BibTeX records: Refik Molva

download as .bib file

@article{DBLP:journals/sap/VasilopoulosOME23,
  author       = {Dimitrios Vasilopoulos and
                  Melek {\"{O}}nen and
                  Refik Molva and
                  Kaoutar Elkhiyaoui},
  title        = {Proofs of Data Reliability: Verification of reliable data storage
                  with automatic maintenance{\textdagger}},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.137},
  doi          = {10.1002/SPY2.137},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/VasilopoulosOME23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/VasilopoulosOM19,
  author       = {Dimitrios Vasilopoulos and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Mohammad S. Obaidat and
                  Pierangela Samarati},
  title        = {{PORTOS:} Proof of Data Reliability for Real-World Distributed Outsourced
                  Storage},
  booktitle    = {Proceedings of the 16th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
                  Czech Republic, July 26-28, 2019},
  pages        = {173--186},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007927301730186},
  doi          = {10.5220/0007927301730186},
  timestamp    = {Tue, 06 Jun 2023 14:58:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/VasilopoulosOM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/GrittiOM19,
  author       = {Cl{\'{e}}mentine Gritti and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Chih{-}Cheng Hung and
                  George A. Papadopoulos},
  title        = {Privacy-preserving delegable authentication in the internet of things},
  booktitle    = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing,
                  {SAC} 2019, Limassol, Cyprus, April 8-12, 2019},
  pages        = {861--869},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3297280.3297365},
  doi          = {10.1145/3297280.3297365},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/GrittiOM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GrittiOMSP18,
  author       = {Cl{\'{e}}mentine Gritti and
                  Melek {\"{O}}nen and
                  Refik Molva and
                  Willy Susilo and
                  Thomas Plantard},
  title        = {Device Identification and Personal Data Attestation in Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {4},
  pages        = {1--25},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.12.31.001},
  doi          = {10.22667/JOWUA.2018.12.31.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GrittiOMSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RompayMO18,
  author       = {C{\'{e}}dric Van Rompay and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Aziz Mohaisen and
                  Qian Wang},
  title        = {Secure and Scalable Multi-User Searchable Encryption},
  booktitle    = {Proceedings of the 6th International Workshop on Security in Cloud
                  Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08,
                  2018},
  pages        = {15--25},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3201595.3201597},
  doi          = {10.1145/3201595.3201597},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RompayMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VasilopoulosEMO18,
  author       = {Dimitrios Vasilopoulos and
                  Kaoutar Elkhiyaoui and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Aziz Mohaisen and
                  Qian Wang},
  title        = {{POROS:} Proof of Data Reliability for Outsourced Storage},
  booktitle    = {Proceedings of the 6th International Workshop on Security in Cloud
                  Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08,
                  2018},
  pages        = {27--37},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3201595.3201600},
  doi          = {10.1145/3201595.3201600},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VasilopoulosEMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/AzraouiOM18,
  author       = {Monir Azraoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and
                  Donald Ferguson and
                  Markus Helfert and
                  Claus Pahl},
  title        = {Framework for Searchable Encryption with {SQL} Databases},
  booktitle    = {Proceedings of the 8th International Conference on Cloud Computing
                  and Services Science, {CLOSER} 2018, Funchal, Madeira, Portugal, March
                  19-21, 2018},
  pages        = {57--67},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006666100570067},
  doi          = {10.5220/0006666100570067},
  timestamp    = {Mon, 30 Apr 2018 14:55:48 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/AzraouiOM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KeufferMC18,
  author       = {Julien Keuffer and
                  Refik Molva and
                  Herv{\'{e}} Chabanne},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Efficient Proof Composition for Verifiable Computation},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {152--171},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_8},
  doi          = {10.1007/978-3-319-99073-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KeufferMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/RompayMO18,
  author       = {C{\'{e}}dric Van Rompay and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Fast Two-Server Multi-User Searchable Encryption with Strict Access
                  Pattern Leakage},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {393--408},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_23},
  doi          = {10.1007/978-3-030-01950-1\_23},
  timestamp    = {Sat, 05 Sep 2020 18:01:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/RompayMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/GrittiOM18,
  author       = {Cl{\'{e}}mentine Gritti and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {{CHARIOT:} Cloud-Assisted Access Control for the Internet of Things},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514217},
  doi          = {10.1109/PST.2018.8514217},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/GrittiOM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/GrittiMO18,
  author       = {Cl{\'{e}}mentine Gritti and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Hisham M. Haddad and
                  Roger L. Wainwright and
                  Richard Chbeir},
  title        = {Lightweight secure bootstrap and message attestation in the internet
                  of things},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing,
                  {SAC} 2018, Pau, France, April 09-13, 2018},
  pages        = {775--782},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3167132.3167218},
  doi          = {10.1145/3167132.3167218},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/GrittiMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RompayMO18,
  author       = {C{\'{e}}dric Van Rompay and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {Secure and Scalable Multi-User Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RompayMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GrittiOM18,
  author       = {Cl{\'{e}}mentine Gritti and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {{CHARIOT:} Cloud-Assisted Access Control for the Internet of Things},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GrittiOM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RompayMO17,
  author       = {C{\'{e}}dric Van Rompay and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {3},
  pages        = {168},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0034},
  doi          = {10.1515/POPETS-2017-0034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/RompayMO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2017,
  editor       = {Zheng Yan and
                  Refik Molva and
                  Wojciech Mazurczyk and
                  Raimo Kantola},
  title        = {Network and System Security - 11th International Conference, {NSS}
                  2017, Helsinki, Finland, August 21-23, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10394},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64701-2},
  doi          = {10.1007/978-3-319-64701-2},
  isbn         = {978-3-319-64700-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RompayMO17,
  author       = {C{\'{e}}dric Van Rompay and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RompayMO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChabanneKM17,
  author       = {Herv{\'{e}} Chabanne and
                  Julien Keuffer and
                  Refik Molva},
  title        = {Embedded Proofs for Verifiable Neural Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1038},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChabanneKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VasilopoulosOEM16,
  author       = {Dimitrios Vasilopoulos and
                  Melek {\"{O}}nen and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Elli Androulaki and
                  Michael K. Reiter},
  title        = {Message-Locked Proofs of Retrievability with Secure Deduplication},
  booktitle    = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
                  {CCSW} 2016, Vienna, Austria, October 28, 2016},
  pages        = {73--83},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996429.2996433},
  doi          = {10.1145/2996429.2996433},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VasilopoulosOEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ElkhiyaouiOAM16,
  author       = {Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Monir Azraoui and
                  Refik Molva},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Efficient Techniques for Publicly Verifiable Delegation of Computation},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {119--128},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897910},
  doi          = {10.1145/2897845.2897910},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ElkhiyaouiOAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LeontiadisEOM15,
  author       = {Iraklis Leontiadis and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {{PUDA} - Privacy and Unforgeability for Data Aggregation},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_1},
  doi          = {10.1007/978-3-319-26823-1\_1},
  timestamp    = {Mon, 02 Jan 2023 08:05:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/LeontiadisEOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AzraouiEOM15,
  author       = {Monir Azraoui and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Publicly verifiable conjunctive keyword search in outsourced databases},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {619--627},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346876},
