Kaoutar Elkhiyaoui
Kaoutar Elkhiyaoui
IBM Research
E-mail megerősítve itt: zurich.ibm.com
Cím
Hivatkozott rá
Hivatkozott rá
Év
Tracker: Security and privacy for RFID-based supply chains
EO Blass, K Elkhiyaoui, R Molva, ES Antipolis
In NDSS’11, 18th Annual Network and Distributed System Security Symposium, 6 …, 2011
782011
CHECKER: On-site checking in RFID-based supply chains
K Elkhiyaoui, EO Blass, R Molva
Proceedings of the fifth ACM conference on security and privacy in wireless …, 2012
522012
A-PPL: an accountability policy language
M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed, AS De Oliveira, J Sendor
Data privacy management, autonomous spontaneous security, and security …, 2014
472014
Stealthguard: Proofs of retrievability with hidden watchdogs
M Azraoui, K Elkhiyaoui, R Molva, M Önen
European Symposium on Research in Computer Security, 239-256, 2014
372014
ROTIV: RFID ownership transfer with issuer verification
K Elkhiyaoui, EO Blass, R Molva
International Workshop on Radio Frequency Identification: Security and …, 2011
332011
Private and dynamic time-series data aggregation with trust relaxation
I Leontiadis, K Elkhiyaoui, R Molva
International Conference on Cryptology and Network Security, 305-320, 2014
322014
Efficient techniques for publicly verifiable delegation of computation
K Elkhiyaoui, M Önen, M Azraoui, R Molva
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
292016
Publicly verifiable conjunctive keyword search in outsourced databases
M Azraoui, K Elkhiyaoui, M Önen, R Molva
2015 IEEE Conference on Communications and Network Security (CNS), 619-627, 2015
222015
A Cloud Accountability Policy Representation Framework.
W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ...
Closer, 489-498, 2014
202014
PUDA–privacy and unforgeability for data aggregation
I Leontiadis, K Elkhiyaoui, M Önen, R Molva
International Conference on Cryptology and Network Security, 3-18, 2015
182015
Privacy preserving delegated word search in the cloud
K Elkhiyaoui, MÖR Molva
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-14, 2014
92014
Message-locked proofs of retrievability with secure deduplication
D Vasilopoulos, M Önen, K Elkhiyaoui, R Molva
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 73-83, 2016
72016
Two Attacks against the Ff RFID Protocol
O Billet, K Elkhiyaoui
International Conference on Cryptology in India, 308-320, 2009
62009
POROS: Proof of data reliability for outsourced storage
D Vasilopoulos, K Elkhiyaoui, R Molva, M Onen
Proceedings of the 6th International Workshop on Security in Cloud Computing …, 2018
52018
From Regulatory Obligations to Enforceable Accountability Policies in the Cloud
W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ...
International Conference on Cloud Computing and Services Science, 134-150, 2015
52015
T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags
K Elkhiyaoui, EO Blass, R Molva
International Workshop on Radio Frequency Identification: Security and …, 2012
52012
Privacy-preserving auditable token payments in a permissioned blockchain system
E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ...
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
42020
A scalable interest-oriented peer-to-peer pub/sub network
D Kato, K Elkhiyaoui, K Kunieda, K Yamada, P Michiardi
Peer-to-Peer Networking and Applications 4 (2), 165-177, 2011
42011
Online-Offline Homomorphic Signatures for Polynomial Functions.
K Elkhiyaoui, M Önen, R Molva
IACR Cryptol. ePrint Arch. 2015, 954, 2015
32015
PPS: Privacy-preserving statistics using RFID tags
EO Blass, K Elkhiyaoui, R Molva
2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012
32012
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20