Abdullatif Shikfa

Orcid: 0000-0002-6479-3578

According to our database1, Abdullatif Shikfa authored at least 31 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography.
IEEE Access, 2024

2021
Vulnerabilities and countermeasures in electrical substations.
Int. J. Crit. Infrastructure Prot., 2021

2020
Private Function Evaluation Using Intel's SGX.
Secur. Commun. Networks, 2020

Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique.
Proceedings of the IEEE International Conference on Informatics, 2020

Application of artificial intelligence in electrical power systems.
Proceedings of the IEEE International Conference on Informatics, 2020

2019
Securing Aggregate Queries for DNA Databases.
IEEE Trans. Cloud Comput., 2019

Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices.
Comput. Commun., 2019

Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices.
Proceedings of the 3rd International Conference on Future Networks and Distributed Systems, 2019

2018
Substring search over encrypted data.
J. Comput. Secur., 2018

Cybersecurity Issues in Implanted Medical Devices.
Proceedings of the 2018 International Conference on Computer and Applications (ICCA), 2018

Smart Grid Cybersecurity: Standards and Technical Countermeasures.
Proceedings of the 2018 International Conference on Computer and Applications (ICCA), 2018

2017
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
An efficient instance hiding scheme.
Proceedings of the Seventh Symposium on Information and Communication Technology, 2016

2014
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Semantic search over encrypted data.
Proceedings of the 20st International Conference on Telecommunications, 2013

Searchable Encryption Supporting General Boolean Expression Queries.
Proceedings of the Financial Cryptography and Data Security, 2013

Boolean symmetric searchable encryption.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Local key management in opportunistic networks.
Int. J. Commun. Networks Distributed Syst., 2012

On The Limits of Privacy Provided by Order-Preserving Encryption.
Bell Labs Tech. J., 2012

Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
The F_f-Family of Protocols for RFID-Privacy and Authentication.
IEEE Trans. Dependable Secur. Comput., 2011

Broker-Based Private Matching.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

2010
Privacy and confidentiality in context-based and epidemic forwarding.
Comput. Commun., 2010

Bootstrapping security associations in opportunistic networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Security issues in opportunistic networks.
Proceedings of the Second International Workshop on Mobile Opportunistic Networking, 2010

2009
Privacy in context-based and epidemic forwarding.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

Privacy-Preserving Content-Based Publish/Subscribe Networks.
Proceedings of the Emerging Challenges for Security, 2009

Privacy in Content-Based Opportunistic Networks.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
The F<sub>f</sub>-Family of Protocols for RFID-Privacy and Authentication.
IACR Cryptol. ePrint Arch., 2008

2007
Optimistic fair exchange for secure forwarding.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

2005
User Profile Management in Converged Networks (Episode II): "Share your Data, Keep your Secrets".
Proceedings of the Second Biennial Conference on Innovative Data Systems Research, 2005


  Loading...