default search action
Refik Molva
Person information
- affiliation: Eurecom, Sophia Antipolis, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j33]Dimitrios Vasilopoulos, Melek Önen, Refik Molva, Kaoutar Elkhiyaoui:
Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance†. Secur. Priv. 6(5) (2023)
2010 – 2019
- 2019
- [c101]Dimitrios Vasilopoulos, Melek Önen, Refik Molva:
PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage. ICETE (2) 2019: 173-186 - [c100]Clémentine Gritti, Melek Önen, Refik Molva:
Privacy-preserving delegable authentication in the internet of things. SAC 2019: 861-869 - 2018
- [j32]Clémentine Gritti, Melek Önen, Refik Molva, Willy Susilo, Thomas Plantard:
Device Identification and Personal Data Attestation in Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(4): 1-25 (2018) - [c99]Cédric Van Rompay, Refik Molva, Melek Önen:
Secure and Scalable Multi-User Searchable Encryption. SCC@AsiaCCS 2018: 15-25 - [c98]Dimitrios Vasilopoulos, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen:
POROS: Proof of Data Reliability for Outsourced Storage. SCC@AsiaCCS 2018: 27-37 - [c97]Monir Azraoui, Melek Önen, Refik Molva:
Framework for Searchable Encryption with SQL Databases. CLOSER 2018: 57-67 - [c96]Julien Keuffer, Refik Molva, Hervé Chabanne:
Efficient Proof Composition for Verifiable Computation. ESORICS (1) 2018: 152-171 - [c95]Cédric Van Rompay, Refik Molva, Melek Önen:
Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage. ICICS 2018: 393-408 - [c94]Clémentine Gritti, Melek Önen, Refik Molva:
CHARIOT: Cloud-Assisted Access Control for the Internet of Things. PST 2018: 1-6 - [c93]Clémentine Gritti, Refik Molva, Melek Önen:
Lightweight secure bootstrap and message attestation in the internet of things. SAC 2018: 775-782 - [i16]Cédric Van Rompay, Refik Molva, Melek Önen:
Secure and Scalable Multi-User Searchable Encryption. IACR Cryptol. ePrint Arch. 2018: 90 (2018) - [i15]Clémentine Gritti, Melek Önen, Refik Molva:
CHARIOT: Cloud-Assisted Access Control for the Internet of Things. IACR Cryptol. ePrint Arch. 2018: 632 (2018) - 2017
- [j31]Cédric Van Rompay, Refik Molva, Melek Önen:
A Leakage-Abuse Attack Against Multi-User Searchable Encryption. Proc. Priv. Enhancing Technol. 2017(3): 168 (2017) - [e5]Zheng Yan, Refik Molva, Wojciech Mazurczyk, Raimo Kantola:
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings. Lecture Notes in Computer Science 10394, Springer 2017, ISBN 978-3-319-64700-5 [contents] - [i14]Cédric Van Rompay, Refik Molva, Melek Önen:
A Leakage-Abuse Attack Against Multi-User Searchable Encryption. IACR Cryptol. ePrint Arch. 2017: 400 (2017) - [i13]Hervé Chabanne, Julien Keuffer, Refik Molva:
Embedded Proofs for Verifiable Neural Networks. IACR Cryptol. ePrint Arch. 2017: 1038 (2017) - 2016
- [c92]Dimitrios Vasilopoulos, Melek Önen, Kaoutar Elkhiyaoui, Refik Molva:
Message-Locked Proofs of Retrievability with Secure Deduplication. CCSW 2016: 73-83 - [c91]Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva:
Efficient Techniques for Publicly Verifiable Delegation of Computation. AsiaCCS 2016: 119-128 - 2015
- [c90]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
PUDA - Privacy and Unforgeability for Data Aggregation. CANS 2015: 3-18 - [c89]Monir Azraoui, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Publicly verifiable conjunctive keyword search in outsourced databases. CNS 2015: 619-627 - [c88]Pasquale Puzio, Refik Molva, Melek Önen, Sergio Loureiro:
PerfectDedup: Secure Data Deduplication. DPM/QASA@ESORICS 2015: 150-166 - [c87]Cédric Van Rompay, Refik Molva, Melek Önen:
Multi-user Searchable Encryption in the Cloud. ISC 2015: 299-316 - [i12]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
