Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Molva, Refik
add a person with the name Molva, Refik
 

Other publications of authors with the same name

Scalable multicast security with dynamic recipient groups., and . ACM Trans. Inf. Syst. Secur., 3 (3): 136-160 (2000)Local key management in opportunistic networks., , and . IJCNDS, 9 (1/2): 97-116 (2012)PRISM - Privacy-Preserving Search in MapReduce., , , and . IACR Cryptology ePrint Archive, (2011)ROTIV: RFID Ownership Transfer with Issuer Verification., , and . IACR Cryptology ePrint Archive, (2010)Non-cooperative Forwarding in Ad-Hoc Networks., , , and . NETWORKING, volume 3462 of Lecture Notes in Computer Science, page 486-498. Springer, (2005)Privacy in context-based and epidemic forwarding., , and . WOWMOM, page 1-7. IEEE Computer Society, (2009)IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs., and . PerCom Workshops, IEEE Computer Society, (2010)Secure Data Aggregation with Multiple Encryption., and . EWSN, volume 4373 of Lecture Notes in Computer Science, page 117-132. Springer, (2007)History-Based Signature or How to Trust Anonymous Documents., , and . iTrust, volume 2995 of Lecture Notes in Computer Science, page 78-92. Springer, (2004)Multiple layer encryption for multicast groups., and . Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, page 137-153. Kluwer, (2002)