Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks P Michiardi, R Molva Advanced Communications and Multimedia Security: IFIP TC6/TC11 Sixth Joint …, 2002 | 2303 | 2002 |
Safebook: A privacy-preserving online social network leveraging on real-life trust LA Cutillo, R Molva, T Strufe IEEE Communications Magazine 47 (12), 94-101, 2009 | 667 | 2009 |
Authentication method and system with a smartcard R Molva, G Tsudik US Patent 5,347,580, 1994 | 446 | 1994 |
Simulation-based analysis of security exposures in mobile ad hoc networks P Michiardi, R Molva European Wireless Conference, 15-17, 2002 | 314 | 2002 |
ClouDedup: Secure deduplication with encrypted data for cloud storage P Puzio, R Molva, M Önen, S Loureiro 2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013 | 246 | 2013 |
Systematic design of a family of attack-resistant authentication protocols R Bird, I Gopal, A Herzberg, PA Janson, S Kutten, R Molva, M Yung IEEE Journal on Selected Areas in Communications 11 (5), 679-693, 1993 | 230 | 1993 |
Authentication of mobile users R Molva, D Samfat, G Tsudik IEEE Network 8 (2), 26-34, 1994 | 216 | 1994 |
Systematic design of two-party authentication protocols R Bird, I Gopal, A Herzberg, P Janson, S Kutten, R Molva, M Yung Advances in Cryptology—CRYPTO’91: Proceedings 11, 44-61, 1992 | 194 | 1992 |
KryptoKnight authentication and key distribution system R Molva, G Tsudik, E Van Herreweghen, S Zatti Computer Security—ESORICS 92: Second European Symposium on Research in …, 1992 | 191 | 1992 |
Privacy preserving social networking through decentralization LA Cutillo, R Molva, T Strufe 2009 Sixth International Conference on Wireless On-Demand Network Systems …, 2009 | 181 | 2009 |
A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks P Michiardi, R Molva WiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks …, 2003 | 176 | 2003 |
Method and system for changing an authorization password or key in a distributed communication network R Hauser, P Janson, R Molva, G Tsudik, E Van Herreweghen US Patent 5,778,065, 1998 | 167 | 1998 |
Untraceability in mobile networks D Samfat, R Molva, N Asokan Proceedings of the 1st annual international conference on Mobile computing …, 1995 | 167 | 1995 |
Multi-party secure session/conference RF Bird, A Herzberg, PA Janson, S Kutten, RA Molva, MM Yung US Patent 5,369,705, 1994 | 160 | 1994 |
The kryptoknight family of light-weight protocols for authentication and key distribution R Bird, I Gopal, A Herzberg, P Janson, S Kutten, R Molva, M Yung IEEE/ACM transactions on networking 3 (1), 31-41, 1995 | 149 | 1995 |
IDAMN: an intrusion detection architecture for mobile networks D Samfat, R Molva IEEE Journal on Selected Areas in Communications 15 (7), 1373-1380, 1997 | 137 | 1997 |
Non-cooperative forwarding in ad-hoc networks E Altman, AA Kherani, P Michiardi, R Molva NETWORKING 2005. Networking Technologies, Services, and Protocols …, 2005 | 134 | 2005 |
Efficient multicast packet authentication. A Pannetrat, R Molva NDSS, 2003 | 132 | 2003 |
Game theoretic analysis of security in mobile ad hoc networks P Michiardi, R Molva Institut Eurecom, Sophia-Antipolis, France, 2002 | 115 | 2002 |
Internet security architecture R Molva Computer Networks 31 (8), 787-804, 1999 | 113 | 1999 |