doi = {10.1007/978-3-642-38519-3\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KhalfaouiMG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/PearsonTCSMRFMLJLRL12, author = {Siani Pearson and Vasilios Tountopoulos and Daniele Catteddu and Mario S{\"{u}}dholt and Refik Molva and Christoph Reich and Simone Fischer{-}H{\"{u}}bner and Christopher Millard and Volkmar Lotz and Martin Gilje Jaatun and Ronald Leenes and Chunming Rong and Javier L{\'{o}}pez}, title = {Accountability for cloud and other future Internet services}, booktitle = {4th {IEEE} International Conference on Cloud Computing Technology and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6, 2012}, pages = {629--632}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CloudCom.2012.6427512}, doi = {10.1109/CLOUDCOM.2012.6427512}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/PearsonTCSMRFMLJLRL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/BlassPMO12, author = {Erik{-}Oliver Blass and Roberto Di Pietro and Refik Molva and Melek {\"{O}}nen}, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {{PRISM} - Privacy-Preserving Search in MapReduce}, booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, pages = {180--200}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7\_10}, doi = {10.1007/978-3-642-31680-7\_10}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pet/BlassPMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/ElkhiyaouiBM12, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, editor = {Jaap{-}Henk Hoepman and Ingrid Verbauwhede}, title = {T-Match: Privacy-Preserving Item Matching for Storage-Only {RFID} Tags}, booktitle = {Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7739}, pages = {76--95}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36140-1\_6}, doi = {10.1007/978-3-642-36140-1\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/ElkhiyaouiBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sns/CutilloMO12, author = {Leucio Antonio Cutillo and Refik Molva and Melek {\"{O}}nen}, editor = {Eiko Yoneki and Davide Frey and Ian Brown}, title = {Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks}, booktitle = {Proceedings of the Fifth Workshop on Social Network Systems, Bern, Switzerland, April 10, 2012}, pages = {6}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2181176.2181182}, doi = {10.1145/2181176.2181182}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sns/CutilloMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ElkhiyaouiBM12, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, editor = {Marwan Krunz and Loukas Lazos and Roberto Di Pietro and Wade Trappe}, title = {{CHECKER:} on-site checking in RFID-based supply chains}, booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April 16-18, 2012}, pages = {173--184}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2185448.2185471}, doi = {10.1145/2185448.2185471}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/ElkhiyaouiBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/BlassEM12, author = {Erik{-}Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva}, title = {{PPS:} Privacy-preserving statistics using {RFID} tags}, booktitle = {2012 {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June 25-28, 2012}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/WoWMoM.2012.6263773}, doi = {10.1109/WOWMOM.2012.6263773}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/BlassEM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/CutilloMO12, author = {Leucio Antonio Cutillo and Refik Molva and Melek {\"{O}}nen}, title = {{PRICE:} Privacy preserving incentives for cooperation enforcement}, booktitle = {2012 {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June 25-28, 2012}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/WoWMoM.2012.6263707}, doi = {10.1109/WOWMOM.2012.6263707}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/CutilloMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkhiyaouiBM12, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, title = {{T-MATCH:} Privacy-Preserving Item Matching for Storage-Only {RFID} Tags}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2012}, url = {http://eprint.iacr.org/2012/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ContiCFJKLMMMUZ11, author = {Marco Conti and Song Chong and Serge Fdida and Weijia Jia and Holger Karl and Ying{-}Dar Lin and Petri M{\"{a}}h{\"{o}}nen and Martin Maier and Refik Molva and Steve Uhlig and Moshe Zukerman}, title = {Research challenges towards the Future Internet}, journal = {Comput. Commun.}, volume = {34}, number = {18}, pages = {2115--2134}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2011.09.001}, doi = {10.1016/J.COMCOM.2011.09.001}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ContiCFJKLMMMUZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/PietroM11, author = {Roberto Di Pietro and Refik Molva}, title = {An optimal probabilistic solution for information confinement, privacy, and security in {RFID} systems}, journal = {J. Netw. Comput. Appl.}, volume = {34}, number = {3}, pages = {853--863}, year = {2011}, url = {https://doi.org/10.1016/j.jnca.2010.04.015}, doi = {10.1016/J.JNCA.2010.04.015}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/PietroM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BlassKMNS11, author = {Erik{-}Oliver Blass and Anil Kurmus and Refik Molva and Guevara Noubir and Abdullatif Shikfa}, title = {The F{\_}f-Family of Protocols for RFID-Privacy and Authentication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {3}, pages = {466--480}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2010.37}, doi = {10.1109/TDSC.2010.37}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BlassKMNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlassEMSV11, author = {Erik{-}Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva and Olivier Savry and C{\'{e}}dric V{\'{e}}rhilac}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Demo: the f\({}_{\mbox{f}}\) hardware prototype for privacy-preserving {RFID} authentication}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {737--740}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093481}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlassEMSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/CutilloMO11, author = {Leucio Antonio Cutillo and Refik Molva and Melek {\"{O}}nen}, title = {Analysis of Privacy in Online Social Networks from the Graph Theory Perspective}, booktitle = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011, 5-9 December 2011, Houston, Texas, {USA}}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/GLOCOM.2011.6133517}, doi = {10.1109/GLOCOM.2011.6133517}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/CutilloMO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BlassEM11, author = {Erik{-}Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva}, title = {Tracker: Security and Privacy for RFID-based Supply Chains}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/tracker-security-and-privacy-for-rfid-based-supply-chains}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BlassEM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/ShikfaOM11, author = {Abdullatif Shikfa and Melek {\"{O}}nen and Refik Molva}, editor = {Simone Fischer{-}H{\"{u}}bner and Nicholas Hopper}, title = {Broker-Based Private Matching}, booktitle = {Privacy Enhancing Technologies - 11th International Symposium, {PETS} 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6794}, pages = {264--284}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22263-4\_15}, doi = {10.1007/978-3-642-22263-4\_15}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pet/ShikfaOM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/SunMOWZ11, author = {Yanqiang Sun and Refik Molva and Melek {\"{O}}nen and Xiaodong Wang and Xingming Zhou}, editor = {Kaveh Pahlavan and Shahrokh Valaee and Elvino Silveira Sousa}, title = {Catch the Jammer in Wireless Sensor Network}, booktitle = {{IEEE} 22nd International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2011, Toronto, ON, Canada, September 11-14, 2011}, pages = {1156--1160}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/PIMRC.2011.6139679}, doi = {10.1109/PIMRC.2011.6139679}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/SunMOWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/ElkhiyaouiBM11, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, editor = {Ari Juels and Christof Paar}, title = {{ROTIV:} {RFID} Ownership Transfer with Issuer Verification}, booktitle = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7055}, pages = {163--182}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25286-0\_11}, doi = {10.1007/978-3-642-25286-0\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/ElkhiyaouiBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/CutilloMO11, author = {Leucio Antonio Cutillo and Refik Molva and Melek {\"{O}}nen}, title = {Safebook: {A} distributed privacy preserving Online Social Network}, booktitle = {12th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June, 2011}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WoWMoM.2011.5986118}, doi = {10.1109/WOWMOM.2011.5986118}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/CutilloMO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/DasNMTZ11, author = {Sajal K. Das and Guevara Noubir and Refik Molva and Gene Tsudik and Nan Zhang}, title = {Message from the workshop chairs}, booktitle = {12th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June, 2011}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WoWMoM.2011.5986126}, doi = {10.1109/WOWMOM.2011.5986126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/DasNMTZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2008, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1460877}, doi = {10.1145/1460877}, isbn = {978-1-60558-241-2}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassPMO11, author = {Erik{-}Oliver Blass and Roberto Di Pietro and Refik Molva and Melek {\"{O}}nen}, title = {{PRISM} - Privacy-Preserving Search in MapReduce}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2011}, url = {http://eprint.iacr.org/2011/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassPMO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkhiyaouiBM11, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, title = {{CHECKER:} On-site checking in RFID-based supply chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {651}, year = {2011}, url = {http://eprint.iacr.org/2011/651}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ShikfaOM10, author = {Abdullatif Shikfa and Melek {\"{O}}nen and Refik Molva}, title = {Privacy and confidentiality in context-based and epidemic forwarding}, journal = {Comput. Commun.}, volume = {33}, number = {13}, pages = {1493--1504}, year = {2010}, url = {https://doi.org/10.1016/j.comcom.2010.04.035}, doi = {10.1016/J.COMCOM.2010.04.035}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ShikfaOM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SorniottiM10, author = {Alessandro Sorniotti and Refik Molva}, title = {A provably secure secret handshake with dynamic controlled matching}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {619--627}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.11.004}, doi = {10.1016/J.COSE.2009.11.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SorniottiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SorniottiM10, author = {Alessandro Sorniotti and Refik Molva}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Federated Secret Handshakes with Support for Revocation}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {218--234}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_16}, doi = {10.1007/978-3-642-17650-0\_16}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SorniottiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/MolvaO10, author = {Refik Molva and Melek {\"{O}}nen}, title = {{IEEE} International Workshop on Security and Social Networking {SESOC} 2010: Message from the workshop chairs}, booktitle = {Eigth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PERCOMW.2010.5470585}, doi = {10.1109/PERCOMW.2010.5470585}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/MolvaO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/ShikfaOM10, author = {Abdullatif Shikfa and Melek {\"{O}}nen and Refik Molva}, title = {Bootstrapping security associations in opportunistic networks}, booktitle = {Eigth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings}, pages = {147--152}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PERCOMW.2010.5470676}, doi = {10.1109/PERCOMW.2010.5470676}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/ShikfaOM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SorniottiM10, author = {Alessandro Sorniotti and Refik Molva}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Secret interest groups (SIGs) in social networks with an implementation on Facebook}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {621--628}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774219}, doi = {10.1145/1774088.1774219}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/SorniottiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassEM10, author = {Erik{-}Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva}, title = {Tracker: Security and Privacy for RFID-based Supply Chains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {219}, year = {2010}, url = {http://eprint.iacr.org/2010/219}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassEM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkhiyaouiBM10, author = {Kaoutar Elkhiyaoui and Erik{-}Oliver Blass and Refik Molva}, title = {{ROTIV:} {RFID} Ownership Transfer with Issuer Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2010}, url = {http://eprint.iacr.org/2010/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/SorniottiMG09, author = {Alessandro Sorniotti and Refik Molva and Laurent Gomez}, title = {Efficient Access Control forWireless Sensor Data}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {7}, number = {3-4}, pages = {325--336}, year = {2009}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-7-number-3-4-2009/ahswn-7-3-4-p-325-336/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/SorniottiMG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/CutilloMS09, author = {Leucio Antonio Cutillo and Refik Molva and Thorsten Strufe}, title = {Safebook: {A} privacy-preserving online social network leveraging on real-life trust}, journal = {{IEEE} Commun. Mag.