PUDA - Privacy and Unforgeability for Data Aggregation. IACR Cryptol. ePrint Arch. 2015: 562 (2015) - [i11]Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Online-Offline Homomorphic Signatures for Polynomial Functions. IACR Cryptol. ePrint Arch. 2015: 954 (2015) - 2014
- [j30]Pasquale Puzio, Refik Molva, Melek Önen, Sergio Loureiro:
Block-level De-duplication with Encrypted Data. Open J. Cloud Comput. 1(1): 10-18 (2014) - [c86]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva:
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation. CANS 2014: 305-320 - [c85]Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen:
StealthGuard: Proofs of Retrievability with Hidden Watchdogs. ESORICS (1) 2014: 239-256 - [c84]Iraklis Leontiadis, Refik Molva, Melek Önen:
Privacy Preserving Statistics in the Smart Grid. ICDCS Workshops 2014: 182-187 - [c83]Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Privacy Preserving Delegated Word Search in the Cloud. SECRYPT 2014: 137-150 - [c82]Iraklis Leontiadis, Refik Molva, Melek Önen:
A P2P based usage control enforcement scheme resilient to re-injection attacks. WoWMoM 2014: 1-8 - [i10]Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva:
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation. IACR Cryptol. ePrint Arch. 2014: 256 (2014) - [i9]Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Privacy preserving delegated word search in the cloud. IACR Cryptol. ePrint Arch. 2014: 509 (2014) - 2013
- [j29]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: Private and secure payment with RFID. Comput. Commun. 36(4): 468-480 (2013) - [j28]Peng Liu, Refik Molva, Jiwu Jing:
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems". Secur. Commun. Networks 6(12): 1522-1523 (2013) - [c81]Iraklis Leontiadis, Melek Önen, Refik Molva, Martin J. Chorley, Gualtiero B. Colombo:
Privacy Preserving Similarity Detection for Data Analysis. CGC 2013: 547-552 - [c80]Pasquale Puzio, Refik Molva, Melek Önen, Sergio Loureiro:
ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage. CloudCom (1) 2013: 363-370 - [c79]Mehdi Khalfaoui, Refik Molva, Laurent Gomez:
Secure Alert Tracking in Supply Chain. SECRYPT 2013: 219-229 - 2012
- [j27]Abdullatif Shikfa, Melek Önen, Refik Molva:
Local key management in opportunistic networks. Int. J. Commun. Networks Distributed Syst. 9(1/2): 97-116 (2012) - [c78]Mehdi Khalfaoui, Refik Molva, Laurent Gomez:
Secure Product Tracking in Supply Chain. Inscrypt 2012: 351-370 - [c77]Siani Pearson, Vasilios Tountopoulos, Daniele Catteddu, Mario Südholt, Refik Molva, Christoph Reich, Simone Fischer-Hübner, Christopher Millard, Volkmar Lotz, Martin Gilje Jaatun, Ronald Leenes, Chunming Rong, Javier López:
Accountability for cloud and other future Internet services. CloudCom 2012: 629-632 - [c76]Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen:
PRISM - Privacy-Preserving Search in MapReduce. Privacy Enhancing Technologies 2012: 180-200 - [c75]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags. RFIDSec 2012: 76-95 - [c74]Leucio Antonio Cutillo, Refik Molva, Melek Önen:
Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks. SNS 2012: 6 - [c73]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
CHECKER: on-site checking in RFID-based supply chains. WISEC 2012: 173-184 - [c72]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
PPS: Privacy-preserving statistics using RFID tags. WOWMOM 2012: 1-6 - [c71]Leucio Antonio Cutillo, Refik Molva, Melek Önen:
PRICE: Privacy preserving incentives for cooperation enforcement. WOWMOM 2012: 1-9 - [i8]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags. IACR Cryptol. ePrint Arch. 2012: 465 (2012) - 2011