  doi          = {10.1109/CNS.2015.7346876},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AzraouiEOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PuzioMOL15,
  author       = {Pasquale Puzio and
                  Refik Molva and
                  Melek {\"{O}}nen and
                  Sergio Loureiro},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {PerfectDedup: Secure Data Deduplication},
  booktitle    = {Data Privacy Management, and Security Assurance - 10th International
                  Workshop, {DPM} 2015, and 4th International Workshop, {QASA} 2015,
                  Vienna, Austria, September 21-22, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9481},
  pages        = {150--166},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29883-2\_10},
  doi          = {10.1007/978-3-319-29883-2\_10},
  timestamp    = {Sun, 25 Oct 2020 22:34:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/PuzioMOL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/RompayMO15,
  author       = {C{\'{e}}dric Van Rompay and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Multi-user Searchable Encryption in the Cloud},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {299--316},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_17},
  doi          = {10.1007/978-3-319-23318-5\_17},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/RompayMO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeontiadisEOM15,
  author       = {Iraklis Leontiadis and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {{PUDA} - Privacy and Unforgeability for Data Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeontiadisEOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiOM15,
  author       = {Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Online-Offline Homomorphic Signatures for Polynomial Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {954},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/954},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ojcc/PuzioMOL14,
  author       = {Pasquale Puzio and
                  Refik Molva and
                  Melek {\"{O}}nen and
                  Sergio Loureiro},
  title        = {Block-level De-duplication with Encrypted Data},
  journal      = {Open J. Cloud Comput.},
  volume       = {1},
  number       = {1},
  pages        = {10--18},
  year         = {2014},
  url          = {https://nbn-resolving.org/urn:nbn:de:101:1-201705194448},
  urn          = {urn:nbn:de:101:1-201705194448},
  timestamp    = {Fri, 29 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ojcc/PuzioMOL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LeontiadisEM14,
  author       = {Iraklis Leontiadis and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  editor       = {Dimitris Gritzalis and
                  Aggelos Kiayias and
                  Ioannis G. Askoxylakis},
  title        = {Private and Dynamic Time-Series Data Aggregation with Trust Relaxation},
  booktitle    = {Cryptology and Network Security - 13th International Conference, {CANS}
                  2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8813},
  pages        = {305--320},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12280-9\_20},
  doi          = {10.1007/978-3-319-12280-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LeontiadisEM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AzraouiEMO14,
  author       = {Monir Azraoui and
                  Kaoutar Elkhiyaoui and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {StealthGuard: Proofs of Retrievability with Hidden Watchdogs},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {239--256},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_14},
  doi          = {10.1007/978-3-319-11203-9\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AzraouiEMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/LeontiadisMO14,
  author       = {Iraklis Leontiadis and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {Privacy Preserving Statistics in the Smart Grid},
  booktitle    = {34th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014},
  pages        = {182--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCSW.2014.16},
  doi          = {10.1109/ICDCSW.2014.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/LeontiadisMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ElkhiyaouiOM14,
  author       = {Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Privacy Preserving Delegated Word Search in the Cloud},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {137--150},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005054001370150},
  doi          = {10.5220/0005054001370150},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ElkhiyaouiOM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/LeontiadisMO14,
  author       = {Iraklis Leontiadis and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {A {P2P} based usage control enforcement scheme resilient to re-injection
                  attacks},
  booktitle    = {Proceeding of {IEEE} International Symposium on a World of Wireless,
                  Mobile and Multimedia Networks, WoWMoM 2014, Sydney, Australia, June
                  19, 2014},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/WoWMoM.2014.6918974},
  doi          = {10.1109/WOWMOM.2014.6918974},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/LeontiadisMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeontiadisEM14,
  author       = {Iraklis Leontiadis and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {Private and Dynamic Time-Series Data Aggregation with Trust Relaxation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeontiadisEM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiOM14,
  author       = {Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Privacy preserving delegated word search in the cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiOM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/BlassKMS13,
  author       = {Erik{-}Oliver Blass and
                  Anil Kurmus and
                  Refik Molva and
                  Thorsten Strufe},
  title        = {{PSP:} Private and secure payment with {RFID}},
  journal      = {Comput. Commun.},
  volume       = {36},
  number       = {4},
  pages        = {468--480},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comcom.2012.10.012},
  doi          = {10.1016/J.COMCOM.2012.10.012},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/BlassKMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/0005MJ13,
  author       = {Peng Liu and
                  Refik Molva and
                  Jiwu Jing},
  title        = {Special issue on "security and privacy in pervasive and ubiquitous
                  computing and communication systems"},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1522--1523},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.947},
  doi          = {10.1002/SEC.947},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/0005MJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgc/LeontiadisOMCC13,
  author       = {Iraklis Leontiadis and
                  Melek {\"{O}}nen and
                  Refik Molva and
                  Martin J. Chorley and
                  Gualtiero B. Colombo},
  title        = {Privacy Preserving Similarity Detection for Data Analysis},
  booktitle    = {2013 International Conference on Cloud and Green Computing, Karlsruhe,
                  Germany, September 30 - October 2, 2013},
  pages        = {547--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CGC.2013.92},
  doi          = {10.1109/CGC.2013.92},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cgc/LeontiadisOMCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/PuzioMOL13,
  author       = {Pasquale Puzio and
                  Refik Molva and
                  Melek {\"{O}}nen and
                  Sergio Loureiro},
  title        = {ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage},
  booktitle    = {{IEEE} 5th International Conference on Cloud Computing Technology
                  and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5,
                  2013, Volume 1},
  pages        = {363--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CloudCom.2013.54},
  doi          = {10.1109/CLOUDCOM.2013.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/PuzioMOL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KhalfaouiMG13,
  author       = {Mehdi Khalfaoui and
                  Refik Molva and
                  Laurent Gomez},
  editor       = {Pierangela Samarati},
  title        = {Secure Alert Tracking in Supply Chain},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {219--229},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223169/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KhalfaouiMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/ShikfaOM12,
  author       = {Abdullatif Shikfa and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Local key management in opportunistic networks},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {9},
  number       = {1/2},
  pages        = {97--116},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJCNDS.2012.047898},
  doi          = {10.1504/IJCNDS.2012.047898},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/ShikfaOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KhalfaouiMG12,
  author       = {Mehdi Khalfaoui and
                  Refik Molva and
                  Laurent Gomez},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {Secure Product Tracking in Supply Chain},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {351--370},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_22},
  doi          = {10.1007/978-3-642-38519-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/KhalfaouiMG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/PearsonTCSMRFMLJLRL12,
  author       = {Siani Pearson and
                  Vasilios Tountopoulos and
                  Daniele Catteddu and
                  Mario S{\"{u}}dholt and
                  Refik Molva and
                  Christoph Reich and
                  Simone Fischer{-}H{\"{u}}bner and
                  Christopher Millard and
                  Volkmar Lotz and
                  Martin Gilje Jaatun and
                  Ronald Leenes and
                  Chunming Rong and
                  Javier L{\'{o}}pez},
  title        = {Accountability for cloud and other future Internet services},
  booktitle    = {4th {IEEE} International Conference on Cloud Computing Technology
                  and Science Proceedings, CloudCom 2012, Taipei, Taiwan, December 3-6,
                  2012},
  pages        = {629--632},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CloudCom.2012.6427512},
