Follow
abdullatif shikfa
abdullatif shikfa
Assistant Professor, School of Information Technology and Business Management, College of the North
Verified email at cna-qatar.edu.qa
Title
Cited by
Cited by
Year
Boolean symmetric searchable encryption
T Moataz, A Shikfa
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
942013
Privacy-preserving content-based publish/subscribe networks
A Shikfa, M Önen, R Molva
IFIP International Information Security Conference, 270-282, 2009
932009
Privacy and confidentiality in context-based and epidemic forwarding
A Shikfa, M Önen, R Molva
Computer Communications 33 (13), 1493-1504, 2010
632010
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption
QM Malluhi, A Shikfa, VC Trinh
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
512017
On The Limits of Privacy Provided by Order‐Preserving Encryption
V Kolesnikov, A Shikfa
Bell Labs Technical Journal 17 (3), 135-146, 2012
372012
Privacy in content-based opportunistic networks
A Shikfa, M Onen, R Molva
2009 International Conference on Advanced Information Networking and …, 2009
372009
A storage-efficient and robust private information retrieval scheme allowing few servers
D Augot, F Levy-Dit-Vehel, A Shikfa
International Conference on Cryptology and Network Security, 222-239, 2014
292014
The F_f-family of protocols for RFID-privacy and authentication
EO Blass, A Kurmus, R Molva, G Noubir, A Shikfa
IEEE Transactions on Dependable and Secure Computing 8 (3), 466-480, 2010
292010
Privacy in context-based and epidemic forwarding
A Shikfa, M Onen, R Molva
2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009
262009
Optimistic fair exchange for secure forwarding
M Onen, A Shikfa, R Molva
2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems …, 2007
252007
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices
M Zubair, D Unal, A Al-Ali, A Shikfa
Proceedings of the 3rd International Conference on Future Networks and …, 2019
242019
Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices
QM Malluhi, A Shikfa, VD Tran, VC Trinh
Computer Communications 145, 113-125, 2019
232019
Method and system to perform secure Boolean search over encrypted documents
T Moataz, A Shikfa
US Patent App. 10/095,719, 2018
23*2018
Semantic search over encrypted data
T Moataz, A Shikfa, N Cuppens-Boulahia, F Cuppens
ICT 2013, 1-5, 2013
202013
Cybersecurity Issues in Implanted Medical Devices
A Tabasum, Z Safi, W AlKhater, A Shikfa
2018 International Conference on Computer and Applications (ICCA), 1-9, 2018
192018
Broker-based private matching
A Shikfa, M Önen, R Molva
International Symposium on Privacy Enhancing Technologies Symposium, 264-284, 2011
192011
Bootstrapping security associations in opportunistic networks
A Shikfa, M Önen, R Molva
2010 8th IEEE International Conference on Pervasive Computing and …, 2010
192010
Securing Aggregate Queries for DNA Databases
M Nassar, Q Malluhi, M Atallah, A Shikfa
IEEE Transactions on Cloud Computing, 1-1, 2017
182017
Systems and methods for enabling searchable encryption
A Shikfa, S Papillon
US Patent 9,135,454, 2015
162015
Local key management in opportunistic networks
A Shikfa, M Önen, R Molva
International Journal of Communication Networks and Distributed Systems 9 (1 …, 2012
142012
The system can't perform the operation now. Try again later.
Articles 1–20