- [j26]Marco Conti, Song Chong, Serge Fdida, Weijia Jia, Holger Karl, Ying-Dar Lin, Petri Mähönen, Martin Maier, Refik Molva, Steve Uhlig, Moshe Zukerman:
Research challenges towards the Future Internet. Comput. Commun. 34(18): 2115-2134 (2011) - [j25]Roberto Di Pietro, Refik Molva:
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems. J. Netw. Comput. Appl. 34(3): 853-863 (2011) - [j24]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa:
The F_f-Family of Protocols for RFID-Privacy and Authentication. IEEE Trans. Dependable Secur. Comput. 8(3): 466-480 (2011) - [c70]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva, Olivier Savry, Cédric Vérhilac:
Demo: the ff hardware prototype for privacy-preserving RFID authentication. CCS 2011: 737-740 - [c69]Leucio Antonio Cutillo, Refik Molva, Melek Önen:
Analysis of Privacy in Online Social Networks from the Graph Theory Perspective. GLOBECOM 2011: 1-5 - [c68]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
Tracker: Security and Privacy for RFID-based Supply Chains. NDSS 2011 - [c67]Abdullatif Shikfa, Melek Önen, Refik Molva:
Broker-Based Private Matching. PETS 2011: 264-284 - [c66]Yanqiang Sun, Refik Molva, Melek Önen, Xiaodong Wang, Xingming Zhou:
Catch the Jammer in Wireless Sensor Network. PIMRC 2011: 1156-1160 - [c65]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
ROTIV: RFID Ownership Transfer with Issuer Verification. RFIDSec 2011: 163-182 - [c64]Leucio Antonio Cutillo, Refik Molva, Melek Önen:
Safebook: A distributed privacy preserving Online Social Network. WOWMOM 2011: 1-3 - [c63]Sajal K. Das, Guevara Noubir, Refik Molva, Gene Tsudik, Nan Zhang:
Message from the workshop chairs. WOWMOM 2011: 1-4 - [e4]Albert Levi, Peng Liu, Refik Molva:
4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008. ACM 2011, ISBN 978-1-60558-241-2 [contents] - [i7]Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen:
PRISM - Privacy-Preserving Search in MapReduce. IACR Cryptol. ePrint Arch. 2011: 244 (2011) - [i6]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
CHECKER: On-site checking in RFID-based supply chains. IACR Cryptol. ePrint Arch. 2011: 651 (2011) - 2010
- [j23]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy and confidentiality in context-based and epidemic forwarding. Comput. Commun. 33(13): 1493-1504 (2010) - [j22]Alessandro Sorniotti, Refik Molva:
A provably secure secret handshake with dynamic controlled matching. Comput. Secur. 29(5): 619-627 (2010) - [c62]Alessandro Sorniotti, Refik Molva:
Federated Secret Handshakes with Support for Revocation. ICICS 2010: 218-234 - [c61]Refik Molva, Melek Önen:
IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs. PerCom Workshops 2010 - [c60]Abdullatif Shikfa, Melek Önen, Refik Molva:
Bootstrapping security associations in opportunistic networks. PerCom Workshops 2010: 147-152 - [c59]Alessandro Sorniotti, Refik Molva:
Secret interest groups (SIGs) in social networks with an implementation on Facebook. SAC 2010: 621-628 - [i5]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
Tracker: Security and Privacy for RFID-based Supply Chains. IACR Cryptol. ePrint Arch. 2010: 219 (2010) - [i4]Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:
ROTIV: RFID Ownership Transfer with Issuer Verification. IACR Cryptol. ePrint Arch. 2010: 634 (2010)
2000 – 2009
- 2009
- [j21]Alessandro Sorniotti, Refik Molva, Laurent Gomez:
Efficient Access Control forWireless Sensor Data. Ad Hoc Sens. Wirel. Networks 7(3-4): 325-336 (2009) - [j20]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47(12): 94-101 (2009) - [j19]Alessandro Sorniotti, Refik Molva, Laurent Gomez, Christophe Trefois, Annett Laube, Piervito Scaglioso:
