Follow
Kaoutar Elkhiyaoui
Kaoutar Elkhiyaoui
IBM Research
Verified email at zurich.ibm.com
Title
Cited by
Cited by
Year
Tracker: Security and privacy for RFID-based supply chains
EO Blass, K Elkhiyaoui, R Molva
Cryptology ePrint Archive, 2010
882010
CHECKER: On-site checking in RFID-based supply chains
K Elkhiyaoui, EO Blass, R Molva
Proceedings of the fifth ACM conference on security and privacy in wireless …, 2012
692012
A-PPL: an accountability policy language
M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed, AS De Oliveira, J Sendor
International Workshop on Data Privacy Management, 319-326, 2014
682014
Privacy-preserving auditable token payments in a permissioned blockchain system
E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ...
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
642020
Private and dynamic time-series data aggregation with trust relaxation
I Leontiadis, K Elkhiyaoui, R Molva
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
642014
Efficient techniques for publicly verifiable delegation of computation
K Elkhiyaoui, M Önen, M Azraoui, R Molva
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
512016
Stealthguard: Proofs of retrievability with hidden watchdogs
M Azraoui, K Elkhiyaoui, R Molva, M Önen
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
452014
PUDA–privacy and unforgeability for data aggregation
I Leontiadis, K Elkhiyaoui, M Önen, R Molva
Cryptology and Network Security: 14th International Conference, CANS 2015 …, 2015
432015
Publicly verifiable conjunctive keyword search in outsourced databases
M Azraoui, K Elkhiyaoui, M Önen, R Molva
2015 IEEE conference on communications and network security (CNS), 619-627, 2015
362015
ROTIV: RFID ownership transfer with issuer verification
K Elkhiyaoui, EO Blass, R Molva
RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012
332012
Anonymous transactions with revocation and auditing in hyperledger fabric
D Bogatov, A De Caro, K Elkhiyaoui, B Tackmann
Cryptology and Network Security: 20th International Conference, CANS 2021 …, 2021
302021
A Cloud Accountability Policy Representation Framework.
W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ...
Closer, 489-498, 2014
232014
Message-locked proofs of retrievability with secure deduplication
D Vasilopoulos, M Önen, K Elkhiyaoui, R Molva
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 73-83, 2016
152016
Selective access to asset transfer data
K Elkhiyaoui, E Androulaki, A De Caro, M Dubovitskaya, JL Camenisch
US Patent 11,240,001, 2022
142022
Privacy preserving delegated word search in the cloud
K Elkhiyaoui, M Onen, R Molva
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-14, 2014
102014
Decentralized privacy-preserving netting protocol on blockchain for payment systems
S Cao, Y Yuan, A De Caro, K Nandakumar, K Elkhiyaoui, Y Hu
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
92020
POROS: proof of data reliability for outsourced storage
D Vasilopoulos, K Elkhiyaoui, R Molva, M Onen
Proceedings of the 6th International Workshop on Security in Cloud Computing …, 2018
72018
Dualdory: logarithmic-verifier linkable ring signatures through preprocessing
J Bootle, K Elkhiyaoui, J Hesse, Y Manevich
European Symposium on Research in Computer Security, 427-446, 2022
52022
From regulatory obligations to enforceable accountability policies in the Cloud
W Benghabrit, H Grall, JC Royer, M Sellami, M Azraoui, K Elkhiyaoui, ...
Cloud Computing and Services Sciences: International Conference in Cloud …, 2015
52015
A scalable interest-oriented peer-to-peer pub/sub network
D Kato, K Elkhiyaoui, K Kunieda, K Yamada, P Michiardi
Peer-to-Peer Networking and Applications 4, 165-177, 2011
52011
The system can't perform the operation now. Try again later.
Articles 1–20