Refik Molva - Academia.edu (original) (raw)

Uploads

Papers by Refik Molva

Research paper thumbnail of Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers (Lecture Notes in Computer Science)

Research paper thumbnail of RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks

Lecture Notes in Computer Science, 2005

Even if there are many authentication protocols for RFID system, only a few protocols support loc... more Even if there are many authentication protocols for RFID system, only a few protocols support location privacy. Because of tag’s hardware limitation, these protocols suffer from many security threats, especially from the DoS (Denial of Service) attacks. In this paper, we discuss location privacy problem and show vulnerabilities of RFID authentication protocols. And then, we will suggest a strong authentication

Research paper thumbnail of Network and system security

Journal of Network and Computer Applications, 2009

Research paper thumbnail of Efficient access control for wireless sensor data

Research paper thumbnail of <title>CORBA-based platform for distributed multimedia applications</title>

Proceedings of SPIE, Jan 24, 1997

Research paper thumbnail of Message from the Workshop Chairs 2nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN 2011)

As the organizing committee, it is our pleasure to present the proceedings of the 2 nd IEEE Inter... more As the organizing committee, it is our pleasure to present the proceedings of the 2 nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), held on June 20, 2011, in Lucca, Italy. The goal of this one-day workshop, organized in conjunction with the 12 th IEEE WoWMoM 2011, is to exchange cutting-edge ideas for securing the next-generation wireless networks, systems and applications. The scope of D-SPAN includes a wide variety of topics, including security and privacy of data collection, transmission, storage, publishing, and sharing in wireless networks broadly defined ± such as cellular and mobile ad hoc networks (MANET), vehicular ad hoc networks (VANET), cognitive and sensor networks ± to applying data analytics techniques to address security and privacy challenges in these networks. D-SPAN provides a forum for academic and industry researchers to present research ideas that build bridges across three communities: wireless networks and databases, and security.

Research paper thumbnail of Security in wireless ad hoc networks

Research paper thumbnail of Security and privacy in ad-hoc and sensor networks : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005 : revised selected papers

Springer eBooks, 2005

... University, USA Kaisa Nyberg, Nokia, Finland Christof Paar, University of Bochum, Germany Pan... more ... University, USA Kaisa Nyberg, Nokia, Finland Christof Paar, University of Bochum, Germany Panagiotis Papadimitratos, Cornell University, USA ... An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi ...

Research paper thumbnail of Architectural directions for opening IBM networks: the case of OSI

Research paper thumbnail of A Provably Secure Secret Handshake with Dynamic Controlled Matching

Research paper thumbnail of Mobile Code, Internet Security, and E-Commerce

ABSTRACT Security of e-applications running over Internet is a major requirement for their widesp... more ABSTRACT Security of e-applications running over Internet is a major requirement for their widespread use. As discussions in this panel often pointed it out, such kind of applications shows more and more a property of mobility: mobility of code, data, or even mobility of objects, termed agents. But how to enforce security of such mobile components? Is it at the programming language level, or could it be managed in a completely transparent way for the programmer ? Do we need domainspecific languages that we hope could be trusted or are general-purpose languages enough ? This panel gave some highlights on how adequate the object-oriented language technology could be; at which level of granularity security has to be designed and introduced into the application; why solutions differing from classical cryptography-based solutions are promising.

Research paper thumbnail of Robust and secure password and key change method

Journal of Computer Security, 1996

Research paper thumbnail of The F f -Family of Protocols for RFID-Privacy and Authentication

IACR Cryptology ePrint Archive, 2008

Research paper thumbnail of Detection of Logic Flaws in Multi-party Business Applications via Security Testing

Research paper thumbnail of Message from the workshop co-chairs

Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011, 2011

Research paper thumbnail of Multi-user Searchable Encryption in the Cloud

Lecture Notes in Computer Science, 2015

Research paper thumbnail of PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage

Research paper thumbnail of Framework for Searchable Encryption with SQL Databases

Research paper thumbnail of PUDA – Privacy and Unforgeability for Data Aggregation

Lecture Notes in Computer Science, 2015

Research paper thumbnail of Efficient Techniques for Publicly Verifiable Delegation of Computation

Research paper thumbnail of Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers (Lecture Notes in Computer Science)

Research paper thumbnail of RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks

Lecture Notes in Computer Science, 2005

Even if there are many authentication protocols for RFID system, only a few protocols support loc... more Even if there are many authentication protocols for RFID system, only a few protocols support location privacy. Because of tag’s hardware limitation, these protocols suffer from many security threats, especially from the DoS (Denial of Service) attacks. In this paper, we discuss location privacy problem and show vulnerabilities of RFID authentication protocols. And then, we will suggest a strong authentication

Research paper thumbnail of Network and system security

Journal of Network and Computer Applications, 2009

Research paper thumbnail of Efficient access control for wireless sensor data

Research paper thumbnail of <title>CORBA-based platform for distributed multimedia applications</title>

Proceedings of SPIE, Jan 24, 1997

Research paper thumbnail of Message from the Workshop Chairs 2nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN 2011)

As the organizing committee, it is our pleasure to present the proceedings of the 2 nd IEEE Inter... more As the organizing committee, it is our pleasure to present the proceedings of the 2 nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), held on June 20, 2011, in Lucca, Italy. The goal of this one-day workshop, organized in conjunction with the 12 th IEEE WoWMoM 2011, is to exchange cutting-edge ideas for securing the next-generation wireless networks, systems and applications. The scope of D-SPAN includes a wide variety of topics, including security and privacy of data collection, transmission, storage, publishing, and sharing in wireless networks broadly defined ± such as cellular and mobile ad hoc networks (MANET), vehicular ad hoc networks (VANET), cognitive and sensor networks ± to applying data analytics techniques to address security and privacy challenges in these networks. D-SPAN provides a forum for academic and industry researchers to present research ideas that build bridges across three communities: wireless networks and databases, and security.

Research paper thumbnail of Security in wireless ad hoc networks

Research paper thumbnail of Security and privacy in ad-hoc and sensor networks : Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005 : revised selected papers

Springer eBooks, 2005

... University, USA Kaisa Nyberg, Nokia, Finland Christof Paar, University of Bochum, Germany Pan... more ... University, USA Kaisa Nyberg, Nokia, Finland Christof Paar, University of Bochum, Germany Panagiotis Papadimitratos, Cornell University, USA ... An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi ...

Research paper thumbnail of Architectural directions for opening IBM networks: the case of OSI

Research paper thumbnail of A Provably Secure Secret Handshake with Dynamic Controlled Matching

Research paper thumbnail of Mobile Code, Internet Security, and E-Commerce

ABSTRACT Security of e-applications running over Internet is a major requirement for their widesp... more ABSTRACT Security of e-applications running over Internet is a major requirement for their widespread use. As discussions in this panel often pointed it out, such kind of applications shows more and more a property of mobility: mobility of code, data, or even mobility of objects, termed agents. But how to enforce security of such mobile components? Is it at the programming language level, or could it be managed in a completely transparent way for the programmer ? Do we need domainspecific languages that we hope could be trusted or are general-purpose languages enough ? This panel gave some highlights on how adequate the object-oriented language technology could be; at which level of granularity security has to be designed and introduced into the application; why solutions differing from classical cryptography-based solutions are promising.

Research paper thumbnail of Robust and secure password and key change method

Journal of Computer Security, 1996

Research paper thumbnail of The F f -Family of Protocols for RFID-Privacy and Authentication

IACR Cryptology ePrint Archive, 2008

Research paper thumbnail of Detection of Logic Flaws in Multi-party Business Applications via Security Testing

Research paper thumbnail of Message from the workshop co-chairs

Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011, 2011

Research paper thumbnail of Multi-user Searchable Encryption in the Cloud

Lecture Notes in Computer Science, 2015

Research paper thumbnail of PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage

Research paper thumbnail of Framework for Searchable Encryption with SQL Databases

Research paper thumbnail of PUDA – Privacy and Unforgeability for Data Aggregation

Lecture Notes in Computer Science, 2015

Research paper thumbnail of Efficient Techniques for Publicly Verifiable Delegation of Computation

Log In