Efficient Access Control for Wireless Sensor Data. Int. J. Wirel. Inf. Networks 16(3): 165-174 (2009) - [j18]Roberto Di Pietro, Pietro Michiardi, Refik Molva:
Confidentiality and integrity for data aggregation in WSN using peer monitoring. Secur. Commun. Networks 2(2): 181-194 (2009) - [c58]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy in Content-Based Opportunistic Networks. AINA Workshops 2009: 832-837 - [c57]Alessandro Sorniotti, Refik Molva:
Secret Handshakes with Revocation Support. ICISC 2009: 274-299 - [c56]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
Leveraging Social Links for Trust and Privacy in Networks. iNetSeC 2009: 27-36 - [c55]Erik-Oliver Blass, Refik Molva:
New Directions in RFID Security. iNetSeC 2009: 76-84 - [c54]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network. PrimeLife 2009: 86-101 - [c53]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy-Preserving Content-Based Publish/Subscribe Networks. SEC 2009: 270-282 - [c52]Alessandro Sorniotti, Refik Molva:
A Provably Secure Secret Handshake with Dynamic Controlled Matching. SEC 2009: 330-341 - [c51]Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe:
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. WOWMOM 2009: 1-6 - [c50]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy in context-based and epidemic forwarding. WOWMOM 2009: 1-7 - [c49]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: private and secure payment with RFID. WPES 2009: 51-60 - [i3]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Thorsten Strufe:
PSP: Private and Secure Payment with RFID. IACR Cryptol. ePrint Arch. 2009: 181 (2009) - [i2]Erik-Oliver Blass, Kaoutar Elkhiyaoui, Refik Molva:
PPS: Privacy Preserving Statistics using RFID Tags. IACR Cryptol. ePrint Arch. 2009: 481 (2009) - 2008
- [j17]Frederic Montagut, Refik Molva, Silvan Tecumseh Golega:
Automating the Composition of Transactional Web Services. Int. J. Web Serv. Res. 5(1): 24-41 (2008) - [j16]Frederic Montagut, Refik Molva:
Bridging Security and Fault Management within Distributed Workflow Management Systems. IEEE Trans. Serv. Comput. 1(1): 33-48 (2008) - [j15]Frederic Montagut, Refik Molva, Silvan Tecumseh Golega:
The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions. IEEE Trans. Syst. Man Cybern. Part C 38(3): 319-333 (2008) - [c48]Alessandro Sorniotti, Refik Molva, Laurent Gomez:
Efficient access control for wireless sensor data. PIMRC 2008: 1-5 - [c47]Stuart M. Allen, Marco Conti, Jon Crowcroft, Robin Dunbar, Pietro Liò, José Fernando Ferreira Mendes, Refik Molva, Andrea Passarella, Ioannis Stavrakakis, Roger M. Whitaker:
Social Networking for Pervasive Adaptation. SASO Workshops 2008: 49-54 - [e3]Giovanni Di Crescenzo, Refik Molva:
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, WCAN@ICALP 2007, Wroclaw, Poland, July 8, 2007. Electronic Notes in Theoretical Computer Science 192(2), Elsevier 2008 [contents] - [i1]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa:
The Ff-Family of Protocols for RFID-Privacy and Authentication. IACR Cryptol. ePrint Arch. 2008: 476 (2008) - 2007
- [c46]Adomas Svirskas, Carine Courbis, Refik Molva, Justinas Bedzinskas:
Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach. IEEE SCW 2007: 33-40 - [c45]Frederic Montagut, Refik Molva:
Enforcing Integrity of Execution in Distributed Workflow Management Systems. IEEE SCC 2007: 170-177 - [c44]Adomas Svirskas, Jelena Isachenkova, Refik Molva:
Towards secure and trusted collaboration environment for European public sector. CollaborateCom 2007: 49-56 - [c43]Roberto Di Pietro, Refik Molva:
Information Confinement, Privacy, and Security in RFID Systems. ESORICS 2007: 187-202 - [c42]Frederic Montagut, Refik Molva:
