| 2009 |
| 56 | EE | Roberto Di Pietro,
Pietro Michiardi,
Refik Molva:
Confidentiality and integrity for data aggregation in WSN using peer monitoring.
Security and Communication Networks 2(2): 181-194 (2009) |
| 2008 |
| 55 | EE | Frederic Montagut,
Refik Molva,
Silvan Tecumseh Golega:
The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions.
IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(3): 319-333 (2008) |
| 54 | EE | Frederic Montagut,
Refik Molva,
Silvan Tecumseh Golega:
Automating the Composition of Transactional Web Services.
Int. J. Web Service Res. 5(1): 24-41 (2008) |
| 2007 |
| 53 | EE | Adomas Svirskas,
Jelena Isachenkova,
Refik Molva:
Towards secure and trusted collaboration environment for European public sector.
CollaborateCom 2007: 49-56 |
| 52 | EE | Roberto Di Pietro,
Refik Molva:
Information Confinement, Privacy, and Security in RFID Systems.
ESORICS 2007: 187-202 |
| 51 | EE | Frederic Montagut,
Refik Molva:
Traceability and Integrity of Execution in Distributed Workflow Management Systems.
ESORICS 2007: 251-266 |
| 50 | EE | Melek Önen,
Refik Molva:
Secure Data Aggregation with Multiple Encryption.
EWSN 2007: 117-132 |
| 49 | EE | Frederic Montagut,
Refik Molva:
Enforcing Integrity of Execution in Distributed Workflow Management Systems.
IEEE SCC 2007: 170-177 |
| 48 | EE | Adomas Svirskas,
Carine Courbis,
Refik Molva,
Justinas Bedzinskas:
Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach.
IEEE SCW 2007: 33-40 |
| 47 | EE | Melek Önen,
Abdullatif Shikfa,
Refik Molva:
Optimistic fair exchange for secure forwarding.
MobiQuitous 2007: 1-5 |
| 46 | EE | Walid Bagga,
Stefano Crosta,
Pietro Michiardi,
Refik Molva:
Establishment of Ad-Hoc Communities through Policy-Based Cryptography.
Electr. Notes Theor. Comput. Sci. 171(1): 107-120 (2007) |
| 2006 |
| 45 | EE | Walid Bagga,
Refik Molva,
Stefano Crosta:
Policy-based encryption schemes from bilinear pairings.
ASIACCS 2006: 368 |
| 44 | EE | Frederic Montagut,
Refik Molva:
Towards Transactional PervasiveWorkflows.
EDOC 2006: 141-152 |
| 43 | EE | Frederic Montagut,
Refik Molva:
Augmenting Web Services Composition with Transactional Requirements.
ICWS 2006: 91-98 |
| 42 | EE | Walid Bagga,
Refik Molva:
Collusion-Free Policy-Based Encryption.
ISC 2006: 233-245 |
| 41 | EE | Walid Bagga,
Stefano Crosta,
Refik Molva:
Proof-Carrying Proxy Certificates.
SCN 2006: 321-335 |
| 40 | EE | Pietro Michiardi,
Refik Molva:
Identity Based Message Authentication for Dynamic Networks.
SEC 2006: 50-61 |
| 2005 |
| 39 | | Refik Molva,
Gene Tsudik,
Dirk Westhoff:
Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers
Springer 2005 |
| 38 | EE | Frederic Montagut,
Refik Molva:
Enabling pervasive execution of workflows.
CollaborateCom 2005 |
| 37 | EE | Walid Bagga,
Refik Molva:
Policy-Based Cryptography and Applications.
Financial Cryptography 2005: 72-87 |
| 36 | EE | Eitan Altman,
Arzad Alam Kherani,
Pietro Michiardi,
Refik Molva:
Non-cooperative Forwarding in Ad-Hoc Networks.
NETWORKING 2005: 486-498 |
| 35 | EE | Pietro Michiardi,
Refik Molva:
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks.
Ad Hoc Networks 3(2): 193-219 (2005) |
| 2004 |
| 34 | | Pierangela Samarati,
Peter Y. A. Ryan,
Dieter Gollmann,
Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings
Springer 2004 |
| 33 | EE | Eitan Altman,
Vivek S. Borkar,
Arzad Alam Kherani,
Pietro Michiardi,
Refik Molva:
Some Game-Theoretic Problems in Wireless Ad-Hoc Networks.
EuroNGI Workshop 2004: 82-104 |
| 32 | EE | Melek Önen,
Refik Molva:
Group Rekeying with a Customer Perspective.
ICPADS 2004: 223-229 |
| 31 | EE | Laurent Bussard,
Refik Molva:
One-Time Capabilities for Authorizations without Trust.
PerCom 2004: 351-355 |
| 30 | EE | Laurent Bussard,
Yves Roudier,
Refik Molva:
Untraceable Secret Credentials: Trust Establishment with Privacy.
PerCom Workshops 2004: 122-126 |
| 29 | EE | Laurent Bussard,
Refik Molva:
Establishing Trust with Privacy.
