Author image not provided
 Réfik Molva

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article8.95
Citation Count689
Publication count77
Publication years1991-2016
Available for download14
Average downloads per article444.79
Downloads (cumulative)6,227
Downloads (12 Months)303
Downloads (6 Weeks)28
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


77 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 77
Result page: 1 2 3 4

Sort by:

1 published by ACM
October 2016 CCSW '16: Proceedings of the 2016 ACM on Cloud Computing Security Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 5,   Downloads (12 Months): 94,   Downloads (Overall): 130

Full text available: PDFPDF
This paper addresses the problem of data retrievability in cloud computing systems performing deduplication to optimize their space savings: While there exist a number of proof of retrievability (PoR) solutions that guarantee storage correctness with cryptographic means, these solutions unfortunately come at odds with the deduplication technology. To reconcile proofs ...
Keywords: data deduplication, proofs of retrievability, server aided encryption, message-locked encryption, secure cloud storage

2 published by ACM
May 2016 ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8,   Downloads (12 Months): 64,   Downloads (Overall): 193

Full text available: PDFPDF
With the advent of cloud computing, individuals and companies alike are looking for opportunities to leverage cloud resources not only for storage but also for computation. Nevertheless, the reliance on the cloud to perform computation raises the unavoidable challenge of how to assure the correctness of the delegated computation. In ...
Keywords: verifiable matrix multiplication, cloud computing, verifiable polynomial evaluation, cryptographic protocols, public delegatability, public verifiability, verifiable computation

3
September 2015 Revised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 9481
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 2

With the continuous increase of cloud storage adopters, data deduplication has become a necessity for cloud providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. Unfortunately, deduplication introduces a number of new security challenges. We propose PerfectDedup, a novel scheme ...
Keywords: Encryption, Perfect hashing, Cloud, Confidentiality, Deduplication, Storage, Security

4
September 2015 ISC 2015: Proceedings of the 18th International Conference on Information Security - Volume 9290
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

While Searchable Encryption SE has been widely studied, adapting it to the multi-user setting whereby many users can upload secret files or documents and delegate search operations to multiple other users still remains an interesting problem. In this paper we show that the adversarial models used in existing multi-user searchable ...

5
October 2014 Proceedings of the 13th International Conference on Cryptology and Network Security - Volume 8813
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 3

With the advent of networking applications collecting user data on a massive scale, the privacy of individual users appears to be a major concern. The main challenge is the design of a solution that allows the data analyzer to compute global statistics over the set of individual inputs that are ...
Keywords: privacy, time-series data, data aggregation

6
August 2014 ICETE 2014: Proceedings of the 11th International Joint Conference on e-Business and Telecommunications - Volume 4
Publisher: SCITEPRESS - Science and Technology Publications, Lda
Bibliometrics:
Citation Count: 0

In this paper, we address the problem of privacy preserving delegated word search in the cloud. We consider a scenario where a data owner outsources its data to a cloud server and delegates the search capabilities to a set of third party users. In the face of semi-honest cloud servers, ...
Keywords: Delegation, Privacy Preserving Keyword Search, Cloud.

7
June 2014 ICDCSW '14: Proceedings of the 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Smart meters are widely deployed to provide fine-grained information pertaining to tenant power consumption. These data are analyzed by suppliers for more accurate statistics, energy consumption predictions and personalized billing. Indirectly this aggregation of data can reveal personal information of tenants such as number of persons in a house, vacation ...
Keywords: smart metering, privacy, security, data analysis

8
December 2013 CLOUDCOM '13: Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science - Volume 01
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 7

With the continuous and exponential increase of the number of users and the size of their data, data deduplication becomes more and more a necessity for cloud storage providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. The advantages of ...
Keywords: deduplication, cloud storage, convergent encryption, confidentiality, privacy

9
September 2013 CGC '13: Proceedings of the 2013 International Conference on Cloud and Green Computing
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Current applications tend to use personal sensitive information to achieve better quality with respect to their services. Since the third parties are not trusted the data must be protected such that individual data privacy is not compromised but at the same time operations on it would be compatible. A wide ...
Keywords: Information security, privacy, data analysis, similarity detection

10
February 2013 Computer Communications: Volume 36 Issue 4, February, 2013
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 1

RFID can be used for a variety of applications, e.g., to conveniently pay for public transportation. However, achieving security and privacy of payment is challenging due to the extreme resource restrictions of RFID tags. In this paper, we propose PSP - a secure, RFID-based protocol for privacy-preserving payment that supports ...
Keywords: Payment, Security, Privacy, Ecash, RFID

11
December 2012 CLOUDCOM '12: Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Cloud and IT service providers should act as responsible stewards for the data of their customers and users. However, the current absence of accountability frameworks for distributed IT services makes it difficult for users to understand, influence and determine how their service providers honour their obligations. The A4Cloud project will ...
Keywords: Business,Law,Cloud computing,Educational institutions,Monitoring,Biological system modeling

12
July 2012 PETS'12: Proceedings of the 12th international conference on Privacy Enhancing Technologies
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 8

We present PRISM, a privacy-preserving scheme for word search in cloud computing. In the face of a curious cloud provider, the main challenge is to design a scheme that achieves privacy while preserving the efficiency of cloud computing. Solutions from related research, like encrypted keyword search or Private Information Retrieval ...

13
July 2012 RFIDSec'12: Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

RFID-based tag matching allows a reader R k to determine whether two tags T i and T j store some attributes that jointly fulfill a boolean constraint. The challenge in designing a matching mechanism is tag privacy. While cheap tags are unable to perform any computation, matching has to be ...

14
July 2012 International Journal of Communication Networks and Distributed Systems: Volume 9 Issue 1/2, July 2012
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 4

Opportunistic networks are a new and specific type of mobile peer-to-peer networks where end-to-end connectivity cannot be assumed. These networks present compelling challenges, especially from a security perspective, as interactive protocols are infeasible in such environments. In this article, we focus on the problem of key management in the framework ...

15 published by ACM
April 2012 WISEC '12: Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 2,   Downloads (12 Months): 31,   Downloads (Overall): 261

Full text available: PDFPDF
Counterfeit detection in RFID-based supply chains aims at preventing adversaries from injecting fake products that do not meet quality standards. This paper introduces CHECKER, a new protocol for counterfeit detection in RFID-based supply chains through on-site checking. While RFID-equipped products travel through the supply chain, RFID readers can verify product ...
Keywords: rfid, supply chain management, privacy

16 published by ACM
April 2012 SNS '12: Proceedings of the Fifth Workshop on Social Network Systems
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 0,   Downloads (12 Months): 7,   Downloads (Overall): 231

Full text available: PDFPDF
The problem of usage control, which refers to the control of the data after its publication, is becoming a very challenging problem due to the exponential growth of the number of users involved in content sharing. While the best solution and unfortunately the most expensive one to cope with this ...
Keywords: distributed on-line social networks, picture sharing, usage control

17
December 2011 Computer Communications: Volume 34 Issue 18, December, 2011
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 15

The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture and protocols well beyond their original design. This calls for extraordinary research efforts at all levels of ...
Keywords: Green networking, Optical networks, Data and communication security, Wireless networks, Cognitive networks, Future internet, Internet architecture and protocols, System security

18 published by ACM
October 2011 CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 8,   Downloads (Overall): 128

Full text available: PDFPDF
In this demo, we present the realization and evaluation of a wireless hardware prototype of the previously proposed RFID authentication protocol 'Ff'. The motivation has been to get as close as possible to the (expensive) construction of a wafer and to analyze and demonstrate Ff's real-world feasibility and functional correctness ...
Keywords: Ff, RFID, gates, prototype, authentication, hardware, privacy

19 published by ACM
September 2011 UbiCrowd '11: Proceedings of the 2nd international workshop on Ubiquitous crowdsouring
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 11,   Downloads (Overall): 148

Full text available: PDFPDF
Jamming attacks can severely affect the performance of wireless networks due to the broadcast nature. The most reliable solution to reduce the impact of such attacks is to detect and localize the jammer. In this paper, we propose our research into participatory sensing based scheme, named as CrowdLoc , for ...
Keywords: rss, crowdsourcing, linearization, wireless network, jammer localization, jamming attack

20
July 2011 PETS'11: Proceedings of the 11th international conference on Privacy enhancing technologies
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

Private matching solutions allow two parties to find common data elements over their own datasets without revealing any additional private information. We propose a new concept involving an intermediate entity in the private matching process: we consider the problem of broker-based private matching where end-entities do not interact with each ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us