Tracker: Security and privacy for RFID-based supply chains EO Blass, K Elkhiyaoui, R Molva Cryptology ePrint Archive, 2010 | 90 | 2010 |
Privacy-preserving auditable token payments in a permissioned blockchain system E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ... Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020 | 80 | 2020 |
A-PPL: an accountability policy language M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed, AS De Oliveira, J Sendor International Workshop on Data Privacy Management, 319-326, 2014 | 73 | 2014 |
CHECKER: On-site checking in RFID-based supply chains K Elkhiyaoui, EO Blass, R Molva Proceedings of the fifth ACM conference on security and privacy in wireless …, 2012 | 71 | 2012 |
Private and dynamic time-series data aggregation with trust relaxation I Leontiadis, K Elkhiyaoui, R Molva Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014 | 67 | 2014 |
Efficient techniques for publicly verifiable delegation of computation K Elkhiyaoui, M Önen, M Azraoui, R Molva Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 53 | 2016 |
PUDA–privacy and unforgeability for data aggregation I Leontiadis, K Elkhiyaoui, M Önen, R Molva Cryptology and Network Security: 14th International Conference, CANS 2015 …, 2015 | 49 | 2015 |
Stealthguard: Proofs of retrievability with hidden watchdogs M Azraoui, K Elkhiyaoui, R Molva, M Önen Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 45 | 2014 |
Publicly verifiable conjunctive keyword search in outsourced databases M Azraoui, K Elkhiyaoui, M Önen, R Molva 2015 IEEE conference on communications and network security (CNS), 619-627, 2015 | 38 | 2015 |
Anonymous transactions with revocation and auditing in hyperledger fabric D Bogatov, A De Caro, K Elkhiyaoui, B Tackmann Cryptology and Network Security: 20th International Conference, CANS 2021 …, 2021 | 35 | 2021 |
ROTIV: RFID ownership transfer with issuer verification K Elkhiyaoui, EO Blass, R Molva RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012 | 35 | 2012 |
A Cloud Accountability Policy Representation Framework. W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ... Closer, 489-498, 2014 | 23 | 2014 |
Selective access to asset transfer data K Elkhiyaoui, E Androulaki, A De Caro, M Dubovitskaya, JL Camenisch US Patent 11,240,001, 2022 | 17 | 2022 |
Message-locked proofs of retrievability with secure deduplication D Vasilopoulos, M Önen, K Elkhiyaoui, R Molva Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 73-83, 2016 | 16 | 2016 |
Decentralized privacy-preserving netting protocol on blockchain for payment systems S Cao, Y Yuan, A De Caro, K Nandakumar, K Elkhiyaoui, Y Hu Financial Cryptography and Data Security: 24th International Conference, FC …, 2020 | 10 | 2020 |
Privacy preserving delegated word search in the cloud K Elkhiyaoui, M Onen, R Molva 2014 11th International Conference on Security and Cryptography (SECRYPT), 1-14, 2014 | 10 | 2014 |
POROS: proof of data reliability for outsourced storage D Vasilopoulos, K Elkhiyaoui, R Molva, M Onen Proceedings of the 6th International Workshop on Security in Cloud Computing …, 2018 | 8 | 2018 |
Dualdory: logarithmic-verifier linkable ring signatures through preprocessing J Bootle, K Elkhiyaoui, J Hesse, Y Manevich European Symposium on Research in Computer Security, 427-446, 2022 | 7 | 2022 |
Short Privacy-Preserving Proofs of Liabilities F Falzon, K Elkhiyaoui, Y Manevich, A De Caro Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 5 | 2023 |
Consent-based data management CAO Shengjiao, A De Caro, K Elkhiyaoui, YCF Lim US Patent 11,240,003, 2022 | 5 | 2022 |