Personal information

No personal information available

Activities

Works (30)

Vulnerabilities and countermeasures in electrical substations

International Journal of Critical Infrastructure Protection
2021 | Journal article
EID:

2-s2.0-85102061751

Part of ISSN: 18745482
Contributors: Hussain, S.; Hernandez Fernandez, J.; Al-Ali, A.K.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Application of artificial intelligence in electrical power systems

2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020
2020 | Conference paper
EID:

2-s2.0-85085491344

Contributors: Hussain, S.; Alammari, R.; Iqbal, A.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique

2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020
2020 | Conference paper
EID:

2-s2.0-85085493565

Contributors: Hussain, S.; Alammari, R.; Iqbal, A.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Private Function Evaluation Using Intel's SGX

Security and Communication Networks
2020 | Journal article
EID:

2-s2.0-85092205387

Part of ISSN: 19390122 19390114
Contributors: Selo, O.A.; Rachid, M.H.; Shikfa, A.; Wang, Y.; Malluhi, Q.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices

Computer Communications
2019 | Journal article
EID:

2-s2.0-85067996588

Part of ISSN: 1873703X 01403664
Contributors: Malluhi, Q.M.; Shikfa, A.; Tran, V.D.; Trinh, V.C.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Exploiting bluetooth vulnerabilities in e-health IoT devices

ACM International Conference Proceeding Series
2019 | Conference paper
EID:

2-s2.0-85072812050

Contributors: Zubair, M.; Unal, D.; Al-Ali, A.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Challenges and Mitigation of Cyber Threat in Automated Vehicle: An Integrated Approach

2018 International Conference of Electrical and Electronic Technologies for Automotive, AUTOMOTIVE 2018
2018 | Conference paper
EID:

2-s2.0-85056904948

Contributors: Al Mamun, A.; Abdullah Al Mamun, M.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Cybersecurity Issues in Implanted Medical Devices

2018 International Conference on Computer and Applications, ICCA 2018
2018 | Conference paper
EID:

2-s2.0-85054530212

Contributors: Tabasum, A.; Safi, Z.; Alkhater, W.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Smart Grid Cybersecurity: Standards and Technical Countermeasures

2018 International Conference on Computer and Applications, ICCA 2018
2018 | Conference paper
EID:

2-s2.0-85054480394

Contributors: Hussain, S.; Meraj, M.; Abughalwa, M.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Substring search over encrypted data

Journal of Computer Security
2018 | Journal article
EID:

2-s2.0-85037523453

Part of ISSN: 0926227X
Contributors: Moataz, T.; Ray, I.; Ray, I.; Shikfa, A.; Cuppens, F.; Cuppens, N.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption

ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
2017 | Conference paper
EID:

2-s2.0-85022085349

Contributors: Malluhi, Q.M.; Shikfa, A.; Trinh, V.C.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Securing Aggregate Queries for DNA Databases

IEEE Transactions on Cloud Computing
2017-03-15 | Journal article
Source: Self-asserted source
Abdullatif Shikfa

An efficient instance hiding scheme

ACM International Conference Proceeding Series
2016 | Conference paper
EID:

2-s2.0-85007518625

Contributors: Malluhi, Q.M.; Shikfa, A.; Trinh, V.C.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

A storage-efficient and robust private information retrieval scheme allowing few servers

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84911362777

Contributors: Augot, D.; Levy-Dit-Vehel, F.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Boolean symmetric searchable encryption

ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
2013 | Conference paper
EID:

2-s2.0-84877937985

Contributors: Moataz, T.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Searchable encryption supporting general boolean expression queries

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84883299847

Contributors: Moataz, T.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Semantic search over encrypted data

2013 20th International Conference on Telecommunications, ICT 2013
2013 | Conference paper
EID:

2-s2.0-84898945995

Contributors: Moataz, T.; Shikfa, A.; Cuppens-Boulahia, N.; Cuppens, F.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Efficient verification of input consistency in server-assisted secure function evaluation

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84872717205

Contributors: Kolesnikov, V.; Kumaresan, R.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Local key management in opportunistic networks

International Journal of Communication Networks and Distributed Systems
2012 | Journal article
EID:

2-s2.0-84870180541

Contributors: Shikfa, A.; Önen, M.; Molva, R.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

On the limits of privacy provided by order-preserving encryption

Bell Labs Technical Journal
2012 | Journal article
EID:

2-s2.0-84871817029

Contributors: Kolesnikov, V.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Broker-based private matching

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2011 | Book
EID:

2-s2.0-79961188847

Contributors: Shikfa, A.; Önen, M.; Molva, R.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Security challenges in opportunistic communication

2011 IEEE GCC Conference and Exhibition, GCC 2011
2011 | Conference paper
EID:

2-s2.0-79958001385

Contributors: Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

The F<inf>f</inf>-family of protocols for RFID-privacy and authentication

IEEE Transactions on Dependable and Secure Computing
2011 | Journal article
EID:

2-s2.0-79952969303

Contributors: Blass, E.-O.; Kurmus, A.; Molva, R.; Noubir, G.; Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Privacy and confidentiality in context-based and epidemic forwarding

Computer Communications
2010 | Journal article
EID:

2-s2.0-77955306864

Contributors: Shikfa, A.; Önen, M.; Molva, R.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Security issues in opportunistic networks

2nd International Workshop on Mobile Opportunistic Networking, MobiOpp 2010
2010 | Conference paper
EID:

2-s2.0-77952924570

Contributors: Shikfa, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Privacy in content-based opportunistic networks

Proceedings - International Conference on Advanced Information Networking and Applications, AINA
2009 | Conference paper
EID:

2-s2.0-70350117803

Contributors: Shikfa, A.; Önen, M.; Molva, R.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Privacy in context-based and epidemic forwarding

2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks and Workshops, WOWMOM 2009
2009 | Conference paper
EID:

2-s2.0-74349116503

Contributors: Shikfa, A.; Önen, M.; Molva, R.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Privacy-preserving content-based publish/subscribe networks

IFIP Advances in Information and Communication Technology
2009 | Book
EID:

2-s2.0-84885059952

Contributors: Shikfa, A.; Önen, M.; Molva, R.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

Optimistic fair exchange for secure forwarding

Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2007
2007 | Conference paper
EID:

2-s2.0-50249134427

Contributors: Önen, M.; Shikfa, A.; Molva, R.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier

User profile management in converged networks (episode 11): "Share your data, keep your secrets"

2nd Biennial Conference on Innovative Data Systems Research, CIDR 2005
2005 | Conference paper
EID:

2-s2.0-33646700208

Contributors: Sahuguet, A.; Alexe, B.; Fundulaki, I.; Laligand, P.-Y.; Shikfa, A.; Arnail, A.
Source: Self-asserted source
Abdullatif Shikfa via Scopus - Elsevier