Security Protocols Workshop 2004: 199-209 |
| 28 | EE | Laurent Bussard,
Refik Molva,
Yves Roudier:
History-Based Signature or How to Trust Anonymous Documents.
iTrust 2004: 78-92 |
| 2003 |
| 27 | EE | Alain Pannetrat,
Refik Molva:
Efficient Multicast Packet Authentication.
NDSS 2003 |
| 26 | EE | Refik Molva,
Pietro Michiardi:
Security in Ad Hoc Networks.
PWC 2003: 756-775 |
| 2002 |
| 25 | | Pietro Michiardi,
Refik Molva:
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks.
Communications and Multimedia Security 2002: 107-121 |
| 24 | | Yves Roudier,
Olivier Fouache,
Pierre Vannel,
Refik Molva:
Enabling adaptive and secure extranets.
Communications and Multimedia Security 2002: 123-135 |
| 23 | | Alain Pannetrat,
Refik Molva:
Multiple layer encryption for multicast groups.
Communications and Multimedia Security 2002: 137-153 |
| 22 | EE | Alain Pannetrat,
Refik Molva:
Authenticating real time packet streams and multicasts.
ISCC 2002: 490-495 |
| 21 | EE | Refik Molva,
Alain Pannetrat:
Network Security in the Multicast Framework.
NETWORKING Tutorials 2002: 59-82 |
| 2001 |
| 20 | | Sergio Loureiro,
Refik Molva,
Alain Pannetrat:
Secure Data Collection with Updates.
Electronic Commerce Research 1(1/2): 119-130 (2001) |
| 2000 |
| 19 | EE | Refik Molva,
Françoise Baude:
Mobile Code, Internet Security, and E-Commerce.
ECOOP Workshops 2000: 270-281 |
| 18 | EE | Refik Molva,
Yves Roudier:
A Distributed Access Control Model for Java.
ESORICS 2000: 291-308 |
| 17 | EE | Refik Molva,
Alain Pannetrat:
Scalable multicast security with dynamic recipient groups.
ACM Trans. Inf. Syst. Secur. 3(3): 136-160 (2000) |
| 1999 |
| 16 | EE | Refik Molva,
Alain Pannetrat:
Scalable Multicast Security in Dynamic Groups.
ACM Conference on Computer and Communications Security 1999: 101-112 |
| 15 | EE | Refik Molva:
Internet security architecture.
Computer Networks 31(8): 787-804 (1999) |
| 1998 |
| 14 | EE | Refik Molva,
Gene Tsudik:
Secret Sets and Applications.
Inf. Process. Lett. 65(1): 47-55 (1998) |
| 1997 |
| 13 | | Christian Blum II,
Philippe Dubois,
Refik Molva,
Olivier Schaller:
A Development and Runtime Platform for Teleconferencing Applications.
IEEE Journal on Selected Areas in Communications 15(3): 576-588 (1997) |
| 12 | | Didier Samfat,
Refik Molva:
IDAMN: An Intrusion Detection Architecture for Mobile Networks.
IEEE Journal on Selected Areas in Communications 15(7): 1373-1380 (1997) |
| 1996 |
| 11 | EE | Stefano Zatti,
Refik Molva,
Angelo Tosi,
Gene Tsudik,
Helmut Kurth:
Limitations of the Approach of Solving a Network's Security Problem with a Firewall.
ESORICS 1996: 144-145 |
| 10 | | Ralf C. Hauser,
Philippe A. Janson,
Refik Molva,
Gene Tsudik,
Els Van Herreweghen:
Robust and Secure Password and Key Change Method.
Journal of Computer Security 4(1): 97-112 (1996) |
| 1995 |
| 9 | EE | Didier Samfat,
Refik Molva,
N. Asokan:
Untraceability in Mobile Networks.
MOBICOM 1995: 26-36 |
| 8 | EE | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw. 3(1): 31-41 (1995) |
| 1994 |
| 7 | EE | Refik Molva,
Erich Rütsche:
Application Access Control at Network Level.
ACM Conference on Computer and Communications Security 1994: 219-228 |
| 6 | EE | Ralf C. Hauser,
Philippe A. Janson,
Refik Molva,
Gene Tsudik,
Els Van Herreweghen:
Robust and Secure Password and Key Change Method.
ESORICS 1994: 107-122 |
| 1993 |
| 5 | | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
Systematic Design of a Family of Attack-Resistant Authentication Protocols.
IEEE Journal on Selected Areas in Communications 11(5): 679-693 (1993) |
| 1992 |
| 4 | EE | Refik Molva,
Gene Tsudik,
Els Van Herreweghen,
Stefano Zatti:
KryptoKnight Authentication and Key Distribution System.
ESORICS 1992: 155-174 |
| 3 | | Philippe A. Janson,
Refik Molva,
Stefano Zatti:
Architectural Directions for Opening IBM Networks: The Case of OSI.
IBM Systems Journal 31(2): 313-335 (1992) |
| 1991 |
| 2 | EE | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
Systematic Design of Two-Party Authentication Protocols.
CRYPTO 1991: 44-61 |
| 1 | | Philippe A. Janson,
Refik Molva:
Security in Open Networks and Distributed Systems.
Computer Networks and ISDN Systems 22(5): 232-346 (1991) |