Search the dblp DataBase
Refik Molva :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Walid Bagga , Refik Molva , Stefano Crosta Policy-based encryption schemes from bilinear pairings. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:368- [Conf ] Refik Molva , Alain Pannetrat Scalable Multicast Security in Dynamic Groups. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1999, pp:101-112 [Conf ] Refik Molva , Erich Rütsche Application Access Control at Network Level. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:219-228 [Conf ] Alain Pannetrat , Refik Molva Multiple layer encryption for multicast groups. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:137-153 [Conf ] Pietro Michiardi , Refik Molva Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:107-121 [Conf ] Yves Roudier , Olivier Fouache , Pierre Vannel , Refik Molva Enabling adaptive and secure extranets. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2002, pp:123-135 [Conf ] Ray Bird , Inder S. Gopal , Amir Herzberg , Philippe A. Janson , Shay Kutten , Refik Molva , Moti Yung Systematic Design of Two-Party Authentication Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:44-61 [Conf ] Refik Molva , Françoise Baude Mobile Code, Internet Security, and E-Commerce. [Citation Graph (0, 0)][DBLP ] ECOOP Workshops, 2000, pp:270-281 [Conf ] Ralf C. Hauser , Philippe A. Janson , Refik Molva , Gene Tsudik , Els Van Herreweghen Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:107-122 [Conf ] Stefano Zatti , Refik Molva , Angelo Tosi , Gene Tsudik , Helmut Kurth Limitations of the Approach of Solving a Network's Security Problem with a Firewall. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:144-145 [Conf ] Refik Molva , Yves Roudier A Distributed Access Control Model for Java. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:291-308 [Conf ] Refik Molva , Gene Tsudik , Els Van Herreweghen , Stefano Zatti KryptoKnight Authentication and Key Distribution System. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:155-174 [Conf ] Eitan Altman , Vivek S. Borkar , Arzad Alam Kherani , Pietro Michiardi , Refik Molva Some Game-Theoretic Problems in Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] EuroNGI Workshop, 2004, pp:82-104 [Conf ] Melek Önen , Refik Molva Secure Data Aggregation with Multiple Encryption. [Citation Graph (0, 0)][DBLP ] EWSN, 2007, pp:117-132 [Conf ] Walid Bagga , Refik Molva Policy-Based Cryptography and Applications. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2005, pp:72-87 [Conf ] Melek Önen , Refik Molva Group Rekeying with a Customer Perspective. [Citation Graph (0, 0)][DBLP ] ICPADS, 2004, pp:223-229 [Conf ] Frederic Montagut , Refik Molva Augmenting Web Services Composition with Transactional Requirements. [Citation Graph (0, 0)][DBLP ] ICWS, 2006, pp:91-98 [Conf ] Refik Molva , Pietro Michiardi Security in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] PWC, 2003, pp:756-775 [Conf ] Alain Pannetrat , Refik Molva Authenticating real time packet streams and multicasts. [Citation Graph (0, 0)][DBLP ] ISCC, 2002, pp:490-495 [Conf ] Walid Bagga , Refik Molva Collusion-Free Policy-Based Encryption. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:233-245 [Conf ] Laurent Bussard , Refik Molva , Yves Roudier History-Based Signature or How to Trust Anonymous Documents. [Citation Graph (0, 0)][DBLP ] iTrust, 2004, pp:78-92 [Conf ] Didier Samfat , Refik Molva , N. Asokan Untraceability in Mobile Networks. [Citation Graph (0, 0)][DBLP ] MOBICOM, 1995, pp:26-36 [Conf ] Alain Pannetrat , Refik Molva Efficient Multicast Packet Authentication. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Eitan Altman , Arzad Alam Kherani , Pietro Michiardi , Refik Molva Non-cooperative Forwarding in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] NETWORKING, 2005, pp:486-498 [Conf ] Refik Molva , Alain Pannetrat Network Security in the Multicast Framework. [Citation Graph (0, 0)][DBLP ] NETWORKING Tutorials, 2002, pp:59-82 [Conf ] Laurent Bussard , Refik Molva One-Time Capabilities for Authorizations without Trust. [Citation Graph (0, 0)][DBLP ] PerCom, 2004, pp:351-355 [Conf ] Laurent Bussard , Yves Roudier , Refik Molva Untraceable Secret Credentials: Trust Establishment with Privacy. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2004, pp:122-126 [Conf ] Walid Bagga , Stefano Crosta , Refik Molva Proof-Carrying Proxy Certificates. [Citation Graph (0, 0)][DBLP ] SCN, 2006, pp:321-335 [Conf ] Pietro Michiardi , Refik Molva Identity Based Message Authentication for Dynamic Networks. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:50-61 [Conf ] Laurent Bussard , Refik Molva Establishing Trust with Privacy. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:199-209 [Conf ] Frederic Montagut , Refik Molva Enabling pervasive execution of workflows. [Citation Graph (0, 0)][DBLP ] CollaborateCom, 2005, pp:- [Conf ] Pietro Michiardi , Refik Molva Analysis of coalition formation and cooperation strategies in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2005, v:3, n:2, pp:193-219 [Journal ] Philippe A. Janson , Refik Molva Security in Open Networks and Distributed Systems. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1991, v:22, n:5, pp:232-346 [Journal ] Refik Molva Internet security architecture. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:8, pp:787-804 [Journal ] Sergio Loureiro , Refik Molva , Alain Pannetrat Secure Data Collection with Updates. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research, 2001, v:1, n:1/2, pp:119-130 [Journal ] Walid Bagga , Stefano Crosta , Pietro Michiardi , Refik Molva Establishment of Ad-Hoc Communities through Policy-Based Cryptography. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:107-120 [Journal ] Philippe A. Janson , Refik Molva , Stefano Zatti Architectural Directions for Opening IBM Networks: The Case of OSI. [Citation Graph (0, 0)][DBLP ] IBM Systems Journal, 1992, v:31, n:2, pp:313-335 [Journal ] Refik Molva , Gene Tsudik Secret Sets and Applications. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1998, v:65, n:1, pp:47-55 [Journal ] Ralf C. Hauser , Philippe A. Janson , Refik Molva , Gene Tsudik , Els Van Herreweghen Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:1, pp:97-112 [Journal ] Ray Bird , Inder S. Gopal , Amir Herzberg , Philippe A. Janson , Shay Kutten , Refik Molva , Moti Yung Systematic Design of a Family of Attack-Resistant Authentication Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:679-693 [Journal ] Christian Blum II , Philippe Dubois , Refik Molva , Olivier Schaller A Development and Runtime Platform for Teleconferencing Applications. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1997, v:15, n:3, pp:576-588 [Journal ] Didier Samfat , Refik Molva IDAMN: An Intrusion Detection Architecture for Mobile Networks. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1997, v:15, n:7, pp:1373-1380 [Journal ] Refik Molva , Alain Pannetrat Scalable multicast security with dynamic recipient groups. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2000, v:3, n:3, pp:136-160 [Journal ] Ray Bird , Inder S. Gopal , Amir Herzberg , Philippe A. Janson , Shay Kutten , Refik Molva , Moti Yung The KryptoKnight family of light-weight protocols for authentication and key distribution. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1995, v:3, n:1, pp:31-41 [Journal ] Frederic Montagut , Refik Molva Enforcing Integrity of Execution in Distributed Workflow Management Systems. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2007, pp:170-177 [Conf ] Adomas Svirskas , Carine Courbis , Refik Molva , Justinas Bedzinskas Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach. [Citation Graph (0, 0)][DBLP ] IEEE SCW, 2007, pp:33-40 [Conf ] Frederic Montagut , Refik Molva Towards Transactional PervasiveWorkflows. [Citation Graph (0, 0)][DBLP ] EDOC, 2006, pp:141-152 [Conf ] Roberto Di Pietro , Refik Molva Information Confinement, Privacy, and Security in RFID Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:187-202 [Conf ] Frederic Montagut , Refik Molva Traceability and Integrity of Execution in Distributed Workflow Management Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:251-266 [Conf ] Privacy in Content-Based Opportunistic Networks. [Citation Graph (, )][DBLP ] Secret Handshakes with Revocation Support. [Citation Graph (, )][DBLP ] Optimistic fair exchange for secure forwarding. [Citation Graph (, )][DBLP ] IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs. [Citation Graph (, )][DBLP ] Bootstrapping security associations in opportunistic networks. [Citation Graph (, )][DBLP ] Secret interest groups (SIGs) in social networks with an implementation on Facebook. [Citation Graph (, )][DBLP ] A Provably Secure Secret Handshake with Dynamic Controlled Matching. [Citation Graph (, )][DBLP ] Privacy-Preserving Content-Based Publish/Subscribe Networks. [Citation Graph (, )][DBLP ] Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network. [Citation Graph (, )][DBLP ] Privacy in context-based and epidemic forwarding. [Citation Graph (, )][DBLP ] Towards secure and trusted collaboration environment for European public sector. [Citation Graph (, )][DBLP ] Social Networking for Pervasive Adaptation. [Citation Graph (, )][DBLP ] Efficient access control for wireless sensor data. [Citation Graph (, )][DBLP ] Privacy and confidentiality in context-based and epidemic forwarding. [Citation Graph (, )][DBLP ] A provably secure secret handshake with dynamic controlled matching. [Citation Graph (, )][DBLP ] Preface. [Citation Graph (, )][DBLP ] Search in 0.026secs, Finished in 0.028secs