default search action
Abdullatif Shikfa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Muhammad Ali Akbar, Abdullatif Shikfa, Bo Wang, Amine Bermak:
Self-Checking Hardware Design for Montgomery Exponentiation-Based Cryptography. IEEE Access 12: 119915-119926 (2024) - 2021
- [j9]Shahbaz Hussain, Javier Hernandez Fernandez, Abdulla Khalid Al-Ali, Abdullatif Shikfa:
Vulnerabilities and countermeasures in electrical substations. Int. J. Crit. Infrastructure Prot. 33: 100406 (2021) - 2020
- [j8]Omar Abou Selo, Maan Haj Rachid, Abdullatif Shikfa, Yongge Wang, Qutaibah M. Malluhi:
Private Function Evaluation Using Intel's SGX. Secur. Commun. Networks 2020: 3042642:1-3042642:10 (2020) - [c20]Shahbaz Hussain, Rashid Alammari, Atif Iqbal, Abdullatif Shikfa:
Application of artificial intelligence in electrical power systems. ICIoT 2020: 13-17 - [c19]Shahbaz Hussain, Rashid Alammari, Atif Iqbal, Abdullatif Shikfa:
Optimal sizing of a stand-alone hybrid PV-WT-BT system using artificial intelligence based technique. ICIoT 2020: 55-60
2010 – 2019
- 2019
- [j7]Qutaibah M. Malluhi, Abdullatif Shikfa, Vinh Duc Tran, Viet Cuong Trinh:
Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices. Comput. Commun. 145: 113-125 (2019) - [j6]Mohamed Nassar, Qutaibah M. Malluhi, Mikhail J. Atallah, Abdullatif Shikfa:
Securing Aggregate Queries for DNA Databases. IEEE Trans. Cloud Comput. 7(3): 827-837 (2019) - [c18]Mohammed Zubair, Devrim Unal, Abdulla K. Al-Ali, Abdullatif Shikfa:
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices. ICFNDS 2019: 10:1-10:7 - 2018
- [j5]Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. J. Comput. Secur. 26(1): 1-30 (2018) - [c17]Aliya Tabasum, Zeineb Safi, Wadha Al-Khater, Abdullatif Shikfa:
Cybersecurity Issues in Implanted Medical Devices. ICCA 2018: 110-115 - [c16]Shahbaz Hussain, Mohammad Meraj, Monir Abughalwa, Abdullatif Shikfa:
Smart Grid Cybersecurity: Standards and Technical Countermeasures. ICCA 2018: 136-140 - 2017
- [c15]Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh:
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption. AsiaCCS 2017: 230-240 - 2016
- [c14]Qutaibah M. Malluhi, Abdullatif Shikfa, Viet Cuong Trinh:
An efficient instance hiding scheme. SoICT 2016: 388-395 - 2014
- [c13]Daniel Augot, Françoise Levy-dit-Vehel, Abdullatif Shikfa:
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers. CANS 2014: 222-239 - [i2]Daniel Augot, Françoise Levy-dit-Vehel, Abdullatif Shikfa:
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers. CoRR abs/1412.5012 (2014) - 2013
- [c12]Tarik Moataz, Abdullatif Shikfa:
Boolean symmetric searchable encryption. AsiaCCS 2013: 265-276 - [c11]Tarik Moataz, Abdullatif Shikfa:
Searchable Encryption Supporting General Boolean Expression Queries. Financial Cryptography 2013: 401 - [c10]Tarik Moataz, Abdullatif Shikfa, Nora Cuppens-Boulahia, Frédéric Cuppens:
Semantic search over encrypted data. ICT 2013: 1-5 - 2012
- [j4]Vladimir Kolesnikov, Abdullatif Shikfa:
On The Limits of Privacy Provided by Order-Preserving Encryption. Bell Labs Tech. J. 17(3): 135-146 (2012) - [j3]Abdullatif Shikfa, Melek Önen, Refik Molva:
Local key management in opportunistic networks. Int. J. Commun. Networks Distributed Syst. 9(1/2): 97-116 (2012) - [c9]Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa:
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation. CANS 2012: 201-217 - 2011
- [j2]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa:
The F_f-Family of Protocols for RFID-Privacy and Authentication. IEEE Trans. Dependable Secur. Comput. 8(3): 466-480 (2011) - [c8]Abdullatif Shikfa, Melek Önen, Refik Molva:
Broker-Based Private Matching. PETS 2011: 264-284 - 2010
- [j1]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy and confidentiality in context-based and epidemic forwarding. Comput. Commun. 33(13): 1493-1504 (2010) - [c7]Abdullatif Shikfa:
Security issues in opportunistic networks. MobiOpp 2010: 215-216 - [c6]Abdullatif Shikfa, Melek Önen, Refik Molva:
Bootstrapping security associations in opportunistic networks. PerCom Workshops 2010: 147-152
2000 – 2009
- 2009
- [c5]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy in Content-Based Opportunistic Networks. AINA Workshops 2009: 832-837 - [c4]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy-Preserving Content-Based Publish/Subscribe Networks. SEC 2009: 270-282 - [c3]Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy in context-based and epidemic forwarding. WOWMOM 2009: 1-7 - 2008
- [i1]Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa:
The Ff-Family of Protocols for RFID-Privacy and Authentication. IACR Cryptol. ePrint Arch. 2008: 476 (2008) - 2007
- [c2]Melek Önen, Abdullatif Shikfa, Refik Molva:
Optimistic fair exchange for secure forwarding. MobiQuitous 2007: 1-5 - 2005
- [c1]Arnaud Sahuguet, Bogdan Alexe, Irini Fundulaki, Pierre-Yves Lalilgand, Abdullatif Shikfa, Antoine Arnail:
User Profile Management in Converged Networks (Episode II): "Share your Data, Keep your Secrets". CIDR 2005: 200-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint