scispace - formally typeset
R

Refik Molva

Researcher at Institut Eurécom

Publications -  158
Citations -  6880

Refik Molva is an academic researcher from Institut Eurécom. The author has contributed to research in topics: Encryption & Authentication. The author has an hindex of 36, co-authored 158 publications receiving 6649 citations. Previous affiliations of Refik Molva include IBM.

Papers
More filters
Book ChapterDOI

Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks

TL;DR: A generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior is suggested and can be smoothly extended to basic network functions with little impact on existing protocols.
Journal ArticleDOI

Safebook: A privacy-preserving online social network leveraging on real-life trust

TL;DR: Safebook as discussed by the authors is a decentralized and privacy-preserving online social network application based on the two design principles, decentralization and exploiting real-life trust, various mechanisms for privacy and security are integrated into Safebook in order to provide data storage and data management functions that preserve users privacy, data integrity, and availability.
Patent

Authentication method and system with a smartcard

TL;DR: In this paper, the authors proposed a smartcard-based authentication technique using a smart card that encrypts the time displayed on the card with a secret, cryptographically strong key.
Book ChapterDOI

Systematic Design of Two-Party Authentication Protocols

TL;DR: A new authenticated exchange protocol is presented which is both provably secure and highly efficient and practical, and prevents chosen plaintext or ciphertext attacks on the cryptosystem.
Book ChapterDOI

Security in ad hoc networks

TL;DR: A survey of current research activities dealing with routing security, cooperation enforcement and key management in wireless ad hoc networks finds that existing solutions seem to only partially address the threats and fall short of providing a comprehensive answer.