Traceability and Integrity of Execution in Distributed Workflow Management Systems. ESORICS 2007: 251-266 - [c41]Melek Önen, Refik Molva:
Secure Data Aggregation with Multiple Encryption. EWSN 2007: 117-132 - [c40]Melek Önen, Abdullatif Shikfa, Refik Molva:
Optimistic fair exchange for secure forwarding. MobiQuitous 2007: 1-5 - [c39]Giovanni Di Crescenzo, Refik Molva:
Preface. WCAN@ICALP 2007: 1-2 - 2006
- [c38]Walid Bagga, Refik Molva, Stefano Crosta:
Policy-based encryption schemes from bilinear pairings. AsiaCCS 2006: 368 - [c37]Frederic Montagut, Refik Molva:
Towards Transactional PervasiveWorkflows. EDOC 2006: 141-152 - [c36]Frederic Montagut, Refik Molva:
Augmenting Web Services Composition with Transactional Requirements. ICWS 2006: 91-98 - [c35]Walid Bagga, Refik Molva:
Collusion-Free Policy-Based Encryption. ISC 2006: 233-245 - [c34]Walid Bagga, Stefano Crosta, Refik Molva:
Proof-Carrying Proxy Certificates. SCN 2006: 321-335 - [c33]Pietro Michiardi, Refik Molva:
Identity Based Message Authentication for Dynamic Networks. SEC 2006: 50-61 - [c32]Walid Bagga, Stefano Crosta, Pietro Michiardi, Refik Molva:
Establishment of Ad-Hoc Communities through Policy-Based Cryptography. WCAN@ICALP 2006: 107-120 - 2005
- [j14]Pietro Michiardi, Refik Molva:
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks. Ad Hoc Networks 3(2): 193-219 (2005) - [c31]Frederic Montagut, Refik Molva:
Enabling pervasive execution of workflows. CollaborateCom 2005 - [c30]Walid Bagga, Refik Molva:
Policy-Based Cryptography and Applications. Financial Cryptography 2005: 72-87 - [c29]Eitan Altman, Arzad Alam Kherani, Pietro Michiardi, Refik Molva:
Non-cooperative Forwarding in Ad-Hoc Networks. NETWORKING 2005: 486-498 - [e2]Refik Molva, Gene Tsudik, Dirk Westhoff:
Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3813, Springer 2005, ISBN 3-540-30912-8 [contents] - 2004
- [c28]Eitan Altman, Vivek S. Borkar, Arzad Alam Kherani, Pietro Michiardi, Refik Molva:
Some Game-Theoretic Problems in Wireless Ad-Hoc Networks. EuroNGI Workshop 2004: 82-104 - [c27]Melek Önen, Refik Molva:
Reliable group rekeying with a customer perspective. GLOBECOM 2004: 2072-2076 - [c26]Melek Önen, Refik Molva:
Denial of service prevention in satellite networks. ICC 2004: 4387-4391 - [c25]Melek Önen, Refik Molva:
Group Rekeying with a Customer Perspective. ICPADS 2004: 223-229 - [c24]Laurent Bussard, Refik Molva, Yves Roudier:
History-Based Signature or How to Trust Anonymous Documents. iTrust 2004: 78-92 - [c23]Laurent Bussard, Yves Roudier, Refik Molva:
Untraceable Secret Credentials: Trust Establishment with Privacy. PerCom Workshops 2004: 122-126 - [c22]Laurent Bussard, Refik Molva:
One-Time Capabilities for Authorizations without Trust. PerCom 2004: 351-355 - [c21]Laurent Bussard, Refik Molva:
Establishing Trust with Privacy. Security Protocols Workshop 2004: 199-209 - [e1]Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings. Lecture Notes in Computer Science 3193, Springer 2004, ISBN 3-540-22987-6 [contents] - 2003
- [c20]Refik Molva, Pietro Michiardi:
Security in Ad Hoc Networks. PWC 2003: 756-775 - [c19]Alain Pannetrat, Refik Molva:
Efficient Multicast Packet Authentication. NDSS 2003 - 2002
- [c18]Pietro Michiardi, Refik Molva:
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Communications and Multimedia Security 2002: 107-121 - [c17]Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva:
Enabling adaptive and secure extranets. Communications and Multimedia Security 2002: 123-135 - [c16]Alain Pannetrat, Refik Molva:
Multiple layer encryption for multicast groups. Communications and Multimedia Security 2002: 137-153 - [c15]Alain Pannetrat, Refik Molva:
Authenticating real time packet streams and multicasts. ISCC 2002: 490-495 - [c14]Refik Molva, Alain Pannetrat:
