Kaoutar Elkhiyaoui
Kaoutar Elkhiyaoui
IBM Research
Verified email at zurich.ibm.com
Title
Cited by
Cited by
Year
Tracker: Security and privacy for RFID-based supply chains
EO Blass, K Elkhiyaoui, R Molva, ES Antipolis
In NDSS’11, 18th Annual Network and Distributed System Security Symposium, 6 …, 2011
752011
CHECKER: On-site checking in RFID-based supply chains
K Elkhiyaoui, EO Blass, R Molva
Proceedings of the fifth ACM conference on security and privacy in wireless …, 2012
522012
A-PPL: an accountability policy language
M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed, AS De Oliveira, J Sendor
Data privacy management, autonomous spontaneous security, and security …, 2014
462014
Stealthguard: Proofs of retrievability with hidden watchdogs
M Azraoui, K Elkhiyaoui, R Molva, M Önen
European Symposium on Research in Computer Security, 239-256, 2014
342014
ROTIV: RFID ownership transfer with issuer verification
K Elkhiyaoui, EO Blass, R Molva
International Workshop on Radio Frequency Identification: Security and …, 2011
312011
Private and dynamic time-series data aggregation with trust relaxation
I Leontiadis, K Elkhiyaoui, R Molva
International Conference on Cryptology and Network Security, 305-320, 2014
302014
Efficient techniques for publicly verifiable delegation of computation
K Elkhiyaoui, M Önen, M Azraoui, R Molva
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
262016
A Cloud Accountability Policy Representation Framework.
W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ...
Closer, 489-498, 2014
202014
Publicly verifiable conjunctive keyword search in outsourced databases
M Azraoui, K Elkhiyaoui, M Önen, R Molva
2015 IEEE Conference on Communications and Network Security (CNS), 619-627, 2015
192015
PUDA–privacy and unforgeability for data aggregation
I Leontiadis, K Elkhiyaoui, M Önen, R Molva
International Conference on Cryptology and Network Security, 3-18, 2015
162015
Privacy preserving delegated word search in the cloud
K Elkhiyaoui, MÖR Molva
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-14, 2014
92014
Message-locked proofs of retrievability with secure deduplication
D Vasilopoulos, M Önen, K Elkhiyaoui, R Molva
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 73-83, 2016
72016
Two Attacks against the Ff RFID Protocol
O Billet, K Elkhiyaoui
International Conference on Cryptology in India, 308-320, 2009
62009
From Regulatory Obligations to Enforceable Accountability Policies in the Cloud
W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ...
International Conference on Cloud Computing and Services Science, 134-150, 2015
52015
T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags
K Elkhiyaoui, EO Blass, R Molva
International Workshop on Radio Frequency Identification: Security and …, 2012
52012
A scalable interest-oriented peer-to-peer pub/sub network
D Kato, K Elkhiyaoui, K Kunieda, K Yamada, P Michiardi
Peer-to-Peer Networking and Applications 4 (2), 165-177, 2011
42011
Online-Offline Homomorphic Signatures for Polynomial Functions.
K Elkhiyaoui, M Önen, R Molva
IACR Cryptol. ePrint Arch. 2015, 954, 2015
32015
PPS: Privacy-preserving statistics using RFID tags
EO Blass, K Elkhiyaoui, R Molva
2012 IEEE International Symposium on a World of Wireless, Mobile and …, 2012
32012
POROS: Proof of data reliability for outsourced storage
D Vasilopoulos, K Elkhiyaoui, R Molva, M Onen
Proceedings of the 6th International Workshop on Security in Cloud Computing …, 2018
22018
Security and privacy in RFID systems
K Elkhiyaoui
22012
The system can't perform the operation now. Try again later.
Articles 1–20