BibTeX records: Kaoutar Elkhiyaoui

download as .bib file

@article{DBLP:journals/sap/VasilopoulosOME23,
  author       = {Dimitrios Vasilopoulos and
                  Melek {\"{O}}nen and
                  Refik Molva and
                  Kaoutar Elkhiyaoui},
  title        = {Proofs of Data Reliability: Verification of reliable data storage
                  with automatic maintenance{\textdagger}},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.137},
  doi          = {10.1002/SPY2.137},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/VasilopoulosOME23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FalzonEMC23,
  author       = {Francesca Falzon and
                  Kaoutar Elkhiyaoui and
                  Yacov Manevich and
                  Angelo De Caro},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Short Privacy-Preserving Proofs of Liabilities},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1805--1819},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616645},
  doi          = {10.1145/3576915.3616645},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FalzonEMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BootleEHM23,
  author       = {Jonathan Bootle and
                  Kaoutar Elkhiyaoui and
                  Julia Hesse and
                  Yacov Manevich},
  title        = {DualDory: Logarithmic-Verifier Linkable Ring Signatures through Preprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1177},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BootleEHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndroulakiBCEFFMNS23,
  author       = {Elli Androulaki and
                  Marcus Brandenburger and
                  Angelo De Caro and
                  Kaoutar Elkhiyaoui and
                  Liran Funaro and
                  Alexandros Filios and
                  Yacov Manevich and
                  Senthilnathan Natarajan and
                  Manish Sethi},
  title        = {A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled
                  Central Bank Digital Currencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1717},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1717},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AndroulakiBCEFFMNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BootleEHM22,
  author       = {Jonathan Bootle and
                  Kaoutar Elkhiyaoui and
                  Julia Hesse and
                  Yacov Manevich},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {427--446},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_21},
  doi          = {10.1007/978-3-031-17146-8\_21},
  timestamp    = {Tue, 27 Sep 2022 21:07:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BootleEHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/BogatovCET21,
  author       = {Dmytro Bogatov and
                  Angelo De Caro and
                  Kaoutar Elkhiyaoui and
                  Bj{\"{o}}rn Tackmann},
  editor       = {Mauro Conti and
                  Marc Stevens and
                  Stephan Krenn},
  title        = {Anonymous Transactions with Revocation and Auditing in Hyperledger
                  Fabric},
  booktitle    = {Cryptology and Network Security - 20th International Conference, {CANS}
                  2021, Vienna, Austria, December 13-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13099},
  pages        = {435--459},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92548-2\_23},
  doi          = {10.1007/978-3-030-92548-2\_23},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/BogatovCET21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiCA21,
  author       = {Kaoutar Elkhiyaoui and
                  Angelo De Caro and
                  Elli Androulaki},
  title        = {Multi-Issuer Anonymous Credentials Without a Root Authority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1669},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1669},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiCA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/AndroulakiCCDET20,
  author       = {Elli Androulaki and
                  Jan Camenisch and
                  Angelo De Caro and
                  Maria Dubovitskaya and
                  Kaoutar Elkhiyaoui and
                  Bj{\"{o}}rn Tackmann},
  title        = {Privacy-preserving auditable token payments in a permissioned blockchain
                  system},
  booktitle    = {{AFT} '20: 2nd {ACM} Conference on Advances in Financial Technologies,
                  New York, NY, USA, October 21-23, 2020},
  pages        = {255--267},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419614.3423259},
  doi          = {10.1145/3419614.3423259},
  timestamp    = {Thu, 29 Oct 2020 14:40:13 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/AndroulakiCCDET20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CaoYCNEH20,
  author       = {Shengjiao Cao and
                  Yuan Yuan and
                  Angelo De Caro and
                  Karthik Nandakumar and
                  Kaoutar Elkhiyaoui and
                  Yanyan Hu},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Decentralized Privacy-Preserving Netting Protocol on Blockchain for
                  Payment Systems},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_9},
  doi          = {10.1007/978-3-030-51280-4\_9},
  timestamp    = {Wed, 22 Jul 2020 12:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CaoYCNEH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-08274,
  author       = {Elli Androulaki and
                  Angelo De Caro and
                  Kaoutar Elkhiyaoui and
                  Christian Gorenflo and
                  Alessandro Sorniotti and
                  Marko Vukolic},
  title        = {Multi-Shard Private Transactions for Permissioned Blockchains},
  journal      = {CoRR},