  doi          = {10.1109/CLOUDCOM.2012.6427512},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/PearsonTCSMRFMLJLRL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/BlassPMO12,
  author       = {Erik{-}Oliver Blass and
                  Roberto Di Pietro and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Matthew K. Wright},
  title        = {{PRISM} - Privacy-Preserving Search in MapReduce},
  booktitle    = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
                  2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7384},
  pages        = {180--200},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31680-7\_10},
  doi          = {10.1007/978-3-642-31680-7\_10},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pet/BlassPMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/ElkhiyaouiBM12,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  editor       = {Jaap{-}Henk Hoepman and
                  Ingrid Verbauwhede},
  title        = {T-Match: Privacy-Preserving Item Matching for Storage-Only {RFID}
                  Tags},
  booktitle    = {Radio Frequency Identification. Security and Privacy Issues - 8th
                  International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July
                  2-3, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7739},
  pages        = {76--95},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36140-1\_6},
  doi          = {10.1007/978-3-642-36140-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/ElkhiyaouiBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sns/CutilloMO12,
  author       = {Leucio Antonio Cutillo and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Eiko Yoneki and
                  Davide Frey and
                  Ian Brown},
  title        = {Privacy preserving picture sharing: enforcing usage control in distributed
                  on-line social networks},
  booktitle    = {Proceedings of the Fifth Workshop on Social Network Systems, Bern,
                  Switzerland, April 10, 2012},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2181176.2181182},
  doi          = {10.1145/2181176.2181182},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sns/CutilloMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ElkhiyaouiBM12,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {{CHECKER:} on-site checking in RFID-based supply chains},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {173--184},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185471},
  doi          = {10.1145/2185448.2185471},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ElkhiyaouiBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/BlassEM12,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {{PPS:} Privacy-preserving statistics using {RFID} tags},
  booktitle    = {2012 {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June
                  25-28, 2012},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/WoWMoM.2012.6263773},
  doi          = {10.1109/WOWMOM.2012.6263773},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/BlassEM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/CutilloMO12,
  author       = {Leucio Antonio Cutillo and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {{PRICE:} Privacy preserving incentives for cooperation enforcement},
  booktitle    = {2012 {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June
                  25-28, 2012},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/WoWMoM.2012.6263707},
  doi          = {10.1109/WOWMOM.2012.6263707},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/CutilloMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiBM12,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  title        = {{T-MATCH:} Privacy-Preserving Item Matching for Storage-Only {RFID}
                  Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ContiCFJKLMMMUZ11,
  author       = {Marco Conti and
                  Song Chong and
                  Serge Fdida and
                  Weijia Jia and
                  Holger Karl and
                  Ying{-}Dar Lin and
                  Petri M{\"{a}}h{\"{o}}nen and
                  Martin Maier and
                  Refik Molva and
                  Steve Uhlig and
                  Moshe Zukerman},
  title        = {Research challenges towards the Future Internet},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {18},
  pages        = {2115--2134},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2011.09.001},
  doi          = {10.1016/J.COMCOM.2011.09.001},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ContiCFJKLMMMUZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/PietroM11,
  author       = {Roberto Di Pietro and
                  Refik Molva},
  title        = {An optimal probabilistic solution for information confinement, privacy,
                  and security in {RFID} systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {34},
  number       = {3},
  pages        = {853--863},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jnca.2010.04.015},
  doi          = {10.1016/J.JNCA.2010.04.015},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/PietroM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BlassKMNS11,
  author       = {Erik{-}Oliver Blass and
                  Anil Kurmus and
                  Refik Molva and
                  Guevara Noubir and
                  Abdullatif Shikfa},
  title        = {The F{\_}f-Family of Protocols for RFID-Privacy and Authentication},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {3},
  pages        = {466--480},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2010.37},
  doi          = {10.1109/TDSC.2010.37},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BlassKMNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlassEMSV11,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva and
                  Olivier Savry and
                  C{\'{e}}dric V{\'{e}}rhilac},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Demo: the f\({}_{\mbox{f}}\) hardware prototype for privacy-preserving
                  {RFID} authentication},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {737--740},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093481},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlassEMSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/CutilloMO11,
  author       = {Leucio Antonio Cutillo and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {Analysis of Privacy in Online Social Networks from the Graph Theory
                  Perspective},
  booktitle    = {Proceedings of the Global Communications Conference, {GLOBECOM} 2011,
                  5-9 December 2011, Houston, Texas, {USA}},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/GLOCOM.2011.6133517},
  doi          = {10.1109/GLOCOM.2011.6133517},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/CutilloMO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BlassEM11,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {Tracker: Security and Privacy for RFID-based Supply Chains},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/tracker-security-and-privacy-for-rfid-based-supply-chains},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BlassEM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ShikfaOM11,
  author       = {Abdullatif Shikfa and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Nicholas Hopper},
  title        = {Broker-Based Private Matching},
  booktitle    = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
                  2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6794},
  pages        = {264--284},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22263-4\_15},
  doi          = {10.1007/978-3-642-22263-4\_15},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pet/ShikfaOM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/SunMOWZ11,
  author       = {Yanqiang Sun and
                  Refik Molva and
                  Melek {\"{O}}nen and
                  Xiaodong Wang and
                  Xingming Zhou},
  editor       = {Kaveh Pahlavan and
                  Shahrokh Valaee and
                  Elvino Silveira Sousa},
  title        = {Catch the Jammer in Wireless Sensor Network},
  booktitle    = {{IEEE} 22nd International Symposium on Personal, Indoor and Mobile
                  Radio Communications, {PIMRC} 2011, Toronto, ON, Canada, September
                  11-14, 2011},
  pages        = {1156--1160},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/PIMRC.2011.6139679},
  doi          = {10.1109/PIMRC.2011.6139679},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pimrc/SunMOWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/ElkhiyaouiBM11,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  editor       = {Ari Juels and
                  Christof Paar},
  title        = {{ROTIV:} {RFID} Ownership Transfer with Issuer Verification},
  booktitle    = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
                  2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7055},
  pages        = {163--182},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25286-0\_11},
  doi          = {10.1007/978-3-642-25286-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/ElkhiyaouiBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/CutilloMO11,
  author       = {Leucio Antonio Cutillo and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {Safebook: {A} distributed privacy preserving Online Social Network},
  booktitle    = {12th {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June,
                  2011},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WoWMoM.2011.5986118},
  doi          = {10.1109/WOWMOM.2011.5986118},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/CutilloMO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/DasNMTZ11,
  author       = {Sajal K. Das and
                  Guevara Noubir and
                  Refik Molva and
                  Gene Tsudik and
                  Nan Zhang},
  title        = {Message from the workshop chairs},
  booktitle    = {12th {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, {WOWMOM} 2011, Lucca, Italy, 20-24 June,
                  2011},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WoWMoM.2011.5986126},
  doi          = {10.1109/WOWMOM.2011.5986126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/DasNMTZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2008,
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1460877},
  doi          = {10.1145/1460877},
  isbn         = {978-1-60558-241-2},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassPMO11,
  author       = {Erik{-}Oliver Blass and
                  Roberto Di Pietro and
                  Refik Molva and
                  Melek {\"{O}}nen},
