Tracker: Security and privacy for RFID-based supply chains EO Blass, K Elkhiyaoui, R Molva Cryptology ePrint Archive, 2010 | 87 | 2010 |
CHECKER: On-site checking in RFID-based supply chains K Elkhiyaoui, EO Blass, R Molva Proceedings of the fifth ACM conference on security and privacy in wireless …, 2012 | 62 | 2012 |
A-PPL: an accountability policy language M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed, ASD Oliveira, J Sendor Data privacy management, autonomous spontaneous security, and security …, 2014 | 60 | 2014 |
Private and dynamic time-series data aggregation with trust relaxation I Leontiadis, K Elkhiyaoui, R Molva International Conference on Cryptology and Network Security, 305-320, 2014 | 45 | 2014 |
Efficient techniques for publicly verifiable delegation of computation K Elkhiyaoui, M Önen, M Azraoui, R Molva Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 40 | 2016 |
Stealthguard: Proofs of retrievability with hidden watchdogs M Azraoui, K Elkhiyaoui, R Molva, M Önen European Symposium on Research in Computer Security, 239-256, 2014 | 36 | 2014 |
ROTIV: RFID ownership transfer with issuer verification K Elkhiyaoui, EO Blass, R Molva International Workshop on Radio Frequency Identification: Security and …, 2011 | 34 | 2011 |
Privacy-preserving auditable token payments in a permissioned blockchain system E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ... Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020 | 29 | 2020 |
Publicly verifiable conjunctive keyword search in outsourced databases M Azraoui, K Elkhiyaoui, M Önen, R Molva 2015 IEEE conference on communications and network security (CNS), 619-627, 2015 | 28 | 2015 |
PUDA–privacy and unforgeability for data aggregation I Leontiadis, K Elkhiyaoui, M Önen, R Molva International Conference on Cryptology and Network Security, 3-18, 2015 | 27 | 2015 |
A Cloud Accountability Policy Representation Framework. W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ... Closer, 489-498, 2014 | 23 | 2014 |
Anonymous transactions with revocation and auditing in hyperledger fabric D Bogatov, AD Caro, K Elkhiyaoui, B Tackmann International Conference on Cryptology and Network Security, 435-459, 2021 | 12 | 2021 |
Message-locked proofs of retrievability with secure deduplication D Vasilopoulos, M Önen, K Elkhiyaoui, R Molva Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 73-83, 2016 | 11 | 2016 |
Privacy preserving delegated word search in the cloud K Elkhiyaoui, M Onen, R Molva 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-14, 2014 | 10 | 2014 |
Decentralized privacy-preserving netting protocol on blockchain for payment systems S Cao, Y Yuan, AD Caro, K Nandakumar, K Elkhiyaoui, Y Hu International Conference on Financial Cryptography and Data Security, 137-155, 2020 | 6 | 2020 |
POROS: proof of data reliability for outsourced storage D Vasilopoulos, K Elkhiyaoui, R Molva, M Onen Proceedings of the 6th International Workshop on Security in Cloud Computing …, 2018 | 6 | 2018 |
Two Attacks against the Ff RFID Protocol O Billet, K Elkhiyaoui International Conference on Cryptology in India, 308-320, 2009 | 6 | 2009 |
From regulatory obligations to enforceable accountability policies in the Cloud W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ... International Conference on Cloud Computing and Services Science, 134-150, 2014 | 5 | 2014 |
T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags K Elkhiyaoui, EO Blass, R Molva International Workshop on Radio Frequency Identification: Security and …, 2012 | 5 | 2012 |
A scalable interest-oriented peer-to-peer pub/sub network D Kato, K Elkhiyaoui, K Kunieda, K Yamada, P Michiardi Peer-to-Peer Networking and Applications 4 (2), 165-177, 2011 | 4 | 2011 |