  volume       = {abs/2010.08274},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.08274},
  eprinttype    = {arXiv},
  eprint       = {2010.08274},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-08274.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndroulakiCCDET19,
  author       = {Elli Androulaki and
                  Jan Camenisch and
                  Angelo De Caro and
                  Maria Dubovitskaya and
                  Kaoutar Elkhiyaoui and
                  Bj{\"{o}}rn Tackmann},
  title        = {Privacy-preserving auditable token payments in a permissioned blockchain
                  system},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1058},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1058},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndroulakiCCDET19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogatovCET19,
  author       = {Dmytro Bogatov and
                  Angelo De Caro and
                  Kaoutar Elkhiyaoui and
                  Bj{\"{o}}rn Tackmann},
  title        = {Anonymous Transactions with Revocation and Auditing in Hyperledger
                  Fabric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1097},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1097},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogatovCET19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VasilopoulosEMO18,
  author       = {Dimitrios Vasilopoulos and
                  Kaoutar Elkhiyaoui and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Aziz Mohaisen and
                  Qian Wang},
  title        = {{POROS:} Proof of Data Reliability for Outsourced Storage},
  booktitle    = {Proceedings of the 6th International Workshop on Security in Cloud
                  Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08,
                  2018},
  pages        = {27--37},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3201595.3201600},
  doi          = {10.1145/3201595.3201600},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VasilopoulosEMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VasilopoulosOEM16,
  author       = {Dimitrios Vasilopoulos and
                  Melek {\"{O}}nen and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Elli Androulaki and
                  Michael K. Reiter},
  title        = {Message-Locked Proofs of Retrievability with Secure Deduplication},
  booktitle    = {Proceedings of the 2016 {ACM} on Cloud Computing Security Workshop,
                  {CCSW} 2016, Vienna, Austria, October 28, 2016},
  pages        = {73--83},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996429.2996433},
  doi          = {10.1145/2996429.2996433},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VasilopoulosOEM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ElkhiyaouiOAM16,
  author       = {Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Monir Azraoui and
                  Refik Molva},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Efficient Techniques for Publicly Verifiable Delegation of Computation},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {119--128},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897910},
  doi          = {10.1145/2897845.2897910},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ElkhiyaouiOAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LeontiadisEOM15,
  author       = {Iraklis Leontiadis and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {{PUDA} - Privacy and Unforgeability for Data Aggregation},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9476},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_1},
  doi          = {10.1007/978-3-319-26823-1\_1},
  timestamp    = {Mon, 02 Jan 2023 08:05:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/LeontiadisEOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AzraouiEOM15,
  author       = {Monir Azraoui and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Publicly verifiable conjunctive keyword search in outsourced databases},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {619--627},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346876},
  doi          = {10.1109/CNS.2015.7346876},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AzraouiEOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeontiadisEOM15,
  author       = {Iraklis Leontiadis and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {{PUDA} - Privacy and Unforgeability for Data Aggregation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeontiadisEOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiOM15,
  author       = {Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Online-Offline Homomorphic Signatures for Polynomial Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {954},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/954},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiOM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LeontiadisEM14,
  author       = {Iraklis Leontiadis and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  editor       = {Dimitris Gritzalis and
                  Aggelos Kiayias and
                  Ioannis G. Askoxylakis},
  title        = {Private and Dynamic Time-Series Data Aggregation with Trust Relaxation},
  booktitle    = {Cryptology and Network Security - 13th International Conference, {CANS}
                  2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8813},
  pages        = {305--320},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12280-9\_20},
  doi          = {10.1007/978-3-319-12280-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LeontiadisEM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/BenghabritGRSAE14,
  author       = {Walid Benghabrit and
                  Herv{\'{e}} Grall and
                  Jean{-}Claude Royer and
                  Mohamed Sellami and
                  Monir Azraoui and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Anderson Santana de Oliveira and