}, volume = {47}, number = {12}, pages = {94--101}, year = {2009}, url = {https://doi.org/10.1109/MCOM.2009.5350374}, doi = {10.1109/MCOM.2009.5350374}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/CutilloMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwin/SorniottiMGTLS09, author = {Alessandro Sorniotti and Refik Molva and Laurent Gomez and Christophe Trefois and Annett Laube and Piervito Scaglioso}, title = {Efficient Access Control for Wireless Sensor Data}, journal = {Int. J. Wirel. Inf. Networks}, volume = {16}, number = {3}, pages = {165--174}, year = {2009}, url = {https://doi.org/10.1007/s10776-009-0102-4}, doi = {10.1007/S10776-009-0102-4}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwin/SorniottiMGTLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PietroMM09, author = {Roberto Di Pietro and Pietro Michiardi and Refik Molva}, title = {Confidentiality and integrity for data aggregation in {WSN} using peer monitoring}, journal = {Secur. Commun. Networks}, volume = {2}, number = {2}, pages = {181--194}, year = {2009}, url = {https://doi.org/10.1002/sec.93}, doi = {10.1002/SEC.93}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PietroMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ShikfaOM09, author = {Abdullatif Shikfa and Melek {\"{O}}nen and Refik Molva}, title = {Privacy in Content-Based Opportunistic Networks}, booktitle = {23rd International Conference on Advanced Information Networking and Applications, {AINA} 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009}, pages = {832--837}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/WAINA.2009.73}, doi = {10.1109/WAINA.2009.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ShikfaOM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SorniottiM09, author = {Alessandro Sorniotti and Refik Molva}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Secret Handshakes with Revocation Support}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {274--299}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_19}, doi = {10.1007/978-3-642-14423-3\_19}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SorniottiM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/CutilloMS09, author = {Leucio Antonio Cutillo and Refik Molva and Thorsten Strufe}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {Leveraging Social Links for Trust and Privacy in Networks}, booktitle = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {309}, pages = {27--36}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05437-2\_3}, doi = {10.1007/978-3-642-05437-2\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-4/CutilloMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-4/BlassM09, author = {Erik{-}Oliver Blass and Refik Molva}, editor = {Jan Camenisch and Dogan Kesdogan}, title = {New Directions in {RFID} Security}, booktitle = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP} {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {309}, pages = {76--84}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05437-2\_7}, doi = {10.1007/978-3-642-05437-2\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-4/BlassM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/primelife/CutilloMS09, author = {Leucio Antonio Cutillo and Refik Molva and Thorsten Strufe}, editor = {Michele Bezzi and Penny Duquenoy and Simone Fischer{-}H{\"{u}}bner and Marit Hansen and Ge Zhang}, title = {On the Security and Feasibility of Safebook: {A} Distributed Privacy-Preserving Online Social Network}, booktitle = {Privacy and Identity Management for Life - 5th {IFIP} {WG} 9.2, 9.6/11.4, 11.6, 11.7/PrimeLife International Summer School, Nice, France, September 7-11, 2009, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {320}, pages = {86--101}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14282-6\_7}, doi = {10.1007/978-3-642-14282-6\_7}, timestamp = {Fri, 05 Aug 2022 07:31:50 +0200}, biburl = {https://dblp.org/rec/conf/primelife/CutilloMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ShikfaOM09, author = {Abdullatif Shikfa and Melek {\"{O}}nen and Refik Molva}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {Privacy-Preserving Content-Based Publish/Subscribe Networks}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {270--282}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_24}, doi = {10.1007/978-3-642-01244-0\_24}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/ShikfaOM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SorniottiM09, author = {Alessandro Sorniotti and Refik Molva}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {A Provably Secure Secret Handshake with Dynamic Controlled Matching}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {330--341}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_29}, doi = {10.1007/978-3-642-01244-0\_29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/SorniottiM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/CutilloMS09, author = {Leucio Antonio Cutillo and Refik Molva and Thorsten Strufe}, title = {Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network}, booktitle = {10th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, {WOWMOM} 2009, Kos Island, Greece, 15-19 June, 2009}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/WOWMOM.2009.5282446}, doi = {10.1109/WOWMOM.2009.5282446}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/CutilloMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/ShikfaOM09, author = {Abdullatif Shikfa and Melek {\"{O}}nen and Refik Molva}, title = {Privacy in context-based and epidemic forwarding}, booktitle = {10th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, {WOWMOM} 2009, Kos Island, Greece, 15-19 June, 2009}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/WOWMOM.2009.5282445}, doi = {10.1109/WOWMOM.2009.5282445}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wowmom/ShikfaOM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/BlassKMS09, author = {Erik{-}Oliver Blass and Anil Kurmus and Refik Molva and Thorsten Strufe}, editor = {Ehab Al{-}Shaer and Stefano Paraboschi}, title = {{PSP:} private and secure payment with {RFID}}, booktitle = {Proceedings of the 2009 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2009, Chicago, Illinois, USA, November 9, 2009}, pages = {51--60}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655188.1655196}, doi = {10.1145/1655188.1655196}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/BlassKMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassKMS09, author = {Erik{-}Oliver Blass and Anil Kurmus and Refik Molva and Thorsten Strufe}, title = {{PSP:} Private and Secure Payment with {RFID}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2009}, url = {http://eprint.iacr.org/2009/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassKMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassEM09, author = {Erik{-}Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva}, title = {{PPS:} Privacy Preserving Statistics using {RFID} Tags}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2009}, url = {http://eprint.iacr.org/2009/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassEM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwsr/MontagutMG08, author = {Frederic Montagut and Refik Molva and Silvan Tecumseh Golega}, title = {Automating the Composition of Transactional Web Services}, journal = {Int. J. Web Serv. Res.}, volume = {5}, number = {1}, pages = {24--41}, year = {2008}, url = {https://doi.org/10.4018/jwsr.2008010102}, doi = {10.4018/JWSR.2008010102}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jwsr/MontagutMG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/MontagutM08, author = {Frederic Montagut and Refik Molva}, title = {Bridging Security and Fault Management within Distributed Workflow Management Systems}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {1}, number = {1}, pages = {33--48}, year = {2008}, url = {https://doi.org/10.1109/TSC.2008.3}, doi = {10.1109/TSC.2008.3}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/MontagutM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/MontagutMG08, author = {Frederic Montagut and Refik Molva and Silvan Tecumseh Golega}, title = {The Pervasive Workflow: {A} Decentralized Workflow System Supporting Long-Running Transactions}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {38}, number = {3}, pages = {319--333}, year = {2008}, url = {https://doi.org/10.1109/TSMCC.2008.919184}, doi = {10.1109/TSMCC.2008.919184}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/MontagutMG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/SorniottiMG08, author = {Alessandro Sorniotti and Refik Molva and Laurent Gomez}, title = {Efficient access control for wireless sensor data}, booktitle = {Proceedings of the {IEEE} 19th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2008, 15-18 September 2008, Cannes, French Riviera, France}, pages = {1--5}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/PIMRC.2008.4699487}, doi = {10.1109/PIMRC.2008.4699487}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/SorniottiMG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/saso/AllenCCDLMMPSW08, author = {Stuart M. Allen and Marco Conti and Jon Crowcroft and Robin Dunbar and Pietro Li{\`{o}} and Jos{\'{e}} Fernando Mendes and Refik Molva and Andrea Passarella and Ioannis Stavrakakis and Roger M. Whitaker}, title = {Social Networking for Pervasive Adaptation}, booktitle = {Second {IEEE} International Conference on Self-Adaptive and Self-Organizing Systems, {SASO} 2008, Workshops Proceedings, October 20-24, 2008, Venice, Italy}, pages = {49--54}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SASOW.2008.34}, doi = {10.1109/SASOW.2008.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/saso/AllenCCDLMMPSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icalp/2007wcan, editor = {Giovanni Di Crescenzo and Refik Molva}, title = {Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {192}, number = {2}, publisher = {Elsevier}, year = {2008}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/192/issue/2}, timestamp = {Thu, 09 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalp/2007wcan.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlassKMNS08, author = {Erik{-}Oliver Blass and Anil Kurmus and Refik Molva and Guevara Noubir and Abdullatif Shikfa}, title = {The F\({}_{\mbox{f}}\)-Family of Protocols for RFID-Privacy and Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2008}, url = {http://eprint.iacr.org/2008/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlassKMNS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/SvirskasCMB07, author = {Adomas Svirskas and Carine Courbis and Refik Molva and Justinas Bedzinskas}, title = {Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach}, booktitle = {2007 {IEEE} International Conference on Services Computing - Workshops {(SCW} 2007), 9-13 July 2007, Salt Lake City, Utah, {USA}}, pages = {33--40}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SERVICES.2007.23}, doi = {10.1109/SERVICES.2007.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/SvirskasCMB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/MontagutM07, author = {Frederic Montagut and Refik Molva}, title = {Enforcing Integrity of Execution in Distributed Workflow Management Systems}, booktitle = {2007 {IEEE} International Conference on Services Computing {(SCC} 2007), 9-13 July 2007, Salt Lake City, Utah, {USA}}, pages = {170--177}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SCC.2007.57}, doi = {10.1109/SCC.2007.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/MontagutM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/SvirskasIM07, author = {Adomas Svirskas and Jelena Isachenkova and Refik Molva}, editor = {Juan Quemada and Tao Zhang}, title = {Towards secure and trusted collaboration environment for European public sector}, booktitle = {Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007}, pages = {49--56}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2007}, url = {https://doi.org/10.1109/COLCOM.2007.4553808}, doi = {10.1109/COLCOM.2007.4553808}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/SvirskasIM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PietroM07, author = {Roberto Di Pietro and Refik Molva}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Information Confinement, Privacy, and Security in {RFID} Systems}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {187--202}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_13}, doi = {10.1007/978-3-540-74835-9\_13}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PietroM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MontagutM07, author = {Frederic Montagut and Refik Molva}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Traceability and Integrity of Execution in Distributed Workflow Management Systems}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {251--266}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_17}, doi = {10.1007/978-3-540-74835-9\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MontagutM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewsn/OnenM07, author = {Melek {\"{O}}nen and Refik Molva}, editor = {Koen Langendoen and Thiemo Voigt}, title = {Secure Data