Refik Molva - Academia.edu (original) (raw)
Uploads
Papers by Refik Molva
Lecture Notes in Computer Science, 2005
Even if there are many authentication protocols for RFID system, only a few protocols support loc... more Even if there are many authentication protocols for RFID system, only a few protocols support location privacy. Because of tag’s hardware limitation, these protocols suffer from many security threats, especially from the DoS (Denial of Service) attacks. In this paper, we discuss location privacy problem and show vulnerabilities of RFID authentication protocols. And then, we will suggest a strong authentication
Journal of Network and Computer Applications, 2009
Proceedings of SPIE, Jan 24, 1997
As the organizing committee, it is our pleasure to present the proceedings of the 2 nd IEEE Inter... more As the organizing committee, it is our pleasure to present the proceedings of the 2 nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), held on June 20, 2011, in Lucca, Italy. The goal of this one-day workshop, organized in conjunction with the 12 th IEEE WoWMoM 2011, is to exchange cutting-edge ideas for securing the next-generation wireless networks, systems and applications. The scope of D-SPAN includes a wide variety of topics, including security and privacy of data collection, transmission, storage, publishing, and sharing in wireless networks broadly defined ± such as cellular and mobile ad hoc networks (MANET), vehicular ad hoc networks (VANET), cognitive and sensor networks ± to applying data analytics techniques to address security and privacy challenges in these networks. D-SPAN provides a forum for academic and industry researchers to present research ideas that build bridges across three communities: wireless networks and databases, and security.
Springer eBooks, 2005
... University, USA Kaisa Nyberg, Nokia, Finland Christof Paar, University of Bochum, Germany Pan... more ... University, USA Kaisa Nyberg, Nokia, Finland Christof Paar, University of Bochum, Germany Panagiotis Papadimitratos, Cornell University, USA ... An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi ...
ABSTRACT Security of e-applications running over Internet is a major requirement for their widesp... more ABSTRACT Security of e-applications running over Internet is a major requirement for their widespread use. As discussions in this panel often pointed it out, such kind of applications shows more and more a property of mobility: mobility of code, data, or even mobility of objects, termed agents. But how to enforce security of such mobile components? Is it at the programming language level, or could it be managed in a completely transparent way for the programmer ? Do we need domainspecific languages that we hope could be trusted or are general-purpose languages enough ? This panel gave some highlights on how adequate the object-oriented language technology could be; at which level of granularity security has to be designed and introduced into the application; why solutions differing from classical cryptography-based solutions are promising.
Journal of Computer Security, 1996
IACR Cryptology ePrint Archive, 2008
Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011, 2011
Lecture Notes in Computer Science, 2015
Lecture Notes in Computer Science, 2015
Lecture Notes in Computer Science, 2005
Even if there are many authentication protocols for RFID system, only a few protocols support loc... more Even if there are many authentication protocols for RFID system, only a few protocols support location privacy. Because of tag’s hardware limitation, these protocols suffer from many security threats, especially from the DoS (Denial of Service) attacks. In this paper, we discuss location privacy problem and show vulnerabilities of RFID authentication protocols. And then, we will suggest a strong authentication
Journal of Network and Computer Applications, 2009
Proceedings of SPIE, Jan 24, 1997
As the organizing committee, it is our pleasure to present the proceedings of the 2 nd IEEE Inter... more As the organizing committee, it is our pleasure to present the proceedings of the 2 nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN), held on June 20, 2011, in Lucca, Italy. The goal of this one-day workshop, organized in conjunction with the 12 th IEEE WoWMoM 2011, is to exchange cutting-edge ideas for securing the next-generation wireless networks, systems and applications. The scope of D-SPAN includes a wide variety of topics, including security and privacy of data collection, transmission, storage, publishing, and sharing in wireless networks broadly defined ± such as cellular and mobile ad hoc networks (MANET), vehicular ad hoc networks (VANET), cognitive and sensor networks ± to applying data analytics techniques to address security and privacy challenges in these networks. D-SPAN provides a forum for academic and industry researchers to present research ideas that build bridges across three communities: wireless networks and databases, and security.
Springer eBooks, 2005
... University, USA Kaisa Nyberg, Nokia, Finland Christof Paar, University of Bochum, Germany Pan... more ... University, USA Kaisa Nyberg, Nokia, Finland Christof Paar, University of Bochum, Germany Panagiotis Papadimitratos, Cornell University, USA ... An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi ...
ABSTRACT Security of e-applications running over Internet is a major requirement for their widesp... more ABSTRACT Security of e-applications running over Internet is a major requirement for their widespread use. As discussions in this panel often pointed it out, such kind of applications shows more and more a property of mobility: mobility of code, data, or even mobility of objects, termed agents. But how to enforce security of such mobile components? Is it at the programming language level, or could it be managed in a completely transparent way for the programmer ? Do we need domainspecific languages that we hope could be trusted or are general-purpose languages enough ? This panel gave some highlights on how adequate the object-oriented language technology could be; at which level of granularity security has to be designed and introduced into the application; why solutions differing from classical cryptography-based solutions are promising.
Journal of Computer Security, 1996
IACR Cryptology ePrint Archive, 2008
Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011, 2011
Lecture Notes in Computer Science, 2015
Lecture Notes in Computer Science, 2015