2009 | ||
---|---|---|
56 | EE | Roberto Di Pietro, Pietro Michiardi, Refik Molva: Confidentiality and integrity for data aggregation in WSN using peer monitoring. Security and Communication Networks 2(2): 181-194 (2009) |
2008 | ||
55 | EE | Frederic Montagut, Refik Molva, Silvan Tecumseh Golega: The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions. IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(3): 319-333 (2008) |
54 | EE | Frederic Montagut, Refik Molva, Silvan Tecumseh Golega: Automating the Composition of Transactional Web Services. Int. J. Web Service Res. 5(1): 24-41 (2008) |
2007 | ||
53 | EE | Adomas Svirskas, Jelena Isachenkova, Refik Molva: Towards secure and trusted collaboration environment for European public sector. CollaborateCom 2007: 49-56 |
52 | EE | Roberto Di Pietro, Refik Molva: Information Confinement, Privacy, and Security in RFID Systems. ESORICS 2007: 187-202 |
51 | EE | Frederic Montagut, Refik Molva: Traceability and Integrity of Execution in Distributed Workflow Management Systems. ESORICS 2007: 251-266 |
50 | EE | Melek Önen, Refik Molva: Secure Data Aggregation with Multiple Encryption. EWSN 2007: 117-132 |
49 | EE | Frederic Montagut, Refik Molva: Enforcing Integrity of Execution in Distributed Workflow Management Systems. IEEE SCC 2007: 170-177 |
48 | EE | Adomas Svirskas, Carine Courbis, Refik Molva, Justinas Bedzinskas: Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach. IEEE SCW 2007: 33-40 |
47 | EE | Melek Önen, Abdullatif Shikfa, Refik Molva: Optimistic fair exchange for secure forwarding. MobiQuitous 2007: 1-5 |
46 | EE | Walid Bagga, Stefano Crosta, Pietro Michiardi, Refik Molva: Establishment of Ad-Hoc Communities through Policy-Based Cryptography. Electr. Notes Theor. Comput. Sci. 171(1): 107-120 (2007) |
2006 | ||
45 | EE | Walid Bagga, Refik Molva, Stefano Crosta: Policy-based encryption schemes from bilinear pairings. ASIACCS 2006: 368 |
44 | EE | Frederic Montagut, Refik Molva: Towards Transactional PervasiveWorkflows. EDOC 2006: 141-152 |
43 | EE | Frederic Montagut, Refik Molva: Augmenting Web Services Composition with Transactional Requirements. ICWS 2006: 91-98 |
42 | EE | Walid Bagga, Refik Molva: Collusion-Free Policy-Based Encryption. ISC 2006: 233-245 |
41 | EE | Walid Bagga, Stefano Crosta, Refik Molva: Proof-Carrying Proxy Certificates. SCN 2006: 321-335 |
40 | EE | Pietro Michiardi, Refik Molva: Identity Based Message Authentication for Dynamic Networks. SEC 2006: 50-61 |
2005 | ||
39 | Refik Molva, Gene Tsudik, Dirk Westhoff: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers Springer 2005 | |
38 | EE | Frederic Montagut, Refik Molva: Enabling pervasive execution of workflows. CollaborateCom 2005 |
37 | EE | Walid Bagga, Refik Molva: Policy-Based Cryptography and Applications. Financial Cryptography 2005: 72-87 |
36 | EE | Eitan Altman, Arzad Alam Kherani, Pietro Michiardi, Refik Molva: Non-cooperative Forwarding in Ad-Hoc Networks. NETWORKING 2005: 486-498 |
35 | EE | Pietro Michiardi, Refik Molva: Analysis of coalition formation and cooperation strategies in mobile ad hoc networks. Ad Hoc Networks 3(2): 193-219 (2005) |
2004 | ||
34 | Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings Springer 2004 | |
33 | EE | Eitan Altman, Vivek S. Borkar, Arzad Alam Kherani, Pietro Michiardi, Refik Molva: Some Game-Theoretic Problems in Wireless Ad-Hoc Networks. EuroNGI Workshop 2004: 82-104 |
32 | EE | Melek Önen, Refik Molva: Group Rekeying with a Customer Perspective. ICPADS 2004: 223-229 |
31 | EE | Laurent Bussard, Refik Molva: One-Time Capabilities for Authorizations without Trust. PerCom 2004: 351-355 |
30 | EE | Laurent Bussard, Yves Roudier, Refik Molva: Untraceable Secret Credentials: Trust Establishment with Privacy. PerCom Workshops 2004: 122-126 |
29 | EE | Laurent Bussard, Refik Molva: Establishing Trust with Privacy. Security Protocols Workshop 2004: 199-209 |
28 | EE | Laurent Bussard, Refik Molva, Yves Roudier: History-Based Signature or How to Trust Anonymous Documents. iTrust 2004: 78-92 |
2003 | ||
27 | EE | Alain Pannetrat, Refik Molva: Efficient Multicast Packet Authentication. NDSS 2003 |
26 | EE | Refik Molva, Pietro Michiardi: Security in Ad Hoc Networks. PWC 2003: 756-775 |
2002 | ||
25 | Pietro Michiardi, Refik Molva: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Communications and Multimedia Security 2002: 107-121 | |
24 | Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva: Enabling adaptive and secure extranets. Communications and Multimedia Security 2002: 123-135 | |
23 | Alain Pannetrat, Refik Molva: Multiple layer encryption for multicast groups. Communications and Multimedia Security 2002: 137-153 | |
22 | EE | Alain Pannetrat, Refik Molva: Authenticating real time packet streams and multicasts. ISCC 2002: 490-495 |
21 | EE | Refik Molva, Alain Pannetrat: Network Security in the Multicast Framework. NETWORKING Tutorials 2002: 59-82 |
2001 | ||
20 | Sergio Loureiro, Refik Molva, Alain Pannetrat: Secure Data Collection with Updates. Electronic Commerce Research 1(1/2): 119-130 (2001) | |
2000 | ||
19 | EE | Refik Molva, Françoise Baude: Mobile Code, Internet Security, and E-Commerce. ECOOP Workshops 2000: 270-281 |
18 | EE | Refik Molva, Yves Roudier: A Distributed Access Control Model for Java. ESORICS 2000: 291-308 |
17 | EE | Refik Molva, Alain Pannetrat: Scalable multicast security with dynamic recipient groups. ACM Trans. Inf. Syst. Secur. 3(3): 136-160 (2000) |
1999 | ||
16 | EE | Refik Molva, Alain Pannetrat: Scalable Multicast Security in Dynamic Groups. ACM Conference on Computer and Communications Security 1999: 101-112 |
15 | EE | Refik Molva: Internet security architecture. Computer Networks 31(8): 787-804 (1999) |
1998 | ||
14 | EE | Refik Molva, Gene Tsudik: Secret Sets and Applications. Inf. Process. Lett. 65(1): 47-55 (1998) |
1997 | ||
13 | Christian Blum II, Philippe Dubois, Refik Molva, Olivier Schaller: A Development and Runtime Platform for Teleconferencing Applications. IEEE Journal on Selected Areas in Communications 15(3): 576-588 (1997) | |
12 | Didier Samfat, Refik Molva: IDAMN: An Intrusion Detection Architecture for Mobile Networks. IEEE Journal on Selected Areas in Communications 15(7): 1373-1380 (1997) | |
1996 | ||
11 | EE | Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth: Limitations of the Approach of Solving a Network's Security Problem with a Firewall. ESORICS 1996: 144-145 |
10 | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. Journal of Computer Security 4(1): 97-112 (1996) | |
1995 | ||
9 | EE | Didier Samfat, Refik Molva, N. Asokan: Untraceability in Mobile Networks. MOBICOM 1995: 26-36 |
8 | EE | Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: The KryptoKnight family of light-weight protocols for authentication and key distribution. IEEE/ACM Trans. Netw. 3(1): 31-41 (1995) |
1994 | ||
7 | EE | Refik Molva, Erich Rütsche: Application Access Control at Network Level. ACM Conference on Computer and Communications Security 1994: 219-228 |
6 | EE | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. ESORICS 1994: 107-122 |
1993 | ||
5 | Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of a Family of Attack-Resistant Authentication Protocols. IEEE Journal on Selected Areas in Communications 11(5): 679-693 (1993) | |
1992 | ||
4 | EE | Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti: KryptoKnight Authentication and Key Distribution System. ESORICS 1992: 155-174 |
3 | Philippe A. Janson, Refik Molva, Stefano Zatti: Architectural Directions for Opening IBM Networks: The Case of OSI. IBM Systems Journal 31(2): 313-335 (1992) | |
1991 | ||
2 | EE | Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of Two-Party Authentication Protocols. CRYPTO 1991: 44-61 |
1 | Philippe A. Janson, Refik Molva: Security in Open Networks and Distributed Systems. Computer Networks and ISDN Systems 22(5): 232-346 (1991) |