Aggregation with Multiple Encryption}, booktitle = {Wireless Sensor Networks, 4th European Conference, {EWSN} 2007, Delft, The Netherlands, January 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4373}, pages = {117--132}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-69830-2\_8}, doi = {10.1007/978-3-540-69830-2\_8}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ewsn/OnenM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/OnenSM07, author = {Melek {\"{O}}nen and Abdullatif Shikfa and Refik Molva}, title = {Optimistic fair exchange for secure forwarding}, booktitle = {4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, {USA}}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MOBIQ.2007.4451069}, doi = {10.1109/MOBIQ.2007.4451069}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/OnenSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CrescenzoM08, author = {Giovanni Di Crescenzo and Refik Molva}, editor = {Giovanni Di Crescenzo and Refik Molva}, title = {Preface}, booktitle = {Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {192}, number = {2}, pages = {1--2}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2008.05.001}, doi = {10.1016/J.ENTCS.2008.05.001}, timestamp = {Thu, 09 Feb 2023 10:53:25 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CrescenzoM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaggaMC06, author = {Walid Bagga and Refik Molva and Stefano Crosta}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Policy-based encryption schemes from bilinear pairings}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {368}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128886}, doi = {10.1145/1128817.1128886}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BaggaMC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/MontagutM06, author = {Frederic Montagut and Refik Molva}, title = {Towards Transactional PervasiveWorkflows}, booktitle = {Tenth {IEEE} International Enterprise Distributed Object Computing Conference {(EDOC} 2006), 16-20 October 2006, Hong Kong, China}, pages = {141--152}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/EDOC.2006.63}, doi = {10.1109/EDOC.2006.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/MontagutM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/MontagutM06, author = {Frederic Montagut and Refik Molva}, title = {Augmenting Web Services Composition with Transactional Requirements}, booktitle = {2006 {IEEE} International Conference on Web Services {(ICWS} 2006), 18-22 September 2006, Chicago, Illinois, {USA}}, pages = {91--98}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICWS.2006.32}, doi = {10.1109/ICWS.2006.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/MontagutM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BaggaM06, author = {Walid Bagga and Refik Molva}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Collusion-Free Policy-Based Encryption}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {233--245}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_17}, doi = {10.1007/11836810\_17}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BaggaM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaggaCM06, author = {Walid Bagga and Stefano Crosta and Refik Molva}, editor = {Roberto De Prisco and Moti Yung}, title = {Proof-Carrying Proxy Certificates}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {321--335}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_22}, doi = {10.1007/11832072\_22}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/BaggaCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MichiardiM06, author = {Pietro Michiardi and Refik Molva}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {Identity Based Message Authentication for Dynamic Networks}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {50--61}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_5}, doi = {10.1007/0-387-33406-8\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/MichiardiM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BaggaCMM07, author = {Walid Bagga and Stefano Crosta and Pietro Michiardi and Refik Molva}, editor = {Giovanni Di Crescenzo and Luigi V. Mancini}, title = {Establishment of Ad-Hoc Communities through Policy-Based Cryptography}, booktitle = {Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2006, Venice, Italy, July 16, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {1}, pages = {107--120}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.11.013}, doi = {10.1016/J.ENTCS.2006.11.013}, timestamp = {Fri, 27 Jan 2023 10:49:50 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BaggaCMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/Molva05, author = {Pietro Michiardi and Refik Molva}, title = {Analysis of coalition formation and cooperation strategies in mobile ad hoc networks}, journal = {Ad Hoc Networks}, volume = {3}, number = {2}, pages = {193--219}, year = {2005}, url = {https://doi.org/10.1016/j.adhoc.2004.07.006}, doi = {10.1016/J.ADHOC.2004.07.006}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/Molva05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/MontagutM05, author = {Frederic Montagut and Refik Molva}, editor = {Tao Zhang}, title = {Enabling pervasive execution of workflows}, booktitle = {Proceedings of the 1st International Conference on Collaborative Computing: Networking, Applications and Worksharing, San Jose, CA, USA, December 19-21, 2005}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2005}, url = {https://doi.org/10.1109/COLCOM.2005.1651227}, doi = {10.1109/COLCOM.2005.1651227}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/MontagutM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BaggaM05, author = {Walid Bagga and Refik Molva}, editor = {Andrew S. Patrick and Moti Yung}, title = {Policy-Based Cryptography and Applications}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {72--87}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_7}, doi = {10.1007/11507840\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BaggaM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/AltmanKMM05, author = {Eitan Altman and Arzad Alam Kherani and Pietro Michiardi and Refik Molva}, editor = {Raouf Boutaba and Kevin C. Almeroth and Ram{\'{o}}n Puigjaner and Sherman X. Shen and James P. Black}, title = {Non-cooperative Forwarding in Ad-Hoc Networks}, booktitle = {{NETWORKING} 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International {IFIP-TC6} Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3462}, pages = {486--498}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11422778\_39}, doi = {10.1007/11422778\_39}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/AltmanKMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2005, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494}, doi = {10.1007/11601494}, isbn = {3-540-30912-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurongi/AltmanBKMM04, author = {Eitan Altman and Vivek S. Borkar