The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Refik Molva: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Walid Bagga, Refik Molva, Stefano Crosta
    Policy-based encryption schemes from bilinear pairings. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:368- [Conf]
  2. Refik Molva, Alain Pannetrat
    Scalable Multicast Security in Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:101-112 [Conf]
  3. Refik Molva, Erich Rütsche
    Application Access Control at Network Level. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:219-228 [Conf]
  4. Alain Pannetrat, Refik Molva
    Multiple layer encryption for multicast groups. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:137-153 [Conf]
  5. Pietro Michiardi, Refik Molva
    Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:107-121 [Conf]
  6. Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva
    Enabling adaptive and secure extranets. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:123-135 [Conf]
  7. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
    Systematic Design of Two-Party Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:44-61 [Conf]
  8. Refik Molva, Françoise Baude
    Mobile Code, Internet Security, and E-Commerce. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 2000, pp:270-281 [Conf]
  9. Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen
    Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:107-122 [Conf]
  10. Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth
    Limitations of the Approach of Solving a Network's Security Problem with a Firewall. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:144-145 [Conf]
  11. Refik Molva, Yves Roudier
    A Distributed Access Control Model for Java. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:291-308 [Conf]
  12. Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti
    KryptoKnight Authentication and Key Distribution System. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:155-174 [Conf]
  13. Eitan Altman, Vivek S. Borkar, Arzad Alam Kherani, Pietro Michiardi, Refik Molva
    Some Game-Theoretic Problems in Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EuroNGI Workshop, 2004, pp:82-104 [Conf]
  14. Melek Önen, Refik Molva
    Secure Data Aggregation with Multiple Encryption. [Citation Graph (0, 0)][DBLP]
    EWSN, 2007, pp:117-132 [Conf]
  15. Walid Bagga, Refik Molva
    Policy-Based Cryptography and Applications. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:72-87 [Conf]
  16. Melek Önen, Refik Molva
    Group Rekeying with a Customer Perspective. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2004, pp:223-229 [Conf]
  17. Frederic Montagut, Refik Molva
    Augmenting Web Services Composition with Transactional Requirements. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:91-98 [Conf]
  18. Refik Molva, Pietro Michiardi
    Security in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PWC, 2003, pp:756-775 [Conf]
  19. Alain Pannetrat, Refik Molva
    Authenticating real time packet streams and multicasts. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:490-495 [Conf]
  20. Walid Bagga, Refik Molva
    Collusion-Free Policy-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:233-245 [Conf]
  21. Laurent Bussard, Refik Molva, Yves Roudier
    History-Based Signature or How to Trust Anonymous Documents. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:78-92 [Conf]
  22. Didier Samfat, Refik Molva, N. Asokan
    Untraceability in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    MOBICOM, 1995, pp:26-36 [Conf]
  23. Alain Pannetrat, Refik Molva
    Efficient Multicast Packet Authentication. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  24. Eitan Altman, Arzad Alam Kherani, Pietro Michiardi, Refik Molva
    Non-cooperative Forwarding in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:486-498 [Conf]
  25. Refik Molva, Alain Pannetrat
    Network Security in the Multicast Framework. [Citation Graph (0, 0)][DBLP]
    NETWORKING Tutorials, 2002, pp:59-82 [Conf]
  26. Laurent Bussard, Refik Molva
    One-Time Capabilities for Authorizations without Trust. [Citation Graph (0, 0)][DBLP]
    PerCom, 2004, pp:351-355 [Conf]
  27. Laurent Bussard, Yves Roudier, Refik Molva
    Untraceable Secret Credentials: Trust Establishment with Privacy. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:122-126 [Conf]
  28. Walid Bagga, Stefano Crosta, Refik Molva
    Proof-Carrying Proxy Certificates. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:321-335 [Conf]
  29. Pietro Michiardi, Refik Molva
    Identity Based Message Authentication for Dynamic Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:50-61 [Conf]
  30. Laurent Bussard, Refik Molva
    Establishing Trust with Privacy. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:199-209 [Conf]
  31. Frederic Montagut, Refik Molva
    Enabling pervasive execution of workflows. [Citation Graph (0, 0)][DBLP]
    CollaborateCom, 2005, pp:- [Conf]
  32. Pietro Michiardi, Refik Molva
    Analysis of coalition formation and cooperation strategies in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2005, v:3, n:2, pp:193-219 [Journal]
  33. Philippe A. Janson, Refik Molva
    Security in Open Networks and Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1991, v:22, n:5, pp:232-346 [Journal]
  34. Refik Molva
    Internet security architecture. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:787-804 [Journal]
  35. Sergio Loureiro, Refik Molva, Alain Pannetrat
    Secure Data Collection with Updates. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2001, v:1, n:1/2, pp:119-130 [Journal]
  36. Walid Bagga, Stefano Crosta, Pietro Michiardi, Refik Molva
    Establishment of Ad-Hoc Communities through Policy-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:107-120 [Journal]
  37. Philippe A. Janson, Refik Molva, Stefano Zatti
    Architectural Directions for Opening IBM Networks: The Case of OSI. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 1992, v:31, n:2, pp:313-335 [Journal]
  38. Refik Molva, Gene Tsudik
    Secret Sets and Applications. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:65, n:1, pp:47-55 [Journal]
  39. Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen
    Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:1, pp:97-112 [Journal]
  40. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
    Systematic Design of a Family of Attack-Resistant Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:679-693 [Journal]
  41. Christian Blum II, Philippe Dubois, Refik Molva, Olivier Schaller
    A Development and Runtime Platform for Teleconferencing Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:3, pp:576-588 [Journal]
  42. Didier Samfat, Refik Molva
    IDAMN: An Intrusion Detection Architecture for Mobile Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:7, pp:1373-1380 [Journal]
  43. Refik Molva, Alain Pannetrat
    Scalable multicast security with dynamic recipient groups. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2000, v:3, n:3, pp:136-160 [Journal]
  44. Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung
    The KryptoKnight family of light-weight protocols for authentication and key distribution. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1995, v:3, n:1, pp:31-41 [Journal]
  45. Frederic Montagut, Refik Molva
    Enforcing Integrity of Execution in Distributed Workflow Management Systems. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2007, pp:170-177 [Conf]
  46. Adomas Svirskas, Carine Courbis, Refik Molva, Justinas Bedzinskas
    Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    IEEE SCW, 2007, pp:33-40 [Conf]
  47. Frederic Montagut, Refik Molva
    Towards Transactional PervasiveWorkflows. [Citation Graph (0, 0)][DBLP]
    EDOC, 2006, pp:141-152 [Conf]
  48. Roberto Di Pietro, Refik Molva
    Information Confinement, Privacy, and Security in RFID Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:187-202 [Conf]
  49. Frederic Montagut, Refik Molva
    Traceability and Integrity of Execution in Distributed Workflow Management Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:251-266 [Conf]

