Tracker: Security and privacy for RFID-based supply chains EO Blass, K Elkhiyaoui, R Molva, ES Antipolis In NDSS’11, 18th Annual Network and Distributed System Security Symposium, 6 …, 2011 | 78 | 2011 |
CHECKER: On-site checking in RFID-based supply chains K Elkhiyaoui, EO Blass, R Molva Proceedings of the fifth ACM conference on security and privacy in wireless …, 2012 | 52 | 2012 |
A-PPL: an accountability policy language M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed, AS De Oliveira, J Sendor Data privacy management, autonomous spontaneous security, and security …, 2014 | 47 | 2014 |
Stealthguard: Proofs of retrievability with hidden watchdogs M Azraoui, K Elkhiyaoui, R Molva, M Önen European Symposium on Research in Computer Security, 239-256, 2014 | 37 | 2014 |
ROTIV: RFID ownership transfer with issuer verification K Elkhiyaoui, EO Blass, R Molva International Workshop on Radio Frequency Identification: Security and …, 2011 | 33 | 2011 |
Private and dynamic time-series data aggregation with trust relaxation I Leontiadis, K Elkhiyaoui, R Molva International Conference on Cryptology and Network Security, 305-320, 2014 | 32 | 2014 |
Efficient techniques for publicly verifiable delegation of computation K Elkhiyaoui, M Önen, M Azraoui, R Molva Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 29 | 2016 |
Publicly verifiable conjunctive keyword search in outsourced databases M Azraoui, K Elkhiyaoui, M Önen, R Molva 2015 IEEE Conference on Communications and Network Security (CNS), 619-627, 2015 | 22 | 2015 |
A Cloud Accountability Policy Representation Framework. W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ... Closer, 489-498, 2014 | 20 | 2014 |
PUDA–privacy and unforgeability for data aggregation I Leontiadis, K Elkhiyaoui, M Önen, R Molva International Conference on Cryptology and Network Security, 3-18, 2015 | 18 | 2015 |
Privacy preserving delegated word search in the cloud K Elkhiyaoui, MÖR Molva 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-14, 2014 | 9 | 2014 |
Message-locked proofs of retrievability with secure deduplication D Vasilopoulos, M Önen, K Elkhiyaoui, R Molva Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 73-83, 2016 | 7 | 2016 |
Two Attacks against the Ff RFID Protocol O Billet, K Elkhiyaoui International Conference on Cryptology in India, 308-320, 2009 | 6 | 2009 |
POROS: Proof of data reliability for outsourced storage D Vasilopoulos, K Elkhiyaoui, R Molva, M Onen Proceedings of the 6th International Workshop on Security in Cloud Computing …, 2018 | 5 | 2018 |
From Regulatory Obligations to Enforceable Accountability Policies in the Cloud W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ... International Conference on Cloud Computing and Services Science, 134-150, 2015 | 5 | 2015 |
T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags K Elkhiyaoui, EO Blass, R Molva International Workshop on Radio Frequency Identification: Security and …, 2012 | 5 | 2012 |
Privacy-preserving auditable token payments in a permissioned blockchain system E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ... Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020 | 4 | 2020 |
A scalable interest-oriented peer-to-peer pub/sub network D Kato, K Elkhiyaoui, K Kunieda, K Yamada, P Michiardi Peer-to-Peer Networking and Applications 4 (2), 165-177, 2011 | 4 | 2011 |
Online-Offline Homomorphic Signatures for Polynomial Functions. K Elkhiyaoui, M Önen, R Molva IACR Cryptol. ePrint Arch. 2015, 954, 2015 | 3 | 2015 |
PPS: Privacy-preserving statistics using RFID tags EO Blass, K Elkhiyaoui, R Molva 2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012 | 3 | 2012 |