Network Security in the Multicast Framework. NETWORKING Tutorials 2002: 59-82 - 2001
- [j13]Sergio Loureiro, Refik Molva, Alain Pannetrat:
Secure Data Collection with Updates. Electron. Commer. Res. 1(1/2): 119-130 (2001) - 2000
- [j12]Refik Molva, Rolf Oppliger:
Éditorial - Sécurité dans les réseaux. Ann. des Télécommunications 55(7-8): 311-312 (2000) - [j11]Refik Molva, Alain Pannetrat:
Scalable multicast security with dynamic recipient groups. ACM Trans. Inf. Syst. Secur. 3(3): 136-160 (2000) - [c13]Refik Molva, Françoise Baude:
Mobile Code, Internet Security, and E-Commerce. ECOOP Workshops 2000: 270-281 - [c12]Refik Molva, Yves Roudier:
A Distributed Access Control Model for Java. ESORICS 2000: 291-308
1990 – 1999
- 1999
- [j10]Refik Molva:
Internet security architecture. Comput. Networks 31(8): 787-804 (1999) - [c11]Refik Molva, Alain Pannetrat:
Scalable Multicast Security in Dynamic Groups. CCS 1999: 101-112 - 1998
- [j9]Refik Molva, Gene Tsudik:
Secret Sets and Applications. Inf. Process. Lett. 65(1): 47-55 (1998) - 1997
- [j8]Christian Blum, Philippe Dubois, Refik Molva, Olivier Schaller:
A Development and Runtime Platform for Teleconferencing Applications. IEEE J. Sel. Areas Commun. 15(3): 576-588 (1997) - [j7]Didier Samfat, Refik Molva:
IDAMN: An Intrusion Detection Architecture for Mobile Networks. IEEE J. Sel. Areas Commun. 15(7): 1373-1380 (1997) - 1996
- [j6]Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen:
Robust and Secure Password and Key Change Method. J. Comput. Secur. 4(1): 97-112 (1996) - [c10]Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth:
Limitations of the Approach of Solving a Network's Security Problem with a Firewall. ESORICS 1996: 144-145 - [c9]Stéphane Roche, Jean-Luc Dugelay, Refik Molva:
Multi-resolution access control algorithm based on fractal coding. ICIP (3) 1996: 235-238 - [c8]Christian Blum, Refik Molva:
A software platform for distributed multimedia applications. MMSD 1996: 10-21 - 1995
- [j5]Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung:
The KryptoKnight family of light-weight protocols for authentication and key distribution. IEEE/ACM Trans. Netw. 3(1): 31-41 (1995) - [c7]Didier Samfat, Refik Molva, N. Asokan:
Untraceability in Mobile Networks. MobiCom 1995: 26-36 - 1994
- [j4]Refik Molva, Didier Samfat, Gene Tsudik:
Authentication of mobile users. IEEE Netw. 8(2): 26-34 (1994) - [c6]Refik Molva, Erich Rütsche:
Application Access Control at Network Level. CCS 1994: 219-228 - [c5]Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen:
Robust and Secure Password and Key Change Method. ESORICS 1994: 107-122 - [c4]Didier Samfat, Refik Molva:
A Method Providing Identity Privacy to Mobile Users During Authentication. WMCSA 1994: 196-199 - 1993
- [j3]Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung:
Systematic Design of a Family of Attack-Resistant Authentication Protocols. IEEE J. Sel. Areas Commun. 11(5): 679-693 (1993) - [c3]Refik Molva, Gene Tsudik:
Authentication method with impersonal token cards. S&P 1993: 56-65 - 1992
- [j2]Philippe A. Janson, Refik Molva, Stefano Zatti:
Architectural Directions for Opening IBM Networks: The Case of OSI. IBM Syst. J. 31(2): 313-335 (1992) - [c2]Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti:
KryptoKnight Authentication and Key Distribution System. ESORICS 1992: 155-174 - 1991
- [j1]Philippe A. Janson, Refik Molva:
Security in Open Networks and Distributed Systems. Comput. Networks ISDN Syst. 22(5): 232-346 (1991) - [c1]Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung:
Systematic Design of Two-Party Authentication Protocols. CRYPTO 1991: 44-61
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint