default search action
Refik Molva
Person information
- affiliation: Eurecom, Sophia Antipolis, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j33]Dimitrios Vasilopoulos, Melek Önen, Refik Molva, Kaoutar Elkhiyaoui:
Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance†. Secur. Priv. 6(5) (2023)
2010 – 2019
- 2019
- [c101]Dimitrios Vasilopoulos, Melek Önen, Refik Molva:
PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage. ICETE (2) 2019: 173-186 - [c100]Clémentine Gritti, Melek Önen, Refik Molva:
Privacy-preserving delegable authentication in the internet of things. SAC 2019: 861-869 - 2018
- [j32]Clémentine Gritti, Melek Önen, Refik Molva, Willy Susilo, Thomas Plantard:
Device Identification and Personal Data Attestation in Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(4): 1-25 (2018) - [c99]Cédric Van Rompay, Refik Molva, Melek Önen:
Secure and Scalable Multi-User Searchable Encryption. SCC@AsiaCCS 2018: 15-25 - [c98]Dimitrios Vasilopoulos, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen:
POROS: Proof of Data Reliability for Outsourced Storage. SCC@AsiaCCS 2018: 27-37 - [c97]Monir Azraoui, Melek Önen, Refik Molva:
Framework for Searchable Encryption with SQL Databases. CLOSER 2018: 57-67 - [c96]Julien Keuffer, Refik Molva, Hervé Chabanne:
Efficient Proof Composition for Verifiable Computation. ESORICS (1) 2018: 152-171 - [c95]Cédric Van Rompay, Refik Molva, Melek Önen:
Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage. ICICS 2018: 393-408 - [c94]Clémentine Gritti, Melek Önen, Refik Molva:
CHARIOT: Cloud-Assisted Access Control for the Internet of Things. PST 2018: 1-6 - [c93]Clémentine Gritti, Refik Molva, Melek Önen:
Lightweight secure bootstrap and message attestation in the internet of things. SAC 2018: 775-782 - [i16]Cédric Van Rompay, Refik Molva, Melek Önen:
Secure and Scalable Multi-User Searchable Encryption. IACR Cryptol. ePrint Arch. 2018: 90 (2018) - [i15]Clémentine Gritti, Melek Önen, Refik Molva:
CHARIOT: Cloud-Assisted Access Control for the Internet of Things. IACR Cryptol. ePrint Arch. 2018: 632 (2018) - 2017
- [j31]Cédric Van Rompay, Refik Molva, Melek Önen:
A Leakage-Abuse Attack Against Multi-User Searchable Encryption. Proc. Priv. Enhancing Technol. 2017(3): 168 (2017) - [e5]Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola:
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. Lecture Notes in Computer Science 10394, Springer 2017, ISBN 978-3-319-64700-5 [contents] - [i14]Cédric Van Rompay, Refik Molva, Melek Önen:
A Leakage-Abuse Attack Against Multi-User Searchable Encryption. IACR Cryptol. ePrint Arch. 2017: 400 (2017) - [i13]Hervé Chabanne, Julien Keuffer, Refik Molva:
Embedded Proofs for Verifiable Neural Networks. IACR Cryptol. ePrint Arch. 2017: 1038 (2017) - 2016
- [c92]Dimitrios Vasilopoulos, Melek Önen, Kaoutar Elkhiyaoui, Refik Molva:
Message-Locked Proofs of Retrievability with Secure Deduplication. CCSW 2016: 73-83 - [c91]Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva:
Efficient Techniques for Publicly Verifiable Delegation of Computation. AsiaCCS 2016: 119-128 - 2015
- [c90]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
PUDA - Privacy and Unforgeability for Data Aggregation. CANS 2015: 3-18 - [c89]Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Publicly verifiable conjunctive keyword search in outsourced databases. CNS 2015: 619-627 - [c88]Pasquale Puzio, Refik Molva, Melek Önen, Sergio Loureiro:
PerfectDedup: Secure Data Deduplication. DPM/QASA@ESORICS 2015: 150-166 - [c87]Cédric Van Rompay, Refik Molva, Melek Önen:
Multi-user Searchable Encryption in the Cloud. ISC 2015: 299-316 - [i12]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
PUDA - Privacy and Unforgeability for Data Aggregation. IACR Cryptol. ePrint Arch. 2015: 562 (2015) - [i11]Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Online-Offline Homomorphic Signatures for Polynomial Functions. IACR Cryptol. ePrint Arch. 2015: 954 (2015) - 2014
- [j30]Pasquale Puzio, Refik Molva, Melek Önen, Sergio Loureiro:
Block-level De-duplication with Encrypted Data. Open J. Cloud Comput. 1(1): 10-18 (2014) - [c86]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva:
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation. CANS 2014: 305-320 - [c85]Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen:
StealthGuard: Proofs of Retrievability with Hidden Watchdogs. ESORICS (1) 2014: 239-256 - [c84]Iraklis Leontiadis, Refik Molva, Melek Önen:
Privacy Preserving Statistics in the Smart Grid. ICDCS Workshops 2014: 182-187 - [c83]Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Privacy Preserving Delegated Word Search in the Cloud. SECRYPT 2014: 137-150 - [c82]Iraklis Leontiadis, Refik Molva, Melek Önen:
A P2P based usage control enforcement scheme resilient to re-injection attacks. WoWMoM 2014: 1-8 - [i10]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva:
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation. IACR Cryptol. ePrint Arch. 2014: 256 (2014) - [i9]Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Privacy preserving delegated word search in the cloud. IACR Cryptol. ePrint Arch. 2014: 509 (2014) - 2013
- [j29]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: Private and secure payment with RFID. Comput. Commun. 36(4): 468-480 (2013) - [j28]Peng Liu, Refik Molva, Jiwu Jing:
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems". Secur. Commun. Networks 6(12): 1522-1523 (2013) - [c81]Iraklis Leontiadis, Melek Önen, Refik Molva, Martin J. Chorley, Gualtiero B. Colombo:
Privacy Preserving Similarity Detection for Data Analysis. CGC 2013: 547-552 - [c80]Pasquale Puzio, Refik Molva, Melek Önen, Sergio Loureiro:
ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage. CloudCom (1) 2013: 363-370 - [c79]Mehdi Khalfaoui, Refik Molva, Laurent Gomez:
Secure Alert Tracking in Supply Chain. SECRYPT 2013: 219-229 - 2012
- [j27]Abdullatif Shikfa, Melek Önen, Refik Molva:
Local key management in opportunistic networks. Int. J. Commun. Networks Distributed Syst. 9(1/2): 97-116 (2012) - [c78]Mehdi Khalfaoui, Refik Molva, Laurent Gomez:
Secure Product Tracking in Supply Chain. Inscrypt 2012: 351-370 - [c77]Siani Pearson, Vasilios Tountopoulos, Daniele Catteddu, Mario Südholt, Refik Molva, Christoph Reich, Simone Fischer-Hübner, Christopher Millard, Volkmar Lotz, Martin Gilje Jaatun, Ronald Leenes, Chunming Rong, Javier López:
Accountability for cloud and other future Internet services. CloudCom 2012: 629-632 - [c76]Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen:
PRISM - Privacy-Preserving Search in MapReduce. Privacy Enhancing Technologies 2012: 180-200 - [c75]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags. RFIDSec 2012: 76-95 - [c74]Leucio Antonio Cutillo, Refik Molva, Melek Önen:
Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks. SNS 2012: 6 - [c73]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
CHECKER: on-site checking in RFID-based supply chains. WISEC 2012: 173-184 - [c72]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
PPS: Privacy-preserving statistics using RFID tags. WOWMOM 2012: 1-6 - [c71]Leucio Antonio Cutillo, Refik Molva, Melek Önen:
PRICE: Privacy preserving incentives for cooperation enforcement. WOWMOM 2012: 1-9 - [i8]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags. IACR Cryptol. ePrint Arch. 2012: 465 (2012) - 2011
- [j26]Marco Conti, Song Chong, Serge Fdida, Weijia Jia, Holger Karl, Ying-Dar Lin, Petri Mähönen, Martin Maier, Refik Molva, Steve Uhlig, Moshe Zukerman:
Research challenges towards the Future Internet. Comput. Commun. 34(18): 2115-2134 (2011) - [j25]Roberto Di Pietro, Refik Molva:
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems. J. Netw. Comput. Appl. 34(3): 853-863 (2011) - [j24]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa:
The F_f-Family of Protocols for RFID-Privacy and Authentication. IEEE Trans. Dependable Secur. Comput. 8(3): 466-480 (2011) - [c70]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva, Olivier Savry, Cédric Vérhilac:
Demo: the ff hardware prototype for privacy-preserving RFID authentication. CCS 2011: 737-740 - [c69]Leucio Antonio Cutillo, Refik Molva, Melek Önen:
Analysis of Privacy in Online Social Networks from the Graph Theory Perspective. GLOBECOM 2011: 1-5 - [c68]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
Tracker: Security and Privacy for RFID-based Supply Chains. NDSS 2011 - [c67]Abdullatif Shikfa, Melek Önen, Refik Molva:
Broker-Based Private Matching. PETS 2011: 264-284 - [c66]Yanqiang Sun, Refik Molva, Melek Önen, Xiaodong Wang, Xingming Zhou:
Catch the Jammer in Wireless Sensor Network. PIMRC 2011: 1156-1160 - [c65]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
ROTIV: RFID Ownership Transfer with Issuer Verification. RFIDSec 2011: 163-182 - [c64]Leucio Antonio Cutillo, Refik Molva, Melek Önen:
Safebook: A distributed privacy preserving Online Social Network. WOWMOM 2011: 1-3 - [c63]Sajal K. Das, Guevara Noubir, Refik Molva, Gene Tsudik, Nan Zhang:
Message from the workshop chairs. WOWMOM 2011: 1-4 - [e4]Albert Levi, Peng Liu, Refik Molva:
4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008. ACM 2011, ISBN 978-1-60558-241-2 [contents] - [i7]Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen:
PRISM - Privacy-Preserving Search in MapReduce. IACR Cryptol. ePrint Arch. 2011: 244 (2011) - [i6]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
CHECKER: On-site checking in RFID-based supply chains. IACR Cryptol. ePrint Arch. 2011: 651 (2011) - 2010
- [j23]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy and confidentiality in context-based and epidemic forwarding. Comput. Commun. 33(13): 1493-1504 (2010) - [j22]Alessandro Sorniotti, Refik Molva:
A provably secure secret handshake with dynamic controlled matching. Comput. Secur. 29(5): 619-627 (2010) - [c62]Alessandro Sorniotti, Refik Molva:
Federated Secret Handshakes with Support for Revocation. ICICS 2010: 218-234 - [c61]Refik Molva, Melek Önen:
IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs. PerCom Workshops 2010 - [c60]Abdullatif Shikfa, Melek Önen, Refik Molva:
Bootstrapping security associations in opportunistic networks. PerCom Workshops 2010: 147-152 - [c59]Alessandro Sorniotti, Refik Molva:
Secret interest groups (SIGs) in social networks with an implementation on Facebook. SAC 2010: 621-628 - [i5]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
Tracker: Security and Privacy for RFID-based Supply Chains. IACR Cryptol. ePrint Arch. 2010: 219 (2010) - [i4]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
ROTIV: RFID Ownership Transfer with Issuer Verification. IACR Cryptol. ePrint Arch. 2010: 634 (2010)
2000 – 2009
- 2009
- [j21]Alessandro Sorniotti, Refik Molva, Laurent Gomez:
Efficient Access Control forWireless Sensor Data. Ad Hoc Sens. Wirel. Networks 7(3-4): 325-336 (2009) - [j20]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47(12): 94-101 (2009) - [j19]Alessandro Sorniotti, Refik Molva, Laurent Gomez, Christophe Trefois, Annett Laube, Piervito Scaglioso:
Efficient Access Control for Wireless Sensor Data. Int. J. Wirel. Inf. Networks 16(3): 165-174 (2009) - [j18]Roberto Di Pietro, Pietro Michiardi, Refik Molva:
Confidentiality and integrity for data aggregation in WSN using peer monitoring. Secur. Commun. Networks 2(2): 181-194 (2009) - [c58]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy in Content-Based Opportunistic Networks. AINA Workshops 2009: 832-837 - [c57]Alessandro Sorniotti, Refik Molva:
Secret Handshakes with Revocation Support. ICISC 2009: 274-299 - [c56]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
Leveraging Social Links for Trust and Privacy in Networks. iNetSeC 2009: 27-36 - [c55]Erik-Oliver Blass, Refik Molva:
New Directions in RFID Security. iNetSeC 2009: 76-84 - [c54]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network. PrimeLife 2009: 86-101 - [c53]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy-Preserving Content-Based Publish/Subscribe Networks. SEC 2009: 270-282 - [c52]Alessandro Sorniotti, Refik Molva:
A Provably Secure Secret Handshake with Dynamic Controlled Matching. SEC 2009: 330-341 - [c51]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. WOWMOM 2009: 1-6 - [c50]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy in context-based and epidemic forwarding. WOWMOM 2009: 1-7 - [c49]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: private and secure payment with RFID. WPES 2009: 51-60 - [i3]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: Private and Secure Payment with RFID. IACR Cryptol. ePrint Arch. 2009: 181 (2009) - [i2]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
PPS: Privacy Preserving Statistics using RFID Tags. IACR Cryptol. ePrint Arch. 2009: 481 (2009) - 2008
- [j17]Frederic Montagut, Refik Molva, Silvan Tecumseh Golega:
Automating the Composition of Transactional Web Services. Int. J. Web Serv. Res. 5(1): 24-41 (2008) - [j16]Frederic Montagut, Refik Molva:
Bridging Security and Fault Management within Distributed Workflow Management Systems. IEEE Trans. Serv. Comput. 1(1): 33-48 (2008) - [j15]Frederic Montagut, Refik Molva, Silvan Tecumseh Golega:
The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions. IEEE Trans. Syst. Man Cybern. Part C 38(3): 319-333 (2008) - [c48]Alessandro Sorniotti, Refik Molva, Laurent Gomez:
Efficient access control for wireless sensor data. PIMRC 2008: 1-5 - [c47]Stuart M. Allen, Marco Conti, Jon Crowcroft, Robin Dunbar, Pietro Liò, José Fernando Ferreira Mendes, Refik Molva, Andrea Passarella, Ioannis Stavrakakis, Roger M. Whitaker:
Social Networking for Pervasive Adaptation. SASO Workshops 2008: 49-54 - [e3]Giovanni Di Crescenzo, Refik Molva:
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007. Electronic Notes in Theoretical Computer Science 192(2), Elsevier 2008 [contents] - [i1]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa:
The Ff-Family of Protocols for RFID-Privacy and Authentication. IACR Cryptol. ePrint Arch. 2008: 476 (2008) - 2007
- [c46]Adomas Svirskas, Carine Courbis, Refik Molva, Justinas Bedzinskas:
Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach. IEEE SCW 2007: 33-40 - [c45]Frederic Montagut, Refik Molva:
Enforcing Integrity of Execution in Distributed Workflow Management Systems. IEEE SCC 2007: 170-177 - [c44]Adomas Svirskas, Jelena Isachenkova, Refik Molva:
Towards secure and trusted collaboration environment for European public sector. CollaborateCom 2007: 49-56 - [c43]Roberto Di Pietro, Refik Molva:
Information Confinement, Privacy, and Security in RFID Systems. ESORICS 2007: 187-202 - [c42]Frederic Montagut, Refik Molva:
Traceability and Integrity of Execution in Distributed Workflow Management Systems. ESORICS 2007: 251-266 - [c41]Melek Önen, Refik Molva:
Secure Data Aggregation with Multiple Encryption. EWSN 2007: 117-132 - [c40]Melek Önen, Abdullatif Shikfa, Refik Molva:
Optimistic fair exchange for secure forwarding. MobiQuitous 2007: 1-5 - [c39]Giovanni Di Crescenzo, Refik Molva:
Preface. WCAN@ICALP 2007: 1-2 - 2006
- [c38]Walid Bagga, Refik Molva, Stefano Crosta:
Policy-based encryption schemes from bilinear pairings. AsiaCCS 2006: 368 - [c37]Frederic Montagut, Refik Molva:
Towards Transactional PervasiveWorkflows. EDOC 2006: 141-152 - [c36]Frederic Montagut, Refik Molva:
Augmenting Web Services Composition with Transactional Requirements. ICWS 2006: 91-98 - [c35]Walid Bagga, Refik Molva:
Collusion-Free Policy-Based Encryption. ISC 2006: 233-245 - [c34]Walid Bagga, Stefano Crosta, Refik Molva:
Proof-Carrying Proxy Certificates. SCN 2006: 321-335 - [c33]Pietro Michiardi, Refik Molva:
Identity Based Message Authentication for Dynamic Networks. SEC 2006: 50-61 - [c32]Walid Bagga, Stefano Crosta, Pietro Michiardi, Refik Molva:
Establishment of Ad-Hoc Communities through Policy-Based Cryptography. WCAN@ICALP 2006: 107-120 - 2005
- [j14]Pietro Michiardi, Refik Molva:
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks. Ad Hoc Networks 3(2): 193-219 (2005) - [c31]Frederic Montagut, Refik Molva:
Enabling pervasive execution of workflows. CollaborateCom 2005 - [c30]Walid Bagga, Refik Molva:
Policy-Based Cryptography and Applications. Financial Cryptography 2005: 72-87 - [c29]Eitan Altman, Arzad Alam Kherani, Pietro Michiardi, Refik Molva:
Non-cooperative Forwarding in Ad-Hoc Networks. NETWORKING 2005: 486-498 - [e2]Refik Molva, Gene Tsudik, Dirk Westhoff:
Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3813, Springer 2005, ISBN 3-540-30912-8 [contents] - 2004
- [c28]Eitan Altman, Vivek S. Borkar, Arzad Alam Kherani, Pietro Michiardi, Refik Molva:
Some Game-Theoretic Problems in Wireless Ad-Hoc Networks. EuroNGI Workshop 2004: 82-104 - [c27]Melek Önen, Refik Molva:
Reliable group rekeying with a customer perspective. GLOBECOM 2004: 2072-2076 - [c26]Melek Önen, Refik Molva:
Denial of service prevention in satellite networks. ICC 2004: 4387-4391 - [c25]Melek Önen, Refik Molva:
Group Rekeying with a Customer Perspective. ICPADS 2004: 223-229 - [c24]Laurent Bussard, Refik Molva, Yves Roudier:
History-Based Signature or How to Trust Anonymous Documents. iTrust 2004: 78-92 - [c23]Laurent Bussard, Yves Roudier, Refik Molva:
Untraceable Secret Credentials: Trust Establishment with Privacy. PerCom Workshops 2004: 122-126 - [c22]Laurent Bussard, Refik Molva:
One-Time Capabilities for Authorizations without Trust. PerCom 2004: 351-355 - [c21]Laurent Bussard, Refik Molva:
Establishing Trust with Privacy. Security Protocols Workshop 2004: 199-209 - [e1]Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings. Lecture Notes in Computer Science 3193, Springer 2004, ISBN 3-540-22987-6 [contents] - 2003
- [c20]