Tracker: Security and privacy for RFID-based supply chains EO Blass, K Elkhiyaoui, R Molva Cryptology ePrint Archive, 2010 | 88 | 2010 |
CHECKER: On-site checking in RFID-based supply chains K Elkhiyaoui, EO Blass, R Molva Proceedings of the fifth ACM conference on security and privacy in wireless …, 2012 | 69 | 2012 |
A-PPL: an accountability policy language M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed, AS De Oliveira, J Sendor International Workshop on Data Privacy Management, 319-326, 2014 | 68 | 2014 |
Privacy-preserving auditable token payments in a permissioned blockchain system E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ... Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020 | 64 | 2020 |
Private and dynamic time-series data aggregation with trust relaxation I Leontiadis, K Elkhiyaoui, R Molva Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014 | 64 | 2014 |
Efficient techniques for publicly verifiable delegation of computation K Elkhiyaoui, M Önen, M Azraoui, R Molva Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 49 | 2016 |
Stealthguard: Proofs of retrievability with hidden watchdogs M Azraoui, K Elkhiyaoui, R Molva, M Önen Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 45 | 2014 |
PUDA–privacy and unforgeability for data aggregation I Leontiadis, K Elkhiyaoui, M Önen, R Molva Cryptology and Network Security: 14th International Conference, CANS 2015 …, 2015 | 43 | 2015 |
Publicly verifiable conjunctive keyword search in outsourced databases M Azraoui, K Elkhiyaoui, M Önen, R Molva 2015 IEEE conference on communications and network security (CNS), 619-627, 2015 | 36 | 2015 |
ROTIV: RFID ownership transfer with issuer verification K Elkhiyaoui, EO Blass, R Molva RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012 | 33 | 2012 |
Anonymous transactions with revocation and auditing in hyperledger fabric D Bogatov, A De Caro, K Elkhiyaoui, B Tackmann Cryptology and Network Security: 20th International Conference, CANS 2021 …, 2021 | 29 | 2021 |
A Cloud Accountability Policy Representation Framework. W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ... Closer, 489-498, 2014 | 23 | 2014 |
Message-locked proofs of retrievability with secure deduplication D Vasilopoulos, M Önen, K Elkhiyaoui, R Molva Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 73-83, 2016 | 15 | 2016 |
Selective access to asset transfer data K Elkhiyaoui, E Androulaki, A De Caro, M Dubovitskaya, JL Camenisch US Patent 11,240,001, 2022 | 14 | 2022 |
Privacy preserving delegated word search in the cloud K Elkhiyaoui, M Onen, R Molva 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-14, 2014 | 10 | 2014 |
Decentralized privacy-preserving netting protocol on blockchain for payment systems S Cao, Y Yuan, A De Caro, K Nandakumar, K Elkhiyaoui, Y Hu Financial Cryptography and Data Security: 24th International Conference, FC …, 2020 | 8 | 2020 |
POROS: proof of data reliability for outsourced storage D Vasilopoulos, K Elkhiyaoui, R Molva, M Onen Proceedings of the 6th International Workshop on Security in Cloud Computing …, 2018 | 7 | 2018 |
Dualdory: logarithmic-verifier linkable ring signatures through preprocessing J Bootle, K Elkhiyaoui, J Hesse, Y Manevich European Symposium on Research in Computer Security, 427-446, 2022 | 5 | 2022 |
From regulatory obligations to enforceable accountability policies in the Cloud W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ... Cloud Computing and Services Sciences: International Conference in Cloud …, 2015 | 5 | 2015 |
A scalable interest-oriented peer-to-peer pub/sub network D Kato, K Elkhiyaoui, K Kunieda, K Yamada, P Michiardi Peer-to-Peer Networking and Applications 4, 165-177, 2011 | 5 | 2011 |