2009 |
56 | EE | Roberto Di Pietro,
Pietro Michiardi,
Refik Molva:
Confidentiality and integrity for data aggregation in WSN using peer monitoring.
Security and Communication Networks 2(2): 181-194 (2009) |
2008 |
55 | EE | Frederic Montagut,
Refik Molva,
Silvan Tecumseh Golega:
The Pervasive Workflow: A Decentralized Workflow System Supporting Long-Running Transactions.
IEEE Transactions on Systems, Man, and Cybernetics, Part C 38(3): 319-333 (2008) |
54 | EE | Frederic Montagut,
Refik Molva,
Silvan Tecumseh Golega:
Automating the Composition of Transactional Web Services.
Int. J. Web Service Res. 5(1): 24-41 (2008) |
2007 |
53 | EE | Adomas Svirskas,
Jelena Isachenkova,
Refik Molva:
Towards secure and trusted collaboration environment for European public sector.
CollaborateCom 2007: 49-56 |
52 | EE | Roberto Di Pietro,
Refik Molva:
Information Confinement, Privacy, and Security in RFID Systems.
ESORICS 2007: 187-202 |
51 | EE | Frederic Montagut,
Refik Molva:
Traceability and Integrity of Execution in Distributed Workflow Management Systems.
ESORICS 2007: 251-266 |
50 | EE | Melek Önen,
Refik Molva:
Secure Data Aggregation with Multiple Encryption.
EWSN 2007: 117-132 |
49 | EE | Frederic Montagut,
Refik Molva:
Enforcing Integrity of Execution in Distributed Workflow Management Systems.
IEEE SCC 2007: 170-177 |
48 | EE | Adomas Svirskas,
Carine Courbis,
Refik Molva,
Justinas Bedzinskas:
Compliance Proofs for Collaborative Interactions using Aspect-Oriented Approach.
IEEE SCW 2007: 33-40 |
47 | EE | Melek Önen,
Abdullatif Shikfa,
Refik Molva:
Optimistic fair exchange for secure forwarding.
MobiQuitous 2007: 1-5 |
46 | EE | Walid Bagga,
Stefano Crosta,
Pietro Michiardi,
Refik Molva:
Establishment of Ad-Hoc Communities through Policy-Based Cryptography.
Electr. Notes Theor. Comput. Sci. 171(1): 107-120 (2007) |
2006 |
45 | EE | Walid Bagga,
Refik Molva,
Stefano Crosta:
Policy-based encryption schemes from bilinear pairings.
ASIACCS 2006: 368 |
44 | EE | Frederic Montagut,
Refik Molva:
Towards Transactional PervasiveWorkflows.
EDOC 2006: 141-152 |
43 | EE | Frederic Montagut,
Refik Molva:
Augmenting Web Services Composition with Transactional Requirements.
ICWS 2006: 91-98 |
42 | EE | Walid Bagga,
Refik Molva:
Collusion-Free Policy-Based Encryption.
ISC 2006: 233-245 |
41 | EE | Walid Bagga,
Stefano Crosta,
Refik Molva:
Proof-Carrying Proxy Certificates.
SCN 2006: 321-335 |
40 | EE | Pietro Michiardi,
Refik Molva:
Identity Based Message Authentication for Dynamic Networks.
SEC 2006: 50-61 |
2005 |
39 | | Refik Molva,
Gene Tsudik,
Dirk Westhoff:
Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers
Springer 2005 |
38 | EE | Frederic Montagut,
Refik Molva:
Enabling pervasive execution of workflows.
CollaborateCom 2005 |
37 | EE | Walid Bagga,
Refik Molva:
Policy-Based Cryptography and Applications.
Financial Cryptography 2005: 72-87 |
36 | EE | Eitan Altman,
Arzad Alam Kherani,
Pietro Michiardi,
Refik Molva:
Non-cooperative Forwarding in Ad-Hoc Networks.
NETWORKING 2005: 486-498 |
35 | EE | Pietro Michiardi,
Refik Molva:
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks.
Ad Hoc Networks 3(2): 193-219 (2005) |
2004 |
34 | | Pierangela Samarati,
Peter Y. A. Ryan,
Dieter Gollmann,
Refik Molva:
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings
Springer 2004 |
33 | EE | Eitan Altman,
Vivek S. Borkar,
Arzad Alam Kherani,
Pietro Michiardi,
Refik Molva:
Some Game-Theoretic Problems in Wireless Ad-Hoc Networks.
EuroNGI Workshop 2004: 82-104 |
32 | EE | Melek Önen,
Refik Molva:
Group Rekeying with a Customer Perspective.
ICPADS 2004: 223-229 |
31 | EE | Laurent Bussard,
Refik Molva:
One-Time Capabilities for Authorizations without Trust.
PerCom 2004: 351-355 |
30 | EE | Laurent Bussard,
Yves Roudier,
Refik Molva:
Untraceable Secret Credentials: Trust Establishment with Privacy.
PerCom Workshops 2004: 122-126 |
29 | EE | Laurent Bussard,
Refik Molva:
Establishing Trust with Privacy.
Security Protocols Workshop 2004: 199-209 |
28 | EE | Laurent Bussard,
Refik Molva,
Yves Roudier:
History-Based Signature or How to Trust Anonymous Documents.
iTrust 2004: 78-92 |
2003 |
27 | EE | Alain Pannetrat,
Refik Molva:
Efficient Multicast Packet Authentication.
NDSS 2003 |
26 | EE | Refik Molva,
Pietro Michiardi:
Security in Ad Hoc Networks.
PWC 2003: 756-775 |
2002 |
25 | | Pietro Michiardi,
Refik Molva:
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks.
Communications and Multimedia Security 2002: 107-121 |
24 | | Yves Roudier,
Olivier Fouache,
Pierre Vannel,
Refik Molva:
Enabling adaptive and secure extranets.
Communications and Multimedia Security 2002: 123-135 |
23 | | Alain Pannetrat,
Refik Molva:
Multiple layer encryption for multicast groups.
Communications and Multimedia Security 2002: 137-153 |
22 | EE | Alain Pannetrat,
Refik Molva:
Authenticating real time packet streams and multicasts.
ISCC 2002: 490-495 |
21 | EE | Refik Molva,
Alain Pannetrat:
Network Security in the Multicast Framework.
NETWORKING Tutorials 2002: 59-82 |
2001 |
20 | | Sergio Loureiro,
Refik Molva,
Alain Pannetrat:
Secure Data Collection with Updates.
Electronic Commerce Research 1(1/2): 119-130 (2001) |
2000 |
19 | EE | Refik Molva,
Françoise Baude:
Mobile Code, Internet Security, and E-Commerce.
ECOOP Workshops 2000: 270-281 |
18 | EE | Refik Molva,
Yves Roudier:
A Distributed Access Control Model for Java.
ESORICS 2000: 291-308 |
17 | EE | Refik Molva,
Alain Pannetrat:
Scalable multicast security with dynamic recipient groups.
ACM Trans. Inf. Syst. Secur. 3(3): 136-160 (2000) |
1999 |
16 | EE | Refik Molva,
Alain Pannetrat:
Scalable Multicast Security in Dynamic Groups.
ACM Conference on Computer and Communications Security 1999: 101-112 |
15 | EE | Refik Molva:
Internet security architecture.
Computer Networks 31(8): 787-804 (1999) |
1998 |
14 | EE | Refik Molva,
Gene Tsudik:
Secret Sets and Applications.
Inf. Process. Lett. 65(1): 47-55 (1998) |
1997 |
13 | | Christian Blum II,
Philippe Dubois,
Refik Molva,
Olivier Schaller:
A Development and Runtime Platform for Teleconferencing Applications.
IEEE Journal on Selected Areas in Communications 15(3): 576-588 (1997) |
12 | | Didier Samfat,
Refik Molva:
IDAMN: An Intrusion Detection Architecture for Mobile Networks.
IEEE Journal on Selected Areas in Communications 15(7): 1373-1380 (1997) |
1996 |
11 | EE | Stefano Zatti,
Refik Molva,
Angelo Tosi,
Gene Tsudik,
Helmut Kurth:
Limitations of the Approach of Solving a Network's Security Problem with a Firewall.
ESORICS 1996: 144-145 |
10 | | Ralf C. Hauser,
Philippe A. Janson,
Refik Molva,
Gene Tsudik,
Els Van Herreweghen:
Robust and Secure Password and Key Change Method.
Journal of Computer Security 4(1): 97-112 (1996) |
1995 |
9 | EE | Didier Samfat,
Refik Molva,
N. Asokan:
Untraceability in Mobile Networks.
MOBICOM 1995: 26-36 |
8 | EE | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
The KryptoKnight family of light-weight protocols for authentication and key distribution.
IEEE/ACM Trans. Netw. 3(1): 31-41 (1995) |
1994 |
7 | EE | Refik Molva,
Erich Rütsche:
Application Access Control at Network Level.
ACM Conference on Computer and Communications Security 1994: 219-228 |
6 | EE | Ralf C. Hauser,
Philippe A. Janson,
Refik Molva,
Gene Tsudik,
Els Van Herreweghen:
Robust and Secure Password and Key Change Method.
ESORICS 1994: 107-122 |
1993 |
5 | | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
Systematic Design of a Family of Attack-Resistant Authentication Protocols.
IEEE Journal on Selected Areas in Communications 11(5): 679-693 (1993) |
1992 |
4 | EE | Refik Molva,
Gene Tsudik,
Els Van Herreweghen,
Stefano Zatti:
KryptoKnight Authentication and Key Distribution System.
ESORICS 1992: 155-174 |
3 | | Philippe A. Janson,
Refik Molva,
Stefano Zatti:
Architectural Directions for Opening IBM Networks: The Case of OSI.
IBM Systems Journal 31(2): 313-335 (1992) |
1991 |
2 | EE | Ray Bird,
Inder S. Gopal,
Amir Herzberg,
Philippe A. Janson,
Shay Kutten,
Refik Molva,
Moti Yung:
Systematic Design of Two-Party Authentication Protocols.
CRYPTO 1991: 44-61 |
1 | | Philippe A. Janson,
Refik Molva:
Security in Open Networks and Distributed Systems.
Computer Networks and ISDN Systems 22(5): 232-346 (1991) |