Kaoutar Elkhiyaoui
Kaoutar Elkhiyaoui
IBM Research
Verified email at
Cited by
Cited by
Tracker: Security and privacy for RFID-based supply chains
EO Blass, K Elkhiyaoui, R Molva
Cryptology ePrint Archive, 2010
CHECKER: On-site checking in RFID-based supply chains
K Elkhiyaoui, EO Blass, R Molva
Proceedings of the fifth ACM conference on security and privacy in wireless …, 2012
A-PPL: an accountability policy language
M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed, AS De Oliveira, J Sendor
International Workshop on Data Privacy Management, 319-326, 2014
Privacy-preserving auditable token payments in a permissioned blockchain system
E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ...
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
Private and dynamic time-series data aggregation with trust relaxation
I Leontiadis, K Elkhiyaoui, R Molva
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
Efficient techniques for publicly verifiable delegation of computation
K Elkhiyaoui, M Önen, M Azraoui, R Molva
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
Stealthguard: Proofs of retrievability with hidden watchdogs
M Azraoui, K Elkhiyaoui, R Molva, M Önen
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
PUDA–privacy and unforgeability for data aggregation
I Leontiadis, K Elkhiyaoui, M Önen, R Molva
Cryptology and Network Security: 14th International Conference, CANS 2015 …, 2015
Publicly verifiable conjunctive keyword search in outsourced databases
M Azraoui, K Elkhiyaoui, M Önen, R Molva
2015 IEEE conference on communications and network security (CNS), 619-627, 2015
ROTIV: RFID ownership transfer with issuer verification
K Elkhiyaoui, EO Blass, R Molva
RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012
Anonymous transactions with revocation and auditing in hyperledger fabric
D Bogatov, A De Caro, K Elkhiyaoui, B Tackmann
Cryptology and Network Security: 20th International Conference, CANS 2021 …, 2021
A Cloud Accountability Policy Representation Framework.
W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ...
Closer, 489-498, 2014
Message-locked proofs of retrievability with secure deduplication
D Vasilopoulos, M Önen, K Elkhiyaoui, R Molva
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 73-83, 2016
Selective access to asset transfer data
K Elkhiyaoui, E Androulaki, A De Caro, M Dubovitskaya, JL Camenisch
US Patent 11,240,001, 2022
Privacy preserving delegated word search in the cloud
K Elkhiyaoui, M Onen, R Molva
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-14, 2014
Decentralized privacy-preserving netting protocol on blockchain for payment systems
S Cao, Y Yuan, A De Caro, K Nandakumar, K Elkhiyaoui, Y Hu
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
POROS: proof of data reliability for outsourced storage
D Vasilopoulos, K Elkhiyaoui, R Molva, M Onen
Proceedings of the 6th International Workshop on Security in Cloud Computing …, 2018
Dualdory: logarithmic-verifier linkable ring signatures through preprocessing
J Bootle, K Elkhiyaoui, J Hesse, Y Manevich
European Symposium on Research in Computer Security, 427-446, 2022
From regulatory obligations to enforceable accountability policies in the Cloud
W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ...
Cloud Computing and Services Sciences: International Conference in Cloud …, 2015
A scalable interest-oriented peer-to-peer pub/sub network
D Kato, K Elkhiyaoui, K Kunieda, K Yamada, P Michiardi
Peer-to-Peer Networking and Applications 4, 165-177, 2011
The system can't perform the operation now. Try again later.
Articles 1–20