Anis Bkakria

Orcid: 0000-0002-9758-4617

According to our database1, Anis Bkakria authored at least 25 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Key Policy Attribute-Based Encryption Leveraging Isogeny-Based Cryptography.
IACR Cryptol. ePrint Arch., 2024

A Framework for Managing Multifaceted Privacy Leakage While Optimizing Utility in Continuous LBS Interactions.
CoRR, 2024

Efficient Post-Quantum Pattern Matching on Encrypted Data.
IACR Commun. Cryptol., 2024

A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

2023
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption.
J. Comput. Secur., 2023

Privacy of Smart Traffic Lights Systems.
Proceedings of the IEEE Vehicular Networking Conference, 2023

Robustness Assessment of Biometric Authenticators.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A Framework for Privacy Policy Enforcement for Connected Automotive Systems.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

H3PC: Enhanced Security and Privacy-Preserving Platoon Construction Based on Fully Homomorphic Encryption.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

A Systematic Approach for Automotive Privacy Management.
Proceedings of the 7th ACM Computer Science in Cars Symposium, 2023

2022
Robust, Revocable and Adaptively Secure Attribute-Based Access Control with Outsourced Decryption.
IACR Cryptol. ePrint Arch., 2022

Privacy Threat Analysis for connected and autonomous vehicles.
Proceedings of the 13th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2022) / The 12th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2022), 2022

Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

2021
Secure and Robust Cyber Security Threat Information Sharing.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2020
Privacy-Preserving Pattern Matching on Encrypted Data.
IACR Cryptol. ePrint Arch., 2020

2018
Linking Differential Identifiability with Differential Privacy.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Optimal Distribution of Privacy Budget in Differential Privacy.
Proceedings of the Risks and Security of Internet and Systems, 2018

2017
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017

2015
Specification and deployment of integrated Security Policy for Outsourced Data. (Expression et déploiement de politiques de sécurité intégrés pour données externalisées).
PhD thesis, 2015

Security Mechanisms Planning to Enforce Security Policies.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

2014
Optimized and controlled provisioning of encrypted outsourced data.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Specification and Deployment of Integrated Security Policies for Outsourced Data.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013


  Loading...