  title        = {{PRISM} - Privacy-Preserving Search in MapReduce},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassPMO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiBM11,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  title        = {{CHECKER:} On-site checking in RFID-based supply chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {651},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/651},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ShikfaOM10,
  author       = {Abdullatif Shikfa and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Privacy and confidentiality in context-based and epidemic forwarding},
  journal      = {Comput. Commun.},
  volume       = {33},
  number       = {13},
  pages        = {1493--1504},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.comcom.2010.04.035},
  doi          = {10.1016/J.COMCOM.2010.04.035},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ShikfaOM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SorniottiM10,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  title        = {A provably secure secret handshake with dynamic controlled matching},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {619--627},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.11.004},
  doi          = {10.1016/J.COSE.2009.11.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SorniottiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SorniottiM10,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Federated Secret Handshakes with Support for Revocation},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {218--234},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_16},
  doi          = {10.1007/978-3-642-17650-0\_16},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SorniottiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/MolvaO10,
  author       = {Refik Molva and
                  Melek {\"{O}}nen},
  title        = {{IEEE} International Workshop on Security and Social Networking {SESOC}
                  2010: Message from the workshop chairs},
  booktitle    = {Eigth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim,
                  Germany, Workshop Proceedings},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PERCOMW.2010.5470585},
  doi          = {10.1109/PERCOMW.2010.5470585},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/MolvaO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ShikfaOM10,
  author       = {Abdullatif Shikfa and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Bootstrapping security associations in opportunistic networks},
  booktitle    = {Eigth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim,
                  Germany, Workshop Proceedings},
  pages        = {147--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PERCOMW.2010.5470676},
  doi          = {10.1109/PERCOMW.2010.5470676},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/ShikfaOM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SorniottiM10,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Secret interest groups (SIGs) in social networks with an implementation
                  on Facebook},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {621--628},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774219},
  doi          = {10.1145/1774088.1774219},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SorniottiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassEM10,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {Tracker: Security and Privacy for RFID-based Supply Chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassEM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiBM10,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  title        = {{ROTIV:} {RFID} Ownership Transfer with Issuer Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/SorniottiMG09,
  author       = {Alessandro Sorniotti and
                  Refik Molva and
                  Laurent Gomez},
  title        = {Efficient Access Control forWireless Sensor Data},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {7},
  number       = {3-4},
  pages        = {325--336},
  year         = {2009},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-7-number-3-4-2009/ahswn-7-3-4-p-325-336/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/SorniottiMG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/CutilloMS09,
  author       = {Leucio Antonio Cutillo and
                  Refik Molva and
                  Thorsten Strufe},
  title        = {Safebook: {A} privacy-preserving online social network leveraging
                  on real-life trust},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {47},
  number       = {12},
  pages        = {94--101},
  year         = {2009},
  url          = {https://doi.org/10.1109/MCOM.2009.5350374},
  doi          = {10.1109/MCOM.2009.5350374},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/CutilloMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwin/SorniottiMGTLS09,
  author       = {Alessandro Sorniotti and
                  Refik Molva and
                  Laurent Gomez and
                  Christophe Trefois and
                  Annett Laube and
                  Piervito Scaglioso},
  title        = {Efficient Access Control for Wireless Sensor Data},
  journal      = {Int. J. Wirel. Inf. Networks},
  volume       = {16},
  number       = {3},
  pages        = {165--174},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10776-009-0102-4},
  doi          = {10.1007/S10776-009-0102-4},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwin/SorniottiMGTLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PietroMM09,
  author       = {Roberto Di Pietro and
                  Pietro Michiardi and
                  Refik Molva},
  title        = {Confidentiality and integrity for data aggregation in {WSN} using
                  peer monitoring},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {2},
  pages        = {181--194},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.93},
  doi          = {10.1002/SEC.93},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PietroMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ShikfaOM09,
  author       = {Abdullatif Shikfa and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Privacy in Content-Based Opportunistic Networks},
  booktitle    = {23rd International Conference on Advanced Information Networking and
                  Applications, {AINA} 2009, Workshops Proceedings, Bradford, United
                  Kingdom, May 26-29, 2009},
  pages        = {832--837},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/WAINA.2009.73},
  doi          = {10.1109/WAINA.2009.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ShikfaOM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SorniottiM09,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  editor       = {Dong Hoon Lee and
                  Seokhie Hong},
  title        = {Secret Handshakes with Revocation Support},
  booktitle    = {Information, Security and Cryptology - {ICISC} 2009, 12th International
                  Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5984},
  pages        = {274--299},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14423-3\_19},
  doi          = {10.1007/978-3-642-14423-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SorniottiM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/CutilloMS09,
  author       = {Leucio Antonio Cutillo and
                  Refik Molva and
                  Thorsten Strufe},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {Leveraging Social Links for Trust and Privacy in Networks},
  booktitle    = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP}
                  {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {309},
  pages        = {27--36},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05437-2\_3},
  doi          = {10.1007/978-3-642-05437-2\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/CutilloMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-4/BlassM09,
  author       = {Erik{-}Oliver Blass and
                  Refik Molva},
  editor       = {Jan Camenisch and
                  Dogan Kesdogan},
  title        = {New Directions in {RFID} Security},
  booktitle    = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP}
                  {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24,
                  2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {309},
  pages        = {76--84},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05437-2\_7},
  doi          = {10.1007/978-3-642-05437-2\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-4/BlassM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/CutilloMS09,
  author       = {Leucio Antonio Cutillo and
                  Refik Molva and
                  Thorsten Strufe},
  editor       = {Michele Bezzi and
                  Penny Duquenoy and
                  Simone Fischer{-}H{\"{u}}bner and
                  Marit Hansen and
                  Ge Zhang},
  title        = {On the Security and Feasibility of Safebook: {A} Distributed Privacy-Preserving
                  Online Social Network},
  booktitle    = {Privacy and Identity Management for Life - 5th {IFIP} {WG} 9.2, 9.6/11.4,
                  11.6, 11.7/PrimeLife International Summer School, Nice, France, September
                  7-11, 2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {320},
  pages        = {86--101},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14282-6\_7},
  doi          = {10.1007/978-3-642-14282-6\_7},
  timestamp    = {Fri, 05 Aug 2022 07:31:50 +0200},
  biburl       = {https://dblp.org/rec/conf/primelife/CutilloMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ShikfaOM09,
  author       = {Abdullatif Shikfa and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Privacy-Preserving Content-Based Publish/Subscribe Networks},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {270--282},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_24},
  doi          = {10.1007/978-3-642-01244-0\_24},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/ShikfaOM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SorniottiM09,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {A Provably Secure Secret Handshake with Dynamic Controlled Matching},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {330--341},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_29},
  doi          = {10.1007/978-3-642-01244-0\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/SorniottiM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/CutilloMS09,
  author       = {Leucio Antonio Cutillo and
                  Refik Molva and
                  Thorsten Strufe},
  title        = {Safebook: Feasibility of transitive cooperation for privacy on a decentralized
                  social network},
  booktitle    = {10th {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, {WOWMOM} 2009, Kos Island, Greece, 15-19
                  June, 2009},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/WOWMOM.2009.5282446},
  doi          = {10.1109/WOWMOM.2009.5282446},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/CutilloMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/ShikfaOM09,
  author       = {Abdullatif Shikfa and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Privacy in context-based and epidemic forwarding},
  booktitle    = {10th {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, {WOWMOM} 2009, Kos Island, Greece, 15-19
                  June, 2009},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/WOWMOM.2009.5282445},
  doi          = {10.1109/WOWMOM.2009.5282445},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/ShikfaOM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BlassKMS09,
  author       = {Erik{-}Oliver Blass and
                  Anil Kurmus and
                  Refik Molva and
                  Thorsten Strufe},
  editor       = {Ehab Al{-}Shaer and
                  Stefano Paraboschi},
  title        = {{PSP:} private and secure payment with {RFID}},
  booktitle    = {Proceedings of the 2009 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2009, Chicago, Illinois, USA, November 9, 2009},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655188.1655196},
  doi          = {10.1145/1655188.1655196},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/BlassKMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassKMS09,
  author       = {Erik{-}Oliver Blass and
                  Anil Kurmus and
                  Refik Molva and
                  Thorsten Strufe},
  title        = {{PSP:} Private and Secure Payment with {RFID}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassKMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassEM09,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {{PPS:} Privacy Preserving Statistics using {RFID} Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassEM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwsr/MontagutMG08,
  author       = {Frederic Montagut and
                  Refik Molva and
                  Silvan Tecumseh Golega},
  title        = {Automating the Composition of Transactional Web Services},
  journal      = {Int. J. Web Serv. Res.},
  volume       = {5},
  number       = {1},
  pages        = {24--41},
  year         = {2008},
  url          = {https://doi.org/10.4018/jwsr.2008010102},
  doi          = {10.4018/JWSR.2008010102},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jwsr/MontagutMG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/MontagutM08,
  author       = {Frederic Montagut and
                  Refik Molva},
  title        = {Bridging Security and Fault Management within Distributed Workflow
                  Management Systems},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {1},
  number       = {1},
  pages        = {33--48},
  year         = {2008},
  url          = {https://doi.org/10.1109/TSC.2008.3},
  doi          = {10.1109/TSC.2008.3},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/MontagutM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/MontagutMG08,
  author       = {Frederic Montagut and
                  Refik Molva and
                  Silvan Tecumseh Golega},
  title        = {The Pervasive Workflow: {A} Decentralized Workflow System Supporting
                  Long-Running Transactions},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {38},
  number       = {3},
  pages        = {319--333},
  year         = {2008},
  url          = {https://doi.org/10.1109/TSMCC.2008.919184},
  doi          = {10.1109/TSMCC.2008.919184},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/MontagutMG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/SorniottiMG08,
  author       = {Alessandro Sorniotti and
                  Refik Molva and
                  Laurent Gomez},
  title        = {Efficient access control for wireless sensor data},
  booktitle    = {Proceedings of the {IEEE} 19th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2008, 15-18 September
                  2008, Cannes, French Riviera, France},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/PIMRC.2008.4699487},
  doi          = {10.1109/PIMRC.2008.4699487},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pimrc/SorniottiMG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saso/AllenCCDLMMPSW08,
  author       = {Stuart M. Allen and
                  Marco Conti and
                  Jon Crowcroft and
                  Robin Dunbar and
                  Pietro Li{\`{o}} and
                  Jos{\'{e}} Fernando Mendes and
                  Refik Molva and
                  Andrea Passarella and
                  Ioannis Stavrakakis and
                  Roger M. Whitaker},
  title        = {Social Networking for Pervasive Adaptation},
  booktitle    = {Second {IEEE} International Conference on Self-Adaptive and Self-Organizing
                  Systems, {SASO} 2008, Workshops Proceedings, October 20-24, 2008,
                  Venice, Italy},
  pages        = {49--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SASOW.2008.34},
  doi          = {10.1109/SASOW.2008.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/saso/AllenCCDLMMPSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icalp/2007wcan,
  editor       = {Giovanni Di Crescenzo and
                  Refik Molva},
  title        = {Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks,
                  WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {192},
  number       = {2},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/192/issue/2},
  timestamp    = {Thu, 09 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/2007wcan.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassKMNS08,
  author       = {Erik{-}Oliver Blass and
                  Anil Kurmus and
                  Refik Molva and
                  Guevara Noubir and
                  Abdullatif Shikfa},
  title        = {The F\({}_{\mbox{f}}\)-Family of Protocols for RFID-Privacy and Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassKMNS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/SvirskasCMB07,
  author       = {Adomas Svirskas and
                  Carine Courbis and
                  Refik Molva and
                  Justinas Bedzinskas},
  title        = {Compliance Proofs for Collaborative Interactions using Aspect-Oriented
                  Approach},
  booktitle    = {2007 {IEEE} International Conference on Services Computing - Workshops
                  {(SCW} 2007), 9-13 July 2007, Salt Lake City, Utah, {USA}},
  pages        = {33--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SERVICES.2007.23},
  doi          = {10.1109/SERVICES.2007.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/SvirskasCMB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/MontagutM07,
  author       = {Frederic Montagut and
                  Refik Molva},
  title        = {Enforcing Integrity of Execution in Distributed Workflow Management
                  Systems},
  booktitle    = {2007 {IEEE} International Conference on Services Computing {(SCC}
                  2007), 9-13 July 2007, Salt Lake City, Utah, {USA}},
  pages        = {170--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SCC.2007.57},
  doi          = {10.1109/SCC.2007.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/MontagutM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/SvirskasIM07,
  author       = {Adomas Svirskas and
                  Jelena Isachenkova and
                  Refik Molva},
  editor       = {Juan Quemada and
                  Tao Zhang},
  title        = {Towards secure and trusted collaboration environment for European
                  public sector},
  booktitle    = {Proceedings of the 3rd International Conference on Collaborative Computing:
                  Networking, Applications and Worksharing, White Plains, New York,
                  USA, November 12-15, 2007},
  pages        = {49--56},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2007},
  url          = {https://doi.org/10.1109/COLCOM.2007.4553808},
  doi          = {10.1109/COLCOM.2007.4553808},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/SvirskasIM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PietroM07,
  author       = {Roberto Di Pietro and
                  Refik Molva},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Information Confinement, Privacy, and Security in {RFID} Systems},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_13},
  doi          = {10.1007/978-3-540-74835-9\_13},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PietroM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MontagutM07,
  author       = {Frederic Montagut and
                  Refik Molva},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Traceability and Integrity of Execution in Distributed Workflow Management
                  Systems},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {251--266},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_17},
  doi          = {10.1007/978-3-540-74835-9\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MontagutM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/OnenM07,
  author       = {Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Koen Langendoen and
                  Thiemo Voigt},
  title        = {Secure Data Aggregation with Multiple Encryption},
  booktitle    = {Wireless Sensor Networks, 4th European Conference, {EWSN} 2007, Delft,
                  The Netherlands, January 29-31, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4373},
  pages        = {117--132},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-69830-2\_8},
  doi          = {10.1007/978-3-540-69830-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ewsn/OnenM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/OnenSM07,
  author       = {Melek {\"{O}}nen and
                  Abdullatif Shikfa and
                  Refik Molva},
  title        = {Optimistic fair exchange for secure forwarding},
  booktitle    = {4th Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2007), August 6-10, 2007, Philadelphia, PA, {USA}},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MOBIQ.2007.4451069},
  doi          = {10.1109/MOBIQ.2007.4451069},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/OnenSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CrescenzoM08,
  author       = {Giovanni Di Crescenzo and
                  Refik Molva},
  editor       = {Giovanni Di Crescenzo and
                  Refik Molva},
  title        = {Preface},
  booktitle    = {Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks,
                  WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {192},
  number       = {2},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2008.05.001},
  doi          = {10.1016/J.ENTCS.2008.05.001},
  timestamp    = {Thu, 09 Feb 2023 10:53:25 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CrescenzoM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaggaMC06,
  author       = {Walid Bagga and
                  Refik Molva and
                  Stefano Crosta},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Policy-based encryption schemes from bilinear pairings},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {368},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128886},
  doi          = {10.1145/1128817.1128886},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BaggaMC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/MontagutM06,
  author       = {Frederic Montagut and
                  Refik Molva},
  title        = {Towards Transactional PervasiveWorkflows},
  booktitle    = {Tenth {IEEE} International Enterprise Distributed Object Computing
                  Conference {(EDOC} 2006), 16-20 October 2006, Hong Kong, China},
  pages        = {141--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/EDOC.2006.63},
  doi          = {10.1109/EDOC.2006.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/MontagutM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/MontagutM06,
  author       = {Frederic Montagut and
                  Refik Molva},
  title        = {Augmenting Web Services Composition with Transactional Requirements},
  booktitle    = {2006 {IEEE} International Conference on Web Services {(ICWS} 2006),
                  18-22 September 2006, Chicago, Illinois, {USA}},
  pages        = {91--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICWS.2006.32},
  doi          = {10.1109/ICWS.2006.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/MontagutM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BaggaM06,
  author       = {Walid Bagga and
                  Refik Molva},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Collusion-Free Policy-Based Encryption},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {233--245},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_17},
  doi          = {10.1007/11836810\_17},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BaggaM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaggaCM06,
  author       = {Walid Bagga and
                  Stefano Crosta and
                  Refik Molva},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Proof-Carrying Proxy Certificates},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {321--335},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_22},
  doi          = {10.1007/11832072\_22},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BaggaCM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MichiardiM06,
  author       = {Pietro Michiardi and
                  Refik Molva},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {Identity Based Message Authentication for Dynamic Networks},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {50--61},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_5},
  doi          = {10.1007/0-387-33406-8\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/MichiardiM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BaggaCMM07,
  author       = {Walid Bagga and
                  Stefano Crosta and
                  Pietro Michiardi and
                  Refik Molva},
  editor       = {Giovanni Di Crescenzo and
                  Luigi V. Mancini},
  title        = {Establishment of Ad-Hoc Communities through Policy-Based Cryptography},
  booktitle    = {Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks,
                  WCAN@ICALP 2006, Venice, Italy, July 16, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {1},
  pages        = {107--120},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.013},
  doi          = {10.1016/J.ENTCS.2006.11.013},
  timestamp    = {Fri, 27 Jan 2023 10:49:50 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BaggaCMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/Molva05,
  author       = {Pietro Michiardi and
                  Refik Molva},
  title        = {Analysis of coalition formation and cooperation strategies in mobile
                  ad hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {3},
  number       = {2},
  pages        = {193--219},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.adhoc.2004.07.006},
  doi          = {10.1016/J.ADHOC.2004.07.006},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/Molva05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/MontagutM05,
  author       = {Frederic Montagut and
                  Refik Molva},
  editor       = {Tao Zhang},
  title        = {Enabling pervasive execution of workflows},
  booktitle    = {Proceedings of the 1st International Conference on Collaborative Computing:
                  Networking, Applications and Worksharing, San Jose, CA, USA, December
                  19-21, 2005},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2005},
  url          = {https://doi.org/10.1109/COLCOM.2005.1651227},
  doi          = {10.1109/COLCOM.2005.1651227},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/MontagutM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BaggaM05,
  author       = {Walid Bagga and
                  Refik Molva},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Policy-Based Cryptography and Applications},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_7},
  doi          = {10.1007/11507840\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BaggaM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/AltmanKMM05,
  author       = {Eitan Altman and
                  Arzad Alam Kherani and
                  Pietro Michiardi and
                  Refik Molva},
  editor       = {Raouf Boutaba and
                  Kevin C. Almeroth and
                  Ram{\'{o}}n Puigjaner and
                  Sherman X. Shen and
                  James P. Black},
  title        = {Non-cooperative Forwarding in Ad-Hoc Networks},
  booktitle    = {{NETWORKING} 2005: Networking Technologies, Services, and Protocols;
                  Performance of Computer and Communication Networks; Mobile and Wireless
                  Communication Systems, 4th International {IFIP-TC6} Networking Conference,
                  Waterloo, Canada, May 2-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3462},
  pages        = {486--498},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11422778\_39},
  doi          = {10.1007/11422778\_39},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/AltmanKMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2005,
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494},
  doi          = {10.1007/11601494},
  isbn         = {3-540-30912-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurongi/AltmanBKMM04,
  author       = {Eitan Altman and
                  Vivek S. Borkar and
                  Arzad Alam Kherani and
                  Pietro Michiardi and
                  Refik Molva},
  editor       = {Gabriele Kotsis and
                  Otto Spaniol},
  title        = {Some Game-Theoretic Problems in Wireless Ad-Hoc Networks},
  booktitle    = {Wireless Systems and Mobility in Next Generation Internet, First International
                  Workshop of the {EURO-NGI} Network of Excellence, Dagstuhl Castle,
                  Germany, June 7-9, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3427},
  pages        = {82--104},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31963-4\_7},
  doi          = {10.1007/978-3-540-31963-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/eurongi/AltmanBKMM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/OnenM04,
  author       = {Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Reliable group rekeying with a customer perspective},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
                  '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  pages        = {2072--2076},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/GLOCOM.2004.1378376},
  doi          = {10.1109/GLOCOM.2004.1378376},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/OnenM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/OnenM04,
  author       = {Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Denial of service prevention in satellite networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2004, Paris, France, 20-24 June 2004},
  pages        = {4387--4391},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICC.2004.1313376},
  doi          = {10.1109/ICC.2004.1313376},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/OnenM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/OnenM04,
  author       = {Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Group Rekeying with a Customer Perspective},
  booktitle    = {10th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2004, Newport Beach, CA, USA, July 7-9, 2004},
  pages        = {223--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ICPADS.2004.45},
  doi          = {10.1109/ICPADS.2004.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/OnenM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/BussardMR04,
  author       = {Laurent Bussard and
                  Refik Molva and
                  Yves Roudier},
  editor       = {Christian Damsgaard Jensen and
                  Stefan Poslad and
                  Theodosis Dimitrakos},
  title        = {History-Based Signature or How to Trust Anonymous Documents},
  booktitle    = {Trust Management, Second International Conference, iTrust 2004, Oxford,
                  UK, March 29 - April 1, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2995},
  pages        = {78--92},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24747-0\_7},
  doi          = {10.1007/978-3-540-24747-0\_7},
  timestamp    = {Sun, 02 Oct 2022 16:10:26 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/BussardMR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/BussardRM04,
  author       = {Laurent Bussard and
                  Yves Roudier and
                  Refik Molva},
  title        = {Untraceable Secret Credentials: Trust Establishment with Privacy},
  booktitle    = {2nd {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, {USA}},
  pages        = {122--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/PERCOMW.2004.1276917},
  doi          = {10.1109/PERCOMW.2004.1276917},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/BussardRM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/BussardM04,
  author       = {Laurent Bussard and
                  Refik Molva},
  title        = {One-Time Capabilities for Authorizations without Trust},
