Refik Molva
Orcid: 0000-0001-5947-5850Affiliations:
- Eurecom, Sophia Antipolis, France
According to our database1,
Refik Molva
authored at least 134 papers
between 1991 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on eurecom.fr
On csauthors.net:
Bibliography
2023
Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance†.
Secur. Priv., 2023
2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018
2017
Proc. Priv. Enhancing Technol., 2017
2016
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems".
Secur. Commun. Networks, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013
2012
Int. J. Commun. Networks Distributed Syst., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012
Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks.
Proceedings of the Fifth Workshop on Social Network Systems, 2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
An optimal probabilistic solution for information confinement, privacy, and security in RFID systems.
J. Netw. Comput. Appl., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the IEEE 22nd International Symposium on Personal, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the Global Communications Conference, 2011
Demo: the f<sub>f</sub> hardware prototype for privacy-preserving RFID authentication.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Comput. Secur., 2010
Comput. Commun., 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
2009
Secur. Commun. Networks, 2009
Int. J. Wirel. Inf. Networks, 2009
IEEE Commun. Mag., 2009
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009
Proceedings of the Emerging Challenges for Security, 2009
On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network.
Proceedings of the Privacy and Identity Management for Life, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions.
IEEE Trans. Syst. Man Cybern. Part C, 2008
Bridging Security and Fault Management within Distributed Workflow Management Systems.
IEEE Trans. Serv. Comput., 2008
Int. J. Web Serv. Res., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008
Proceedings of the IEEE 19th International Symposium on Personal, 2008
2007
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Proceedings of the Wireless Sensor Networks, 2007
Proceedings of the Computer Security, 2007
Proceedings of the Computer Security, 2007
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
Proceedings of the 2007 IEEE International Conference on Services Computing, 2007
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007
2006
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks.
Ad Hoc Networks, 2005
Proceedings of the NETWORKING 2005: Networking Technologies, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the 1st International Conference on Collaborative Computing: Networking, 2005
2004
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 2004
Proceedings of the Trust Management, Second International Conference, 2004
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004
Proceedings of IEEE International Conference on Communications, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Wireless Systems and Mobility in Next Generation Internet, 2004
2003
Proceedings of the Network and Distributed System Security Symposium, 2003
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003
2002
Proceedings of the Advanced Lectures on Networking, 2002
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
Proceedings of the Advanced Communications and Multimedia Security, 2002
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks.
Proceedings of the Advanced Communications and Multimedia Security, 2002
2001
2000
ACM Trans. Inf. Syst. Secur., 2000
Proceedings of the Computer Security, 2000
Proceedings of the Object-Oriented Technology, 2000
1999
1998
1997
IEEE J. Sel. Areas Commun., 1997
IEEE J. Sel. Areas Commun., 1997
1996
Proceedings of the 1996 International Workshop on Multimedia Software Development, 1996
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996
Proceedings of the Computer Security, 1996
1995
The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw., 1995
1994
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994
1993
IEEE J. Sel. Areas Commun., 1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
1992
IBM Syst. J., 1992
Proceedings of the Computer Security, 1992
1991
Proceedings of the Advances in Cryptology, 1991