                  Karin Bernsmed},
  editor       = {Markus Helfert and
                  Fr{\'{e}}d{\'{e}}ric Desprez and
                  Donald Ferguson and
                  Frank Leymann and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz},
  title        = {From Regulatory Obligations to Enforceable Accountability Policies
                  in the Cloud},
  booktitle    = {Cloud Computing and Services Sciences - International Conference in
                  Cloud Computing and Services Sciences, {CLOSER} 2014, Barcelona Spain,
                  April 3-5, 2014, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {512},
  pages        = {134--150},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-25414-2\_9},
  doi          = {10.1007/978-3-319-25414-2\_9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/closer/BenghabritGRSAE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/BenghabritGRSAEOOB14,
  author       = {Walid Benghabrit and
                  Herv{\'{e}} Grall and
                  Jean{-}Claude Royer and
                  Mohamed Sellami and
                  Monir Azraoui and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Anderson Santana de Oliveira and
                  Karin Bernsmed},
  editor       = {Markus Helfert and
                  Fr{\'{e}}d{\'{e}}ric Desprez and
                  Donald Ferguson and
                  Frank Leymann and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz},
  title        = {A Cloud Accountability Policy Representation Framework},
  booktitle    = {{CLOSER} 2014 - Proceedings of the 4th International Conference on
                  Cloud Computing and Services Science, Barcelona, Spain, April 3-5,
                  2014},
  pages        = {489--498},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0004949104890498},
  doi          = {10.5220/0004949104890498},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/closer/BenghabritGRSAEOOB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AzraouiEMO14,
  author       = {Monir Azraoui and
                  Kaoutar Elkhiyaoui and
                  Refik Molva and
                  Melek {\"{O}}nen},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {StealthGuard: Proofs of Retrievability with Hidden Watchdogs},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {239--256},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_14},
  doi          = {10.1007/978-3-319-11203-9\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AzraouiEMO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AzraouiEOBOS14,
  author       = {Monir Azraoui and
                  Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Karin Bernsmed and
                  Anderson Santana de Oliveira and
                  Jakub Sendor},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Emil Lupu and
                  Joachim Posegga and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {{A-PPL:} An Accountability Policy Language},
  booktitle    = {Data Privacy Management, Autonomous Spontaneous Security, and Security
                  Assurance - 9th International Workshop, {DPM} 2014, 7th International
                  Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
                  Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8872},
  pages        = {319--326},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17016-9\_21},
  doi          = {10.1007/978-3-319-17016-9\_21},
  timestamp    = {Sun, 25 Oct 2020 22:34:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AzraouiEOBOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ElkhiyaouiOM14,
  author       = {Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Privacy Preserving Delegated Word Search in the Cloud},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {137--150},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005054001370150},
  doi          = {10.5220/0005054001370150},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ElkhiyaouiOM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeontiadisEM14,
  author       = {Iraklis Leontiadis and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {Private and Dynamic Time-Series Data Aggregation with Trust Relaxation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeontiadisEM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiOM14,
  author       = {Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  title        = {Privacy preserving delegated word search in the cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiOM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Elkhiyaoui12,
  author       = {Kaoutar Elkhiyaoui},
  title        = {Security and privacy in {RFID} systems. (S{\'{e}}curit{\'{e}}
                  et protection de la vie priv{\'{e}}e dans les syst{\`{e}}mes
                  {RFID)}},
  school       = {T{\'{e}}l{\'{e}}com ParisTech, France},
  year         = {2012},
  url          = {https://tel.archives-ouvertes.fr/pastel-00990228},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Elkhiyaoui12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/ElkhiyaouiBM12,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  editor       = {Jaap{-}Henk Hoepman and
                  Ingrid Verbauwhede},
  title        = {T-Match: Privacy-Preserving Item Matching for Storage-Only {RFID}
                  Tags},
  booktitle    = {Radio Frequency Identification. Security and Privacy Issues - 8th
                  International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July
                  2-3, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7739},
  pages        = {76--95},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36140-1\_6},
  doi          = {10.1007/978-3-642-36140-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/ElkhiyaouiBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ElkhiyaouiBM12,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {{CHECKER:} on-site checking in RFID-based supply chains},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {173--184},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185471},
  doi          = {10.1145/2185448.2185471},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/ElkhiyaouiBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/BlassEM12,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {{PPS:} Privacy-preserving statistics using {RFID} tags},
  booktitle    = {2012 {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June
                  25-28, 2012},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/WoWMoM.2012.6263773},
  doi          = {10.1109/WOWMOM.2012.6263773},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/BlassEM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiBM12,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  title        = {{T-MATCH:} Privacy-Preserving Item Matching for Storage-Only {RFID}
                  Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/KatoEKYM11,
  author       = {Daishi Kato and
                  Kaoutar Elkhiyaoui and
                  Kazuo Kunieda and
                  Keiji Yamada and
                  Pietro Michiardi},
  title        = {A scalable interest-oriented peer-to-peer pub/sub network},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {4},
  number       = {2},
  pages        = {165--177},
  year         = {2011},
  url          = {https://doi.org/10.1007/s12083-010-0073-3},
  doi          = {10.1007/S12083-010-0073-3},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/KatoEKYM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BlassEMSV11,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva and
                  Olivier Savry and
                  C{\'{e}}dric V{\'{e}}rhilac},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Demo: the f\({}_{\mbox{f}}\) hardware prototype for privacy-preserving
                  {RFID} authentication},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {737--740},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093481},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BlassEMSV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BlassEM11,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {Tracker: Security and Privacy for RFID-based Supply Chains},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
                  2011},
  publisher    = {The Internet Society},
  year         = {2011},
  url          = {https://www.ndss-symposium.org/ndss2011/tracker-security-and-privacy-for-rfid-based-supply-chains},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BlassEM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/ElkhiyaouiBM11,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  editor       = {Ari Juels and
                  Christof Paar},
  title        = {{ROTIV:} {RFID} Ownership Transfer with Issuer Verification},
  booktitle    = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
                  2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7055},
  pages        = {163--182},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25286-0\_11},
  doi          = {10.1007/978-3-642-25286-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/ElkhiyaouiBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiBM11,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  title        = {{CHECKER:} On-site checking in RFID-based supply chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {651},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/651},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassEM10,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {Tracker: Security and Privacy for RFID-based Supply Chains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {219},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/219},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassEM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ElkhiyaouiBM10,
  author       = {Kaoutar Elkhiyaoui and
                  Erik{-}Oliver Blass and
                  Refik Molva},
  title        = {{ROTIV:} {RFID} Ownership Transfer with Issuer Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ElkhiyaouiBM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BilletE09,
  author       = {Olivier Billet and
                  Kaoutar Elkhiyaoui},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Two Attacks against the \emph{F}\({}_{\mbox{\emph{f}}}\) {RFID} Protocol},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {308--320},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_21},
  doi          = {10.1007/978-3-642-10628-6\_21},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BilletE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/ElkhiyaouiKKYM09,
  author       = {Kaoutar Elkhiyaoui and
                  Daishi Kato and
                  Kazuo Kunieda and
                  Keiji Yamada and
                  Pietro Michiardi},
  editor       = {Henning Schulzrinne and
                  Karl Aberer and
                  Anwitaman Datta},
  title        = {A Scalable Interest-oriented Peer-to-Peer Pub/Sub Network},
  booktitle    = {Proceedings {P2P} 2009, Ninth International Conference on Peer-to-Peer
                  Computing, 9-11 September 2009, Seattle, Washington, {USA}},
  pages        = {204--211},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/P2P.2009.5284538},
  doi          = {10.1109/P2P.2009.5284538},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/ElkhiyaouiKKYM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlassEM09,
  author       = {Erik{-}Oliver Blass and
                  Kaoutar Elkhiyaoui and
                  Refik Molva},
  title        = {{PPS:} Privacy Preserving Statistics using {RFID} Tags},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlassEM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics