Personal information

Activities

Employment (3)

EURECOM: Sophia Antipolis, FR

1992-03-01 to present | Full Professor, Department Head (Digital Security)
Employment
Source: Self-asserted source
Refik Molva

IBM: La Gaude, FR

1997-02-01 to 1997-12-31 | Senior Consultant (Global Services)
Employment
Source: Self-asserted source
Refik Molva

IBM Zurich Research Laboratory: Zurich, CH

1987-01-01 to 1992-02-29 | Research Staff Member (Communications and Computer Science)
Employment
Source: Self-asserted source
Refik Molva

Education and qualifications (4)

Université Paul Sabatier: Toulouse, Midi-Pyrénées, FR

1982-09-01 to 1986-10-16 | Ph.D. in Computer Science (LAAS-CNRS)
Education
Source: Self-asserted source
Refik Molva

Université Paul Sabatier: Toulouse, Midi-Pyrénées, FR

1981-10-01 to 1982-06-30 | MSc (D.E.A.) in Computer Science
Education
Source: Self-asserted source
Refik Molva

Université de Grenoble I: Grenoble, Rhône-Alpes, FR

1977-10-01 to 1981-09-30 | BSc in Computer Science
Education
Source: Self-asserted source
Refik Molva

Lycée Saint Joseph: Istanbul, TR

1971-09-01 to 1977-06-30
Education
Source: Self-asserted source
Refik Molva

Works (50 of 124)

Items per page:
Page 1 of 3

Preface

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85028472275

Contributors: Yan, Z.; Molva, R.; Mazurczyk, W.; Kantola, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Efficient techniques for publicly verifiable delegation of computation

ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
2016 | Conference paper
EID:

2-s2.0-84979681531

Contributors: Elkhiyaoui, K.; Önen, M.; Azraoui, M.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Message-locked proofs of retrievability with secure deduplication

CCSW 2016 - Proceedings of the 2016 ACM Cloud Computing Security Workshop, co-located with CCS 2016
2016 | Conference paper
EID:

2-s2.0-85001697120

Contributors: Vasilopoulos, D.; Önen, M.; Elkhiyaoui, K.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Perfectdedup: Secure data deduplication

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016 | Book
EID:

2-s2.0-84961167894

Contributors: Puzio, P.; Molva, R.; Önen, M.; Loureiro, S.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Multi-user searchable encryption in the cloud

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84945957121

Contributors: Van Rompay, C.; Molva, R.; Önen, M.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Publicly verifiable conjunctive keyword search in outsourced databases

2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015
2015 | Conference paper
EID:

2-s2.0-84966270891

Contributors: Azraoui, M.; Elkhiyaoui, K.; Onen, M.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

PUDA-privacy and unforgeability for data aggregation

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2015 | Book
EID:

2-s2.0-84952671075

Contributors: Leontiadis, I.; Elkhiyaoui, K.; Önen, M.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Secure deduplication with encrypted data for cloud storage

Delivery and Adoption of Cloud Computing Services in Contemporary Organizations
2015 | Book
EID:

2-s2.0-84954592741

Contributors: Puzio, P.; Öne, M.; Molva, R.; Loureiro., S.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

A P2P based usage control enforcement scheme resilient to re-injection attacks

Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, WoWMoM 2014
2014 | Conference paper
EID:

2-s2.0-84908884782

Contributors: Leontiadis, I.; Molva, R.; Onen, M.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Privacy preserving delegated word search in the cloud

SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Part of ICETE 2014 - 11th International Joint Conference on e-Business and Telecommunications
2014 | Conference paper
EID:

2-s2.0-84908893117

Contributors: Elkhiyaoui, K.; Önen, M.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Privacy preserving statistics in the smart grid

Proceedings - International Conference on Distributed Computing Systems
2014 | Conference paper
EID:

2-s2.0-84988346577

Contributors: Leontiadis, I.; Molva, R.; Önen, M.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Private and dynamic time-series data aggregation with trust relaxation

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84911405398

Contributors: Leontiadis, I.; Elkhiyaoui, K.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

StealthGuard: Proofs of retrievability with hidden watchdogs

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84906506635

Contributors: Azraoui, M.; Elkhiyaoui, K.; Molva, R.; Önen, M.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

ClouDedup: Secure deduplication with encrypted data for cloud storage

Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom
2013 | Conference paper
EID:

2-s2.0-84899741794

Contributors: Puzio, P.; Molva, R.; Onen, M.; Loureiro, S.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Privacy preserving similarity detection for data analysis

Proceedings - 2013 IEEE 3rd International Conference on Cloud and Green Computing, CGC 2013 and 2013 IEEE 3rd International Conference on Social Computing and Its Applications, SCA 2013
2013 | Conference paper
EID:

2-s2.0-84893323975

Contributors: Leontiadis, I.; Önen, M.; Molva, R.; Chorley, M.J.; Colombo, G.B.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

PSP: Private and secure payment with RFID

Computer Communications
2013 | Journal article
EID:

2-s2.0-84872955281

Contributors: Blass, E.-O.; Kurmus, A.; Molva, R.; Strufe, T.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Secure alert tracking in supply chain

ICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings
2013 | Conference paper
EID:

2-s2.0-84887717170

Contributors: Khalfaoui, M.; Molva, R.; Gomez, L.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Secure product tracking in supply Chain

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84880940544

Contributors: Khalfaoui, M.; Molva, R.; Gomez, L.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems"

Security and Communication Networks
2013 | Journal article
EID:

2-s2.0-84888413879

Contributors: Liu, P.; Molva, R.; Jing, J.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

T-match: Privacy-preserving item matching for storage - Only RFID tags

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84873378578

Contributors: Elkhiyaoui, K.; Blass, E.-O.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Accountability for cloud and other future Internet services

CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science
2012 | Conference paper
EID:

2-s2.0-84874249821

Contributors: Pearson, S.; Tountopoulos, V.; Catteddu, D.; Sudholt, M.; Molva, R.; Reich, C.; Fischer-Hubner, S.; Millard, C.; Lotz, V.; Jaatun, M.G. et al.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

CHECKER: On-site checking in RFID-based supply chains

WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks
2012 | Conference paper
EID:

2-s2.0-84860657792

Contributors: Elkhiyaoui, K.; Blass, E.-O.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Local key management in opportunistic networks

International Journal of Communication Networks and Distributed Systems
2012 | Journal article
EID:

2-s2.0-84870180541

Contributors: Shikfa, A.; Önen, M.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

PPS: Privacy-preserving statistics using RFID tags

2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings
2012 | Conference paper
EID:

2-s2.0-84866403122

Contributors: Blass, E.-O.; Elkhiyaoui, K.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

PRICE: Privacy preserving incentives for cooperation enforcement

2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings
2012 | Conference paper
EID:

2-s2.0-84866374302

Contributors: Cutillo, L.A.; Molva, R.; Önen, M.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

PRISM - Privacy-preserving search in MapReduce

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84864269507

Contributors: Blass, E.-O.; Di Pietro, R.; Molva, R.; Önen, M.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Privacy preserving picture sharing: Enforcing usage control in distributed on-line social networks

Proceedings of the 5th Workshop on Social Network Systems, SNS'12
2012 | Conference paper
EID:

2-s2.0-84860735258

Contributors: Cutillo, L.A.; Molva, R.; Önen, M.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

ROTIV: RFID ownership transfer with issuer verification

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84856094639

Contributors: Elkhiyaoui, K.; Blass, E.-O.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

An optimal probabilistic solution for information confinement, privacy, and security in RFID systems

Journal of Network and Computer Applications
2011 | Journal article
EID:

2-s2.0-79952451735

Contributors: Di Pietro, R.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Analysis of privacy in online social networks from the graph theory perspective

GLOBECOM - IEEE Global Telecommunications Conference
2011 | Conference paper
EID:

2-s2.0-84857222797

Contributors: Cutillo, L.A.; Molva, R.; Önen, M.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Broker-based private matching

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011 | Book
EID:

2-s2.0-79961188847

Contributors: Shikfa, A.; Önen, M.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Catch the jammer in wireless sensor network

IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC
2011 | Conference paper
EID:

2-s2.0-84863274469

Contributors: Sun, Y.; Molva, R.; Önen, M.; Wang, X.; Zhou, X.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

CrowdLoc: Wireless jammer localization with crowdsourcing measurements

UbiCrowd'11 - Proceedings of the 2nd International Workshop on Ubiquitous Crowdsouring
2011 | Conference paper
EID:

2-s2.0-80054083663

Contributors: Sun, Y.; Wang, X.; Önen, M.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Message from the workshop chairs

2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2011 - Digital Proceedings
2011 | Conference paper
EID:

2-s2.0-80052744555

Contributors: Das, S.K.; Noubir, G.; Molva, R.; Tsudik, G.; Zhang, N.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Privacy preserving products tracking in clustered supply chain

SENSORCOMM 2011 - 5th International Conference on Sensor Technologies and Applications and WSNSCM 2011, 1st International Workshop on Sensor Networks for Supply Chain Management
2011 | Conference paper
EID:

2-s2.0-84875294290

Contributors: Khalfaoui, M.; Elkhiyaoui, K.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Research challenges towards the Future Internet

Computer Communications
2011 | Journal article
EID:

2-s2.0-80255123476

Contributors: Conti, M.; Chong, S.; Fdida, S.; Jia, W.; Karl, H.; Lin, Y.-D.; Mähönen, P.; Maier, M.; Molva, R.; Uhlig, S. et al.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Safebook: A distributed privacy preserving online social network

2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2011 - Digital Proceedings
2011 | Conference paper
EID:

2-s2.0-80052741190

Contributors: Cutillo, L.A.; Molva, R.; Önen, M.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

The F<inf>f</inf>-family of protocols for RFID-privacy and authentication

IEEE Transactions on Dependable and Secure Computing
2011 | Journal article
EID:

2-s2.0-79952969303

Contributors: Blass, E.-O.; Kurmus, A.; Molva, R.; Noubir, G.; Shikfa, A.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

A provably secure secret handshake with dynamic controlled matching

Computers and Security
2010 | Journal article
EID:

2-s2.0-77955718260

Contributors: Sorniotti, A.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Bootstrapping security associations in opportunistic networks

2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010
2010 | Conference paper
EID:

2-s2.0-77953993183

Contributors: Shilda, A.; Önen, M.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Federated Secret Handshakes with support for revocation

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-78650902725

Contributors: Sorniotti, A.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs

2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2010
2010 | Conference paper
EID:

2-s2.0-77953965749

Contributors: Molva, R.; Tsudik, G.; Önen, M.; Strufe, T.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

On the security and feasibility of safebook: A distributed privacy-preserving online social network

IFIP Advances in Information and Communication Technology
2010 | Book
EID:

2-s2.0-84856133401

Contributors: Cutillo, L.A.; Molva, R.; Strufe, T.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Privacy and confidentiality in context-based and epidemic forwarding

Computer Communications
2010 | Journal article
EID:

2-s2.0-77955306864

Contributors: Shikfa, A.; Önen, M.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Secret handshakes with revocation support

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2010 | Book
EID:

2-s2.0-77954580836

Contributors: Sorniotti, A.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Secret Interest Groups (SIGs) in social networks with an implementation on Facebook

Proceedings of the ACM Symposium on Applied Computing
2010 | Conference paper
EID:

2-s2.0-77954700042

Contributors: Sorniotti, A.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Secure Multicast Communications

Multimedia Multicast on the Internet
2010 | Book
EID:

2-s2.0-84885545277

Contributors: Önen, M.; Molva, R.; Pannetrat, A.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

A provably secure Secret Handshake with dynamic controlled matching

IFIP Advances in Information and Communication Technology
2009 | Book
EID:

2-s2.0-78650911211

Contributors: Sorniotti, A.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Confidentiality and integrity for data aggregation in WSN using peer monitoring

Security and Communication Networks
2009 | Journal article
EID:

2-s2.0-67749118172

Contributors: Di Pietro, R.; Michiardi, P.; Molva, R.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier

Efficient access control for wireless sensor data

International Journal of Wireless Information Networks
2009 | Journal article
EID:

2-s2.0-68849099064

Contributors: Sorniotti, A.; Molva, R.; Gomez, L.; Trefois, C.; Laube, A.; Scaglioso, P.
Source: Self-asserted source
Refik Molva via Scopus - Elsevier
Items per page:
Page 1 of 3