  50. Privacy in Content-Based Opportunistic Networks. [Citation Graph (, )][DBLP]


  51. Secret Handshakes with Revocation Support. [Citation Graph (, )][DBLP]


  52. Optimistic fair exchange for secure forwarding. [Citation Graph (, )][DBLP]


  53. IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs. [Citation Graph (, )][DBLP]


  54. Bootstrapping security associations in opportunistic networks. [Citation Graph (, )][DBLP]


  55. Secret interest groups (SIGs) in social networks with an implementation on Facebook. [Citation Graph (, )][DBLP]


  56. A Provably Secure Secret Handshake with Dynamic Controlled Matching. [Citation Graph (, )][DBLP]


  57. Privacy-Preserving Content-Based Publish/Subscribe Networks. [Citation Graph (, )][DBLP]


  58. Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. [Citation Graph (, )][DBLP]


  59. Privacy in context-based and epidemic forwarding. [Citation Graph (, )][DBLP]


  60. Towards secure and trusted collaboration environment for European public sector. [Citation Graph (, )][DBLP]


  61. Social Networking for Pervasive Adaptation. [Citation Graph (, )][DBLP]


  62. Efficient access control for wireless sensor data. [Citation Graph (, )][DBLP]


  63. Privacy and confidentiality in context-based and epidemic forwarding. [Citation Graph (, )][DBLP]


  64. A provably secure secret handshake with dynamic controlled matching. [Citation Graph (, )][DBLP]


  65. Preface. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.486secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002