and Arzad Alam Kherani and Pietro Michiardi and Refik Molva}, editor = {Gabriele Kotsis and Otto Spaniol}, title = {Some Game-Theoretic Problems in Wireless Ad-Hoc Networks}, booktitle = {Wireless Systems and Mobility in Next Generation Internet, First International Workshop of the {EURO-NGI} Network of Excellence, Dagstuhl Castle, Germany, June 7-9, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3427}, pages = {82--104}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31963-4\_7}, doi = {10.1007/978-3-540-31963-4\_7}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/eurongi/AltmanBKMM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/OnenM04, author = {Melek {\"{O}}nen and Refik Molva}, title = {Reliable group rekeying with a customer perspective}, booktitle = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM} '04, Dallas, Texas, USA, 29 November - 3 December 2004}, pages = {2072--2076}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/GLOCOM.2004.1378376}, doi = {10.1109/GLOCOM.2004.1378376}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/OnenM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/OnenM04, author = {Melek {\"{O}}nen and Refik Molva}, title = {Denial of service prevention in satellite networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2004, Paris, France, 20-24 June 2004}, pages = {4387--4391}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICC.2004.1313376}, doi = {10.1109/ICC.2004.1313376}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/OnenM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/OnenM04, author = {Melek {\"{O}}nen and Refik Molva}, title = {Group Rekeying with a Customer Perspective}, booktitle = {10th International Conference on Parallel and Distributed Systems, {ICPADS} 2004, Newport Beach, CA, USA, July 7-9, 2004}, pages = {223--229}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/ICPADS.2004.45}, doi = {10.1109/ICPADS.2004.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/OnenM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/BussardMR04, author = {Laurent Bussard and Refik Molva and Yves Roudier}, editor = {Christian Damsgaard Jensen and Stefan Poslad and Theodosis Dimitrakos}, title = {History-Based Signature or How to Trust Anonymous Documents}, booktitle = {Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2995}, pages = {78--92}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24747-0\_7}, doi = {10.1007/978-3-540-24747-0\_7}, timestamp = {Sun, 02 Oct 2022 16:10:26 +0200}, biburl = {https://dblp.org/rec/conf/itrust/BussardMR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/BussardRM04, author = {Laurent Bussard and Yves Roudier and Refik Molva}, title = {Untraceable Secret Credentials: Trust Establishment with Privacy}, booktitle = {2nd {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, {USA}}, pages = {122--126}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/PERCOMW.2004.1276917}, doi = {10.1109/PERCOMW.2004.1276917}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/BussardRM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/BussardM04, author = {Laurent Bussard and Refik Molva}, title = {One-Time Capabilities for Authorizations without Trust}, booktitle = {Proceedings of the Second {IEEE} International Conference on Pervasive Computing and Communications (PerCom 2004), 14-17 March 2004, Orlando, FL, {USA}}, pages = {351--355}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/PERCOM.2004.1276873}, doi = {10.1109/PERCOM.2004.1276873}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/BussardM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/BussardM04, author = {Laurent Bussard and Refik Molva}, editor = {Bruce Christianson and Bruno Crispo and James A. Malcolm and Michael Roe}, title = {Establishing Trust with Privacy}, booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3957}, pages = {199--209}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11861386\_22}, doi = {10.1007/11861386\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/BussardM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2004, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b100085}, doi = {10.1007/B100085}, isbn = {3-540-22987-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-8/MolvaM03, author = {Refik Molva and Pietro Michiardi}, editor = {Marco Conti and Silvia Giordano and Enrico Gregori and Stephan Olariu}, title = {Security in Ad Hoc Networks}, booktitle = {Personal Wireless Communications, {IFIP-TC6} 8th International Conference, {PWC} 2003, Venice, Italy, September 23-25, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2775}, pages = {756--775}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39867-7\_69}, doi = {10.1007/978-3-540-39867-7\_69}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-8/MolvaM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PannetratM03, author = {Alain Pannetrat and Refik Molva}, title = {Efficient Multicast Packet Authentication}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2003, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2003}, url = {https://www.ndss-symposium.org/ndss2003/efficient-multicast-packet-authentication/}, timestamp = {Mon, 01 Feb 2021 08:42:24 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PannetratM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/MichiardiM02, author = {Pietro Michiardi and Refik Molva}, editor = {Borka Jerman{-}Blazic and Tomaz Klobucar}, title = {Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks}, booktitle = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11} Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia}, series = {{IFIP} Conference Proceedings}, volume = {228}, pages = {107--121}, publisher = {Kluwer}, year = {2002}, url = {https://doi.org/10.1007/978-0-387-35612-9\_9}, doi = {10.1007/978-0-387-35612-9\_9}, timestamp = {Thu, 25 Jul 2019 12:26:02 +0200}, biburl = {https://dblp.org/rec/conf/cms/MichiardiM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/RoudierFVM02, author = {Yves Roudier and Olivier Fouache and Pierre Vannel and Refik Molva}, editor = {Borka Jerman{-}Blazic and Tomaz Klobucar}, title = {Enabling adaptive and secure extranets}, booktitle = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11} Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia}, series = {{IFIP} Conference Proceedings}, volume = {228}, pages = {123--135}, publisher = {Kluwer}, year = {2002}, url = {https://doi.org/10.1007/978-0-387-35612-9\_10}, doi = {10.1007/978-0-387-35612-9\_10}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/RoudierFVM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/PannetratM02, author = {Alain Pannetrat and Refik Molva}, editor = {Borka Jerman{-}Blazic and Tomaz Klobucar}, title = {Multiple layer encryption for multicast groups}, booktitle = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11} Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia}, series = {{IFIP} Conference