Volgen
Kaoutar Elkhiyaoui
Kaoutar Elkhiyaoui
IBM Research
Geverifieerd e-mailadres voor zurich.ibm.com
Titel
Geciteerd door
Geciteerd door
Jaar
Tracker: Security and privacy for RFID-based supply chains
EO Blass, K Elkhiyaoui, R Molva
Cryptology ePrint Archive, 2010
872010
CHECKER: On-site checking in RFID-based supply chains
K Elkhiyaoui, EO Blass, R Molva
Proceedings of the fifth ACM conference on security and privacy in wireless …, 2012
622012
A-PPL: an accountability policy language
M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed, ASD Oliveira, J Sendor
Data privacy management, autonomous spontaneous security, and security …, 2014
602014
Private and dynamic time-series data aggregation with trust relaxation
I Leontiadis, K Elkhiyaoui, R Molva
International Conference on Cryptology and Network Security, 305-320, 2014
452014
Efficient techniques for publicly verifiable delegation of computation
K Elkhiyaoui, M Önen, M Azraoui, R Molva
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
402016
Stealthguard: Proofs of retrievability with hidden watchdogs
M Azraoui, K Elkhiyaoui, R Molva, M Önen
European Symposium on Research in Computer Security, 239-256, 2014
362014
ROTIV: RFID ownership transfer with issuer verification
K Elkhiyaoui, EO Blass, R Molva
International Workshop on Radio Frequency Identification: Security and …, 2011
342011
Privacy-preserving auditable token payments in a permissioned blockchain system
E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ...
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
282020
Publicly verifiable conjunctive keyword search in outsourced databases
M Azraoui, K Elkhiyaoui, M Önen, R Molva
2015 IEEE conference on communications and network security (CNS), 619-627, 2015
282015
PUDA–privacy and unforgeability for data aggregation
I Leontiadis, K Elkhiyaoui, M Önen, R Molva
International Conference on Cryptology and Network Security, 3-18, 2015
272015
A Cloud Accountability Policy Representation Framework.
W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ...
Closer, 489-498, 2014
232014
Anonymous transactions with revocation and auditing in hyperledger fabric
D Bogatov, AD Caro, K Elkhiyaoui, B Tackmann
International Conference on Cryptology and Network Security, 435-459, 2021
122021
Message-locked proofs of retrievability with secure deduplication
D Vasilopoulos, M Önen, K Elkhiyaoui, R Molva
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 73-83, 2016
102016
Privacy preserving delegated word search in the cloud
K Elkhiyaoui, M Onen, R Molva
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-14, 2014
102014
Decentralized privacy-preserving netting protocol on blockchain for payment systems
S Cao, Y Yuan, AD Caro, K Nandakumar, K Elkhiyaoui, Y Hu
International Conference on Financial Cryptography and Data Security, 137-155, 2020
62020
POROS: proof of data reliability for outsourced storage
D Vasilopoulos, K Elkhiyaoui, R Molva, M Onen
Proceedings of the 6th International Workshop on Security in Cloud Computing …, 2018
62018
Two Attacks against the Ff RFID Protocol
O Billet, K Elkhiyaoui
International Conference on Cryptology in India, 308-320, 2009
62009
From regulatory obligations to enforceable accountability policies in the Cloud
W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ...
International Conference on Cloud Computing and Services Science, 134-150, 2014
52014
T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags
K Elkhiyaoui, EO Blass, R Molva
International Workshop on Radio Frequency Identification: Security and …, 2012
52012
A scalable interest-oriented peer-to-peer pub/sub network
D Kato, K Elkhiyaoui, K Kunieda, K Yamada, P Michiardi
Peer-to-Peer Networking and Applications 4 (2), 165-177, 2011
42011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20