dblp.uni-trier.dewww.uni-trier.de

Refik Molva

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
56EERoberto Di Pietro, Pietro Michiardi, Refik Molva: Confidentiality and integrity for data aggregation in WSN using peer monitoring. Security and Communication Networks 2(2): 181-194 (2009)
2008
55EEFrederic Montagut, Refik Molva, Silvan Tecumseh Golega: The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions. IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(3): 319-333 (2008)
54EEFrederic Montagut, Refik Molva, Silvan Tecumseh Golega: Automating the Composition of Transactional Web Services. Int. J. Web Service Res. 5(1): 24-41 (2008)
2007
53EEAdomas Svirskas, Jelena Isachenkova, Refik Molva: Towards secure and trusted collaboration environment for European public sector. CollaborateCom 2007: 49-56
52EERoberto Di Pietro, Refik Molva: Information Confinement, Privacy, and Security in RFID Systems. ESORICS 2007: 187-202
51EEFrederic Montagut, Refik Molva: Traceability and Integrity of Execution in Distributed Workflow Management Systems. ESORICS 2007: 251-266
50EEMelek Önen, Refik Molva: Secure Data Aggregation with Multiple Encryption. EWSN 2007: 117-132
49EEFrederic Montagut, Refik Molva: Enforcing Integrity of Execution in Distributed Workflow Management Systems. IEEE SCC 2007: 170-177
48EEAdomas Svirskas, Carine Courbis, Refik Molva, Justinas Bedzinskas: Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach. IEEE SCW 2007: 33-40
47EEMelek Önen, Abdullatif Shikfa, Refik Molva: Optimistic fair exchange for secure forwarding. MobiQuitous 2007: 1-5
46EEWalid Bagga, Stefano Crosta, Pietro Michiardi, Refik Molva: Establishment of Ad-Hoc Communities through Policy-Based Cryptography. Electr. Notes Theor. Comput. Sci. 171(1): 107-120 (2007)
2006
45EEWalid Bagga, Refik Molva, Stefano Crosta: Policy-based encryption schemes from bilinear pairings. ASIACCS 2006: 368
44EEFrederic Montagut, Refik Molva: Towards Transactional PervasiveWorkflows. EDOC 2006: 141-152
43EEFrederic Montagut, Refik Molva: Augmenting Web Services Composition with Transactional Requirements. ICWS 2006: 91-98
42EEWalid Bagga, Refik Molva: Collusion-Free Policy-Based Encryption. ISC 2006: 233-245
41EEWalid Bagga, Stefano Crosta, Refik Molva: Proof-Carrying Proxy Certificates. SCN 2006: 321-335
40EEPietro Michiardi, Refik Molva: Identity Based Message Authentication for Dynamic Networks. SEC 2006: 50-61
2005
39 Refik Molva, Gene Tsudik, Dirk Westhoff: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers Springer 2005
38EEFrederic Montagut, Refik Molva: Enabling pervasive execution of workflows. CollaborateCom 2005
37EEWalid Bagga, Refik Molva: Policy-Based Cryptography and Applications. Financial Cryptography 2005: 72-87
36EEEitan Altman, Arzad Alam Kherani, Pietro Michiardi, Refik Molva: Non-cooperative Forwarding in Ad-Hoc Networks. NETWORKING 2005: 486-498
35EEPietro Michiardi, Refik Molva: Analysis of coalition formation and cooperation strategies in mobile ad hoc networks. Ad Hoc Networks 3(2): 193-219 (2005)
2004
34 Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings Springer 2004
33EEEitan Altman, Vivek S. Borkar, Arzad Alam Kherani, Pietro Michiardi, Refik Molva: Some Game-Theoretic Problems in Wireless Ad-Hoc Networks. EuroNGI Workshop 2004: 82-104
32EEMelek Önen, Refik Molva: Group Rekeying with a Customer Perspective. ICPADS 2004: 223-229
31EELaurent Bussard, Refik Molva: One-Time Capabilities for Authorizations without Trust. PerCom 2004: 351-355
30EELaurent Bussard, Yves Roudier, Refik Molva: Untraceable Secret Credentials: Trust Establishment with Privacy. PerCom Workshops 2004: 122-126
29EELaurent Bussard, Refik Molva: Establishing Trust with Privacy. Security Protocols Workshop 2004: 199-209
28EELaurent Bussard, Refik Molva, Yves Roudier: History-Based Signature or How to Trust Anonymous Documents. iTrust 2004: 78-92
2003
27EEAlain Pannetrat, Refik Molva: Efficient Multicast Packet Authentication. NDSS 2003
26EERefik Molva, Pietro Michiardi: Security in Ad Hoc Networks. PWC 2003: 756-775
2002
25 Pietro Michiardi, Refik Molva: Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Communications and Multimedia Security 2002: 107-121
24 Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva: Enabling adaptive and secure extranets. Communications and Multimedia Security 2002: 123-135
23 Alain Pannetrat, Refik Molva: Multiple layer encryption for multicast groups. Communications and Multimedia Security 2002: 137-153
22EEAlain Pannetrat, Refik Molva: Authenticating real time packet streams and multicasts. ISCC 2002: 490-495
21EERefik Molva, Alain Pannetrat: Network Security in the Multicast Framework. NETWORKING Tutorials 2002: 59-82
2001
20 Sergio Loureiro, Refik Molva, Alain Pannetrat: Secure Data Collection with Updates. Electronic Commerce Research 1(1/2): 119-130 (2001)
2000
19EERefik Molva, Françoise Baude: Mobile Code, Internet Security, and E-Commerce. ECOOP Workshops 2000: 270-281
18EERefik Molva, Yves Roudier: A Distributed Access Control Model for Java. ESORICS 2000: 291-308
17EERefik Molva, Alain Pannetrat: Scalable multicast security with dynamic recipient groups. ACM Trans. Inf. Syst. Secur. 3(3): 136-160 (2000)
1999
16EERefik Molva, Alain Pannetrat: Scalable Multicast Security in Dynamic Groups. ACM Conference on Computer and Communications Security 1999: 101-112
15EERefik Molva: Internet security architecture. Computer Networks 31(8): 787-804 (1999)
1998
14EERefik Molva, Gene Tsudik: Secret Sets and Applications. Inf. Process. Lett. 65(1): 47-55 (1998)
1997
13 Christian Blum II, Philippe Dubois, Refik Molva, Olivier Schaller: A Development and Runtime Platform for Teleconferencing Applications. IEEE Journal on Selected Areas in Communications 15(3): 576-588 (1997)
12 Didier Samfat, Refik Molva: IDAMN: An Intrusion Detection Architecture for Mobile Networks. IEEE Journal on Selected Areas in Communications 15(7): 1373-1380 (1997)
1996
11EEStefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth: Limitations of the Approach of Solving a Network's Security Problem with a Firewall. ESORICS 1996: 144-145
10 Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. Journal of Computer Security 4(1): 97-112 (1996)
1995
9EEDidier Samfat, Refik Molva, N. Asokan: Untraceability in Mobile Networks. MOBICOM 1995: 26-36
8EERay Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: The KryptoKnight family of light-weight protocols for authentication and key distribution. IEEE/ACM Trans. Netw. 3(1): 31-41 (1995)
1994
7EERefik Molva, Erich Rütsche: Application Access Control at Network Level. ACM Conference on Computer and Communications Security 1994: 219-228
6EERalf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. ESORICS 1994: 107-122
1993
5 Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of a Family of Attack-Resistant Authentication Protocols. IEEE Journal on Selected Areas in Communications 11(5): 679-693 (1993)
1992
4EERefik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti: KryptoKnight Authentication and Key Distribution System. ESORICS 1992: 155-174
3 Philippe A. Janson, Refik Molva, Stefano Zatti: Architectural Directions for Opening IBM Networks: The Case of OSI. IBM Systems Journal 31(2): 313-335 (1992)
1991
2EERay Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung: Systematic Design of Two-Party Authentication Protocols. CRYPTO 1991: 44-61
1 Philippe A. Janson, Refik Molva: Security in Open Networks and Distributed Systems. Computer Networks and ISDN Systems 22(5): 232-346 (1991)

Coauthor Index

1Eitan Altman [33] [36]
2N. Asokan [9]
3Walid Bagga [37] [41] [42] [45] [46]
4Françoise Baude [19]
5Justinas Bedzinskas [48]
6Ray Bird [2] [5] [8]
7Christian Blum II [13]
8Vivek S. Borkar [33]
9Laurent Bussard [28] [29] [30] [31]
10Carine Courbis [48]
11Stefano Crosta [41] [45] [46]
12Philippe Dubois [13]
13Olivier Fouache [24]
14Silvan Tecumseh Golega [54] [55]
15Dieter Gollmann [34]
16Inder S. Gopal [2] [5] [8]
17Ralf C. Hauser [6] [10]
18Els Van Herreweghen [4] [6] [10]
19Amir Herzberg [2] [5] [8]
20Jelena Isachenkova [53]
21Philippe A. Janson [1] [2] [3] [5] [6] [8] [10]
22Arzad Alam Kherani [33] [36]
23Helmut Kurth [11]
24Shay Kutten [2] [5] [8]
25Sergio Loureiro [20]
26Pietro Michiardi [25] [26] [33] [35] [36] [40] [46] [56]
27Frederic Montagut [38] [43] [44] [49] [51] [54] [55]
28Melek Önen [32] [47] [50]
29Alain Pannetrat [16] [17] [20] [21] [22] [23] [27]
30Roberto Di Pietro [52] [56]
31Yves Roudier [18] [24] [28] [30]
32Erich Rütsche [7]
33Peter Y. A. Ryan (Peter Ryan) [34]
34Pierangela Samarati [34]
35Didier Samfat [9] [12]
36Olivier Schaller [13]
37Abdullatif Shikfa [47]
38Adomas Svirskas [48] [53]
39Angelo Tosi [11]
40Gene Tsudik [4] [6] [10] [11] [14] [39]
41Pierre Vannel [24]
42Dirk Westhoff [39]
43Moti Yung (Mordechai M. Yung) [2] [5] [8]
44Stefano Zatti [3] [4] [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)