Proceedings}, volume = {228}, pages = {137--153}, publisher = {Kluwer}, year = {2002}, url = {https://doi.org/10.1007/978-0-387-35612-9\_11}, doi = {10.1007/978-0-387-35612-9\_11}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/PannetratM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/PannetratM02, author = {Alain Pannetrat and Refik Molva}, title = {Authenticating real time packet streams and multicasts}, booktitle = {Proceedings of the Seventh {IEEE} Symposium on Computers and Communications {(ISCC} 2002), 1-4 July 2002, Taormina, Italy}, pages = {490--495}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ISCC.2002.1021720}, doi = {10.1109/ISCC.2002.1021720}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/PannetratM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/MolvaP02, author = {Refik Molva and Alain Pannetrat}, editor = {Enrico Gregori and Giuseppe Anastasi and Stefano Basagni}, title = {Network Security in the Multicast Framework}, booktitle = {Advanced Lectures on Networking, {NETWORKING} 2002 [This book presents the revised version of seven tutorials given at the {NETWORKING} 2002 Conference in Pisa, Italy in May 2002]}, series = {Lecture Notes in Computer Science}, volume = {2497}, pages = {59--82}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36162-6\_3}, doi = {10.1007/3-540-36162-6\_3}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/networking/MolvaP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecr/LoureiroMP01, author = {Sergio Loureiro and Refik Molva and Alain Pannetrat}, title = {Secure Data Collection with Updates}, journal = {Electron. Commer. Res.}, volume = {1}, number = {1/2}, pages = {119--130}, year = {2001}, url = {https://doi.org/10.1023/A:1011527713457}, doi = {10.1023/A:1011527713457}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecr/LoureiroMP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/MolvaO00, author = {Refik Molva and Rolf Oppliger}, title = {{\'{E}}ditorial - S{\'{e}}curit{\'{e}} dans les r{\'{e}}seaux}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {55}, number = {7-8}, pages = {311--312}, year = {2000}, url = {https://doi.org/10.1007/BF02994839}, doi = {10.1007/BF02994839}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/MolvaO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/MolvaP00, author = {Refik Molva and Alain Pannetrat}, title = {Scalable multicast security with dynamic recipient groups}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {3}, number = {3}, pages = {136--160}, year = {2000}, url = {https://doi.org/10.1145/357830.357834}, doi = {10.1145/357830.357834}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/MolvaP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoopw/MolvaB00, author = {Refik Molva and Fran{\c{c}}oise Baude}, editor = {Jacques Malenfant and Sabine Moisan and Ana M. D. Moreira}, title = {Mobile Code, Internet Security, and E-Commerce}, booktitle = {Object-Oriented Technology, {ECOOP} 2000 Workshops, Panels, and Posters, Sophia Antipolis and Cannes, France, June 12-16, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1964}, pages = {270--281}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44555-2\_19}, doi = {10.1007/3-540-44555-2\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/ecoopw/MolvaB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MolvaR00, author = {Refik Molva and Yves Roudier}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Yves Deswarte and Dieter Gollmann and Michael Waidner}, title = {A Distributed Access Control Model for Java}, booktitle = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1895}, pages = {291--308}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722599\_18}, doi = {10.1007/10722599\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MolvaR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Molva99, author = {Refik Molva}, title = {Internet security architecture}, journal = {Comput. Networks}, volume = {31}, number = {8}, pages = {787--804}, year = {1999}, url = {https://doi.org/10.1016/S1389-1286(98)00016-4}, doi = {10.1016/S1389-1286(98)00016-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Molva99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MolvaP99, author = {Refik Molva and Alain Pannetrat}, editor = {Juzar Motiwalla and Gene Tsudik}, title = {Scalable Multicast Security in Dynamic Groups}, booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and Communications Security, Singapore, November 1-4, 1999}, pages = {101--112}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/319709.319723}, doi = {10.1145/319709.319723}, timestamp = {Tue, 10 Nov 2020 20:00:25 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MolvaP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MolvaT98, author = {Refik Molva and Gene Tsudik}, title = {Secret Sets and Applications}, journal = {Inf. Process. Lett.}, volume = {65}, number = {1}, pages = {47--55}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(97)80449-8}, doi = {10.1016/S0020-0190(97)80449-8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/MolvaT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/BlumDMS97, author = {Christian Blum and Philippe Dubois and Refik Molva and Olivier Schaller}, title = {A Development and Runtime Platform for Teleconferencing Applications}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {15}, number = {3}, pages = {576--588}, year = {1997}, url = {https://doi.org/10.1109/49.564151}, doi = {10.1109/49.564151}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/BlumDMS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/SamfatM97, author = {Didier Samfat and Refik Molva}, title = {{IDAMN:} An Intrusion Detection Architecture for Mobile Networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {15}, number = {7}, pages = {1373--1380}, year = {1997}, url = {https://doi.org/10.1109/49.622919}, doi = {10.1109/49.622919}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/SamfatM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HauserJMTH96, author = {Ralf C. Hauser and Philippe A. Janson and Refik Molva and Gene Tsudik and Els Van Herreweghen}, title = {Robust and Secure Password and Key Change Method}, journal = {J. Comput. Secur.}, volume = {4}, number = {1}, pages = {97--112}, year = {1996}, url = {https://doi.org/10.3233/JCS-1996-4106}, doi = {10.3233/JCS-1996-4106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HauserJMTH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZattiMTTK96, author = {Stefano Zatti and Refik Molva and Angelo Tosi and Gene Tsudik and Helmut Kurth}, editor = {Elisa Bertino and Helmut Kurth and Giancarlo Martella and Emilio Montolivo}, title = {Limitations of the Approach of Solving a Network's Security Problem with a Firewall}, booktitle = {Computer Security - {ESORICS} 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1146}, pages = {144--145}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61770-1\_33}, doi = {10.1007/3-540-61770-1\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ZattiMTTK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/RocheDM96, author = {St{\'{e}}phane Roche and Jean{-}Luc Dugelay and Refik Molva}, title = {Multi-resolution access control algorithm based on fractal coding}, booktitle = {Proceedings 1996 International Conference on Image Processing, Lausanne, Switzerland, September 16-19, 1996}, pages = {235--238}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/ICIP.1996.560427}, doi = {10.1109/ICIP.1996.560427}, timestamp = {Fri, 13 Aug 2021 09:26:01 +0200}, biburl = {https://dblp.org/rec/conf/icip/RocheDM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ismse/0003M96, author = {Christian Blum and Refik Molva}, title = {A software platform for distributed multimedia applications}, booktitle = {Proceedings of the 1996 International Workshop on Multimedia Software Development, {MMSD} 1996, Berlin, Germany, March 25-26, 1996}, pages = {10--21}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/MMSD.1996.557725}, doi = {10.1109/MMSD.1996.557725}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ismse/0003M96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/BirdGHJKMY95, author = {Ray Bird and Inder S. Gopal and Amir Herzberg and Philippe A. Janson and Shay Kutten and Refik Molva and Moti Yung}, title = {The KryptoKnight family of light-weight protocols for authentication and key distribution}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {3}, number = {1}, pages = {31--41}, year = {1995}, url = {https://doi.org/10.1109/90.365435}, doi = {10.1109/90.365435}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/BirdGHJKMY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/SamfatMA95, author = {Didier Samfat and Refik Molva and N. Asokan}, editor = {Baruch Awerbuch and Dan Duchamp}, title = {Untraceability in Mobile Networks}, booktitle = {{MOBICOM} '95, Proceedings of the First Annual International Conference on Mobile Computing and Networking, Berkeley, CA, USA, November 13-15, 1995}, pages = {26--36}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/215530.215548}, doi = {10.1145/215530.215548}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/SamfatMA95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/MolvaST94, author = {Refik Molva and Didier Samfat and Gene Tsudik}, title = {Authentication of mobile users}, journal = {{IEEE} Netw.}, volume = {8}, number = {2}, pages = {26--34}, year = {1994}, url = {https://doi.org/10.1109/65.272938}, doi = {10.1109/65.272938}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/MolvaST94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MolvaR94, author = {Refik Molva and Erich R{\"{u}}tsche}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu}, title = {Application Access Control at Network Level}, booktitle = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994}, pages = {219--228}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/191177.191234}, doi = {10.1145/191177.191234}, timestamp = {Tue, 10 Nov 2020 20:00:24 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MolvaR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HauserJMTH94, author = {Ralf C. Hauser and Philippe A. Janson and Refik Molva and Gene Tsudik and Els Van Herreweghen}, editor = {Dieter Gollmann}, title = {Robust and Secure Password and Key Change Method}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {875}, pages = {107--122}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58618-0\_59}, doi = {10.1007/3-540-58618-0\_59}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HauserJMTH94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/SamfatM94, author = {Didier Samfat and Refik Molva}, title = {A Method Providing Identity Privacy to Mobile Users During Authentication}, booktitle = {First Workshop on Mobile Computing Systems and Applications, {WMCSA} 1994, Santa Cruz, CA, USA, December 8-9, 1994}, pages = {196--199}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/WMCSA.1994.5}, doi = {10.1109/WMCSA.1994.5}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/SamfatM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/BirdGHJKMY93, author = {Ray Bird and Inder S. Gopal and Amir Herzberg and Philippe A. Janson and Shay Kutten and Refik Molva and Moti Yung}, title = {Systematic Design of a Family of Attack-Resistant Authentication Protocols}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {11}, number = {5}, pages = {679--693}, year = {1993}, url = {https://doi.org/10.1109/49.223869}, doi = {10.1109/49.223869}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/BirdGHJKMY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MolvaT93, author = {Refik Molva and Gene Tsudik}, title = {Authentication method with impersonal token cards}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {56--65}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287643}, doi = {10.1109/RISP.1993.287643}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/MolvaT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmsj/JansonMZ92, author = {Philippe A. Janson and Refik Molva and Stefano Zatti}, title = {Architectural Directions for Opening {IBM} Networks: The Case of {OSI}}, journal = {{IBM} Syst. J.}, volume = {31}, number = {2}, pages = {313--335}, year = {1992}, url = {https://doi.org/10.1147/sj.312.0313}, doi = {10.1147/SJ.312.0313}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmsj/JansonMZ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MolvaTHZ92, author = {Refik Molva and Gene Tsudik and Els Van Herreweghen and Stefano Zatti}, editor = {Yves Deswarte and G{\'{e}}rard Eizenberg and Jean{-}Jacques Quisquater}, title = {KryptoKnight Authentication and Key Distribution System}, booktitle = {Computer Security - {ESORICS} 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {648}, pages = {155--174}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0013897}, doi = {10.1007/BFB0013897}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MolvaTHZ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JansonM91, author = {Philippe A. Janson and Refik Molva}, title = {Security in Open Networks and Distributed Systems}, journal = {Comput. Networks {ISDN} Syst.}, volume = {22}, number = {5}, pages = {232--346}, year = {1991}, url = {https://doi.org/10.1016/0169-7552(91)90092-Q}, doi = {10.1016/0169-7552(91)90092-Q}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/JansonM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BirdGHJKMY91, author = {Ray Bird and Inder S. Gopal and Amir Herzberg and Philippe A. Janson and Shay Kutten and Refik Molva and Moti Yung}, editor = {Joan Feigenbaum}, title = {Systematic Design of Two-Party Authentication Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {44--61}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_3}, doi = {10.1007/3-540-46766-1\_3}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BirdGHJKMY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.