logo EDITE Refik MOLVA
Identité
Refik MOLVA
État académique
Thèse soutenue le 1986-01-01
Titulaire d'une HDR (ou équivalent)
Laboratoire: personnel permanent
Direction de thèses (depuis 2007)
2.2
Voisinage
Ellipse bleue: doctorant, ellipse jaune: docteur, rectangle vert: permanent, rectangle jaune: HDR. Trait vert: encadrant de thèse, trait bleu: directeur de thèse, pointillé: jury d'évaluation à mi-parcours ou jury de thèse.
Productions scientifiques
Journal:Sorniotti-30/09/2009
Efficient access control for wireless sensor data
Efficient access control for wireless sensor data, in "Ad hoc & sensor wireless networks, An International Journal", Vol.7, N 3-4, September, 2009 30/09/2009
Journal:Skikfa-31/12/2011
Local key management in opportunistic networks
Local key management in opportunistic networks, "International Journal of Communication Networks and Distributed Systems", 2011, Volume 6, ISSN:1754-3916 31/12/2011
http://dx.doi.org/10.1109/TDSC.2010.37
The Ff-family of protocols for RFID-privacy and authentication
The Ff-family of protocols for RFID-privacy and authentication, "IEEE Transactions on Dependable and Secure Computing", Vol 8, N 3, 2011, ISSN:1545-5971 10/04/2011
http://dx.doi.org/10.1016/j.comcom.2010.04.035
Privacy and confidentiality in context-based and epidemic forwarding
Privacy and confidentiality in context-based and epidemic forwarding, "Computer Communications", Elsevier, Vol 33, N 13, August 2010 16/08/2010
http://dx.doi.org/10.1109/PERCOMW.2010.5470676
Bootstrapping security associations in opportunistic networks
Bootstrapping security associations in opportunistic networks, MP2P'10, 6th International Workshop on Mobile Peer-to-Peer Computing, March 29-April 2, 2010, Mannheim, Germany / Also published in PerCOM 2010, 8th Annual IEEE International Conference on Pervasive Computing and Communications 29/03/2010
Conference:Skikfa-30/06/2009
The Ff-family of protocols for RFID-privacy and authentication
The Ff-family of protocols for RFID-privacy and authentication, RFIDSec'09, 5th Workshop on RFID Security, June 30-July 2, 2009, Leuven, Belgium 30/06/2009
http://dx.doi.org/10.1109/WOWMOM.2009.5282445
Privacy in context-based and epidemic forwarding
Privacy in context-based and epidemic forwarding, AOC 2009. 3rd IEEE International WoWMoM Workshop on Autonomic and Opportunistic Communications, June 15, 2009, Kos, Greece 15/06/2009
http://dx.doi.org/10.1109/WAINA.2009.73
Privacy in content-based opportunistic networks
Privacy in content-based opportunistic networks, WON 2009, 2nd IEEE International Workshop on Opportunistic Networking, May 29, 2009, Bradford, UK 29/05/2009
http://dx.doi.org/10.1007/978-3-642-01244-0_24
Privacy-preserving content-based publish/subscribe networks
Privacy-preserving content-based publish/subscribe networks, IFIP SEC 2009, 24th International Information Security Conference, May 18-20, 2009, Pafos, Cyprus 18/05/2009
Conference:Skikfa-10/08/2007
Optimistic fair exchange for secure forwarding
Optimistic fair exchange for secure forwarding, SPEUCS 2007, 1st Workshop on the Security and Privacy of Emerging Ubiquitous Communication Systems, August 10, 2007 - Philadelphia, USA 10/08/2007
http://dx.doi.org/10.1007/978-3-642-17650-0_16
Federated secret handshakes with support for revocation
Federated secret handshakes with support for revocation, ICICS 2010, 12th International Conference on Information and Communications Security, December 15-17, 2010, Barcelona, Spain 15/12/2010
http://dx.doi.org/10.1145/1774088.1774219
Secret interest groups (SIGs) in social networks with an implementation on Facebook
Secret interest groups (SIGs) in social networks with an implementation on Facebook, SAC 2010, 25th ACM Symposium On Applied Computing, March 22-26, 2010, Sierre, Switzerland 22/03/2010
http://dx.doi.org/10.1016/j.cose.2009.11.004
A provably secure secret handshake with dynamic controlled matching
A provably secure secret handshake with dynamic controlled matching, Computers and Security, Volume 29, Issue 5, July 2010 31/01/2010
http://dx.doi.org/10.1007/978-3-642-14423-3_19
Secret handshakes with revocation support
Secret handshakes with revocation support, ICISC 2009, 12th International Conference on Information Security and Cryptology, December 2-4, 2009, Seoul, Korea / Also published in "Lecture Notes in Computer Science", Vol 5984/2010 02/12/2009
http://dx.doi.org/10.1007/s10776-009-0102-4
Efficient access control for wireless sensor data
Efficient access control for wireless sensor data, International Journal of Wireless Information Networks, Springer, Vol.16 N 3, September 2009 11/07/2009
http://dx.doi.org/10.1007/978-3-642-01244-0_29
A provably secure secret handshake with dynamic controlled matching
A provably secure secret handshake with dynamic controlled matching, IFIP SEC 2009, 24th International Information Security Conference, May 18-20, 2009, Pafos, Cyprus 18/05/2009
http://dx.doi.org/10.1109/PIMRC.2008.4699487
Efficient access control for wireless sensor data
Efficient access control for wireless sensor data, PIMRC 2008, IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 15-18 September, 2008, Cannes, France. 15/09/2008