  booktitle    = {Proceedings of the Second {IEEE} International Conference on Pervasive
                  Computing and Communications (PerCom 2004), 14-17 March 2004, Orlando,
                  FL, {USA}},
  pages        = {351--355},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/PERCOM.2004.1276873},
  doi          = {10.1109/PERCOM.2004.1276873},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/BussardM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BussardM04,
  author       = {Laurent Bussard and
                  Refik Molva},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Establishing Trust with Privacy},
  booktitle    = {Security Protocols, 12th International Workshop, Cambridge, UK, April
                  26-28, 2004. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3957},
  pages        = {199--209},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11861386\_22},
  doi          = {10.1007/11861386\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BussardM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2004,
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b100085},
  doi          = {10.1007/B100085},
  isbn         = {3-540-22987-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-8/MolvaM03,
  author       = {Refik Molva and
                  Pietro Michiardi},
  editor       = {Marco Conti and
                  Silvia Giordano and
                  Enrico Gregori and
                  Stephan Olariu},
  title        = {Security in Ad Hoc Networks},
  booktitle    = {Personal Wireless Communications, {IFIP-TC6} 8th International Conference,
                  {PWC} 2003, Venice, Italy, September 23-25, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2775},
  pages        = {756--775},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39867-7\_69},
  doi          = {10.1007/978-3-540-39867-7\_69},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6-8/MolvaM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/PannetratM03,
  author       = {Alain Pannetrat and
                  Refik Molva},
  title        = {Efficient Multicast Packet Authentication},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2003, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2003},
  url          = {https://www.ndss-symposium.org/ndss2003/efficient-multicast-packet-authentication/},
  timestamp    = {Mon, 01 Feb 2021 08:42:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/PannetratM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/MichiardiM02,
  author       = {Pietro Michiardi and
                  Refik Molva},
  editor       = {Borka Jerman{-}Blazic and
                  Tomaz Klobucar},
  title        = {Core: a collaborative reputation mechanism to enforce node cooperation
                  in mobile ad hoc networks},
  booktitle    = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11}
                  Sixth Joint Working Conference on Communications and Multimedia Security,
                  September 26-27, 2002, Portoroz, Slovenia},
  series       = {{IFIP} Conference Proceedings},
  volume       = {228},
  pages        = {107--121},
  publisher    = {Kluwer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-0-387-35612-9\_9},
  doi          = {10.1007/978-0-387-35612-9\_9},
  timestamp    = {Thu, 25 Jul 2019 12:26:02 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/MichiardiM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/RoudierFVM02,
  author       = {Yves Roudier and
                  Olivier Fouache and
                  Pierre Vannel and
                  Refik Molva},
  editor       = {Borka Jerman{-}Blazic and
                  Tomaz Klobucar},
  title        = {Enabling adaptive and secure extranets},
  booktitle    = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11}
                  Sixth Joint Working Conference on Communications and Multimedia Security,
                  September 26-27, 2002, Portoroz, Slovenia},
  series       = {{IFIP} Conference Proceedings},
  volume       = {228},
  pages        = {123--135},
  publisher    = {Kluwer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-0-387-35612-9\_10},
  doi          = {10.1007/978-0-387-35612-9\_10},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/RoudierFVM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/PannetratM02,
  author       = {Alain Pannetrat and
                  Refik Molva},
  editor       = {Borka Jerman{-}Blazic and
                  Tomaz Klobucar},
  title        = {Multiple layer encryption for multicast groups},
  booktitle    = {Advanced Communications and Multimedia Security, {IFIP} {TC6/TC11}
                  Sixth Joint Working Conference on Communications and Multimedia Security,
                  September 26-27, 2002, Portoroz, Slovenia},
  series       = {{IFIP} Conference Proceedings},
  volume       = {228},
  pages        = {137--153},
  publisher    = {Kluwer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-0-387-35612-9\_11},
  doi          = {10.1007/978-0-387-35612-9\_11},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/PannetratM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/PannetratM02,
  author       = {Alain Pannetrat and
                  Refik Molva},
  title        = {Authenticating real time packet streams and multicasts},
  booktitle    = {Proceedings of the Seventh {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2002), 1-4 July 2002, Taormina, Italy},
  pages        = {490--495},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ISCC.2002.1021720},
  doi          = {10.1109/ISCC.2002.1021720},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/PannetratM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/MolvaP02,
  author       = {Refik Molva and
                  Alain Pannetrat},
  editor       = {Enrico Gregori and
                  Giuseppe Anastasi and
                  Stefano Basagni},
  title        = {Network Security in the Multicast Framework},
  booktitle    = {Advanced Lectures on Networking, {NETWORKING} 2002 [This book presents
                  the revised version of seven tutorials given at the {NETWORKING} 2002
                  Conference in Pisa, Italy in May 2002]},
  series       = {Lecture Notes in Computer Science},
  volume       = {2497},
  pages        = {59--82},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36162-6\_3},
  doi          = {10.1007/3-540-36162-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/MolvaP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecr/LoureiroMP01,
  author       = {Sergio Loureiro and
                  Refik Molva and
                  Alain Pannetrat},
  title        = {Secure Data Collection with Updates},
  journal      = {Electron. Commer. Res.},
  volume       = {1},
  number       = {1/2},
  pages        = {119--130},
  year         = {2001},
  url          = {https://doi.org/10.1023/A:1011527713457},
  doi          = {10.1023/A:1011527713457},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecr/LoureiroMP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/MolvaO00,
  author       = {Refik Molva and
                  Rolf Oppliger},
  title        = {{\'{E}}ditorial - S{\'{e}}curit{\'{e}} dans les r{\'{e}}seaux},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {55},
  number       = {7-8},
  pages        = {311--312},
  year         = {2000},
  url          = {https://doi.org/10.1007/BF02994839},
  doi          = {10.1007/BF02994839},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/MolvaO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/MolvaP00,
  author       = {Refik Molva and
                  Alain Pannetrat},
  title        = {Scalable multicast security with dynamic recipient groups},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {136--160},
  year         = {2000},
  url          = {https://doi.org/10.1145/357830.357834},
  doi          = {10.1145/357830.357834},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/MolvaP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoopw/MolvaB00,
  author       = {Refik Molva and
                  Fran{\c{c}}oise Baude},
  editor       = {Jacques Malenfant and
                  Sabine Moisan and
                  Ana M. D. Moreira},
  title        = {Mobile Code, Internet Security, and E-Commerce},
  booktitle    = {Object-Oriented Technology, {ECOOP} 2000 Workshops, Panels, and Posters,
                  Sophia Antipolis and Cannes, France, June 12-16, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1964},
  pages        = {270--281},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44555-2\_19},
  doi          = {10.1007/3-540-44555-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoopw/MolvaB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MolvaR00,
  author       = {Refik Molva and
                  Yves Roudier},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {A Distributed Access Control Model for Java},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {291--308},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_18},
  doi          = {10.1007/10722599\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MolvaR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Molva99,
  author       = {Refik Molva},
  title        = {Internet security architecture},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {8},
  pages        = {787--804},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1389-1286(98)00016-4},
  doi          = {10.1016/S1389-1286(98)00016-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/Molva99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MolvaP99,
  author       = {Refik Molva and
                  Alain Pannetrat},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Scalable Multicast Security in Dynamic Groups},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {101--112},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319723},
  doi          = {10.1145/319709.319723},
  timestamp    = {Tue, 10 Nov 2020 20:00:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MolvaP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MolvaT98,
  author       = {Refik Molva and
                  Gene Tsudik},
  title        = {Secret Sets and Applications},
  journal      = {Inf. Process. Lett.},
  volume       = {65},
  number       = {1},
  pages        = {47--55},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(97)80449-8},
  doi          = {10.1016/S0020-0190(97)80449-8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MolvaT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/BlumDMS97,
  author       = {Christian Blum and
                  Philippe Dubois and
                  Refik Molva and
                  Olivier Schaller},
  title        = {A Development and Runtime Platform for Teleconferencing Applications},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {15},
  number       = {3},
  pages        = {576--588},
  year         = {1997},
  url          = {https://doi.org/10.1109/49.564151},
  doi          = {10.1109/49.564151},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/BlumDMS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/SamfatM97,
  author       = {Didier Samfat and
                  Refik Molva},
  title        = {{IDAMN:} An Intrusion Detection Architecture for Mobile Networks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {15},
  number       = {7},
  pages        = {1373--1380},
  year         = {1997},
  url          = {https://doi.org/10.1109/49.622919},
  doi          = {10.1109/49.622919},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/SamfatM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HauserJMTH96,
  author       = {Ralf C. Hauser and
                  Philippe A. Janson and
                  Refik Molva and
                  Gene Tsudik and
                  Els Van Herreweghen},
  title        = {Robust and Secure Password and Key Change Method},
  journal      = {J. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {97--112},
  year         = {1996},
  url          = {https://doi.org/10.3233/JCS-1996-4106},
  doi          = {10.3233/JCS-1996-4106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HauserJMTH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZattiMTTK96,
  author       = {Stefano Zatti and
                  Refik Molva and
                  Angelo Tosi and
                  Gene Tsudik and
                  Helmut Kurth},
  editor       = {Elisa Bertino and
                  Helmut Kurth and
                  Giancarlo Martella and
                  Emilio Montolivo},
  title        = {Limitations of the Approach of Solving a Network's Security Problem
                  with a Firewall},
  booktitle    = {Computer Security - {ESORICS} 96, 4th European Symposium on Research
                  in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1146},
  pages        = {144--145},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61770-1\_33},
  doi          = {10.1007/3-540-61770-1\_33},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZattiMTTK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/RocheDM96,
  author       = {St{\'{e}}phane Roche and
                  Jean{-}Luc Dugelay and
                  Refik Molva},
  title        = {Multi-resolution access control algorithm based on fractal coding},
  booktitle    = {Proceedings 1996 International Conference on Image Processing, Lausanne,
                  Switzerland, September 16-19, 1996},
  pages        = {235--238},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/ICIP.1996.560427},
  doi          = {10.1109/ICIP.1996.560427},
  timestamp    = {Fri, 13 Aug 2021 09:26:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/RocheDM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ismse/0003M96,
  author       = {Christian Blum and
                  Refik Molva},
  title        = {A software platform for distributed multimedia applications},
  booktitle    = {Proceedings of the 1996 International Workshop on Multimedia Software
                  Development, {MMSD} 1996, Berlin, Germany, March 25-26, 1996},
  pages        = {10--21},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/MMSD.1996.557725},
  doi          = {10.1109/MMSD.1996.557725},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ismse/0003M96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/BirdGHJKMY95,
  author       = {Ray Bird and
                  Inder S. Gopal and
                  Amir Herzberg and
                  Philippe A. Janson and
                  Shay Kutten and
                  Refik Molva and
                  Moti Yung},
  title        = {The KryptoKnight family of light-weight protocols for authentication
                  and key distribution},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {3},
  number       = {1},
  pages        = {31--41},
  year         = {1995},
  url          = {https://doi.org/10.1109/90.365435},
  doi          = {10.1109/90.365435},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/BirdGHJKMY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/SamfatMA95,
  author       = {Didier Samfat and
                  Refik Molva and
                  N. Asokan},
  editor       = {Baruch Awerbuch and
                  Dan Duchamp},
  title        = {Untraceability in Mobile Networks},
  booktitle    = {{MOBICOM} '95, Proceedings of the First Annual International Conference
                  on Mobile Computing and Networking, Berkeley, CA, USA, November 13-15,
                  1995},
  pages        = {26--36},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/215530.215548},
  doi          = {10.1145/215530.215548},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/SamfatMA95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/MolvaST94,
  author       = {Refik Molva and
                  Didier Samfat and
                  Gene Tsudik},
  title        = {Authentication of mobile users},
  journal      = {{IEEE} Netw.},
  volume       = {8},
  number       = {2},
  pages        = {26--34},
  year         = {1994},
  url          = {https://doi.org/10.1109/65.272938},
  doi          = {10.1109/65.272938},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/MolvaST94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MolvaR94,
  author       = {Refik Molva and
                  Erich R{\"{u}}tsche},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu},
  title        = {Application Access Control at Network Level},
  booktitle    = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 2-4, 1994},
  pages        = {219--228},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/191177.191234},
  doi          = {10.1145/191177.191234},
  timestamp    = {Tue, 10 Nov 2020 20:00:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MolvaR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HauserJMTH94,
  author       = {Ralf C. Hauser and
                  Philippe A. Janson and
                  Refik Molva and
                  Gene Tsudik and
                  Els Van Herreweghen},
  editor       = {Dieter Gollmann},
  title        = {Robust and Secure Password and Key Change Method},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {875},
  pages        = {107--122},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_59},
  doi          = {10.1007/3-540-58618-0\_59},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HauserJMTH94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/SamfatM94,
  author       = {Didier Samfat and
                  Refik Molva},
  title        = {A Method Providing Identity Privacy to Mobile Users During Authentication},
  booktitle    = {First Workshop on Mobile Computing Systems and Applications, {WMCSA}
                  1994, Santa Cruz, CA, USA, December 8-9, 1994},
  pages        = {196--199},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/WMCSA.1994.5},
  doi          = {10.1109/WMCSA.1994.5},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wmcsa/SamfatM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/BirdGHJKMY93,
  author       = {Ray Bird and
                  Inder S. Gopal and
                  Amir Herzberg and
                  Philippe A. Janson and
                  Shay Kutten and
                  Refik Molva and
                  Moti Yung},
  title        = {Systematic Design of a Family of Attack-Resistant Authentication Protocols},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {11},
  number       = {5},
  pages        = {679--693},
  year         = {1993},
  url          = {https://doi.org/10.1109/49.223869},
  doi          = {10.1109/49.223869},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/BirdGHJKMY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MolvaT93,
  author       = {Refik Molva and
                  Gene Tsudik},
  title        = {Authentication method with impersonal token cards},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {56--65},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287643},
  doi          = {10.1109/RISP.1993.287643},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MolvaT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ibmsj/JansonMZ92,
  author       = {Philippe A. Janson and
                  Refik Molva and
                  Stefano Zatti},
  title        = {Architectural Directions for Opening {IBM} Networks: The Case of {OSI}},
  journal      = {{IBM} Syst. J.},
  volume       = {31},
  number       = {2},
  pages        = {313--335},
  year         = {1992},
  url          = {https://doi.org/10.1147/sj.312.0313},
  doi          = {10.1147/SJ.312.0313},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ibmsj/JansonMZ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MolvaTHZ92,
  author       = {Refik Molva and
                  Gene Tsudik and
                  Els Van Herreweghen and
                  Stefano Zatti},
  editor       = {Yves Deswarte and
                  G{\'{e}}rard Eizenberg and
                  Jean{-}Jacques Quisquater},
  title        = {KryptoKnight Authentication and Key Distribution System},
  booktitle    = {Computer Security - {ESORICS} 92, Second European Symposium on Research
                  in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {648},
  pages        = {155--174},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/BFb0013897},
  doi          = {10.1007/BFB0013897},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MolvaTHZ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JansonM91,
  author       = {Philippe A. Janson and
                  Refik Molva},
  title        = {Security in Open Networks and Distributed Systems},
  journal      = {Comput. Networks {ISDN} Syst.},
  volume       = {22},
  number       = {5},
  pages        = {232--346},
  year         = {1991},
  url          = {https://doi.org/10.1016/0169-7552(91)90092-Q},
  doi          = {10.1016/0169-7552(91)90092-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/JansonM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BirdGHJKMY91,
  author       = {Ray Bird and
                  Inder S. Gopal and
                  Amir Herzberg and
                  Philippe A. Janson and
                  Shay Kutten and
                  Refik Molva and
                  Moti Yung},
  editor       = {Joan Feigenbaum},
  title        = {Systematic Design of Two-Party Authentication Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {44--61},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_3},
  doi          = {10.1007/3-540-46766-1\_3},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BirdGHJKMY91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics