abdullatif shikfa
abdullatif shikfa
Associate Professor, University of Doha for Science and Technology
Verified email at
Cited by
Cited by
Boolean symmetric searchable encryption
T Moataz, A Shikfa
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Privacy-preserving content-based publish/subscribe networks
A Shikfa, M Önen, R Molva
IFIP International Information Security Conference, 270-282, 2009
A Ciphertext-Policy Attribute-based Encryption Scheme With Optimized Ciphertext Size And Fast Decryption
QM Malluhi, A Shikfa, VC Trinh
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Privacy and confidentiality in context-based and epidemic forwarding
A Shikfa, M Önen, R Molva
Computer Communications 33 (13), 1493-1504, 2010
On The Limits of Privacy Provided by Order‐Preserving Encryption
V Kolesnikov, A Shikfa
Bell Labs Technical Journal 17 (3), 135-146, 2012
Privacy in content-based opportunistic networks
A Shikfa, M Onen, R Molva
2009 International Conference on Advanced Information Networking and …, 2009
A storage-efficient and robust private information retrieval scheme allowing few servers
D Augot, F Levy-dit-Vehel, A Shikfa
Cryptology and Network Security: 13th International Conference, CANS 2014 …, 2014
Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices
M Zubair, D Unal, A Al-Ali, A Shikfa
Proceedings of the 3rd International Conference on Future Networks and …, 2019
Cybersecurity Issues in Implanted Medical Devices
A Tabasum, Z Safi, W AlKhater, A Shikfa
2018 International Conference on Computer and Applications (ICCA), 1-9, 2018
The F_f-family of protocols for RFID-privacy and authentication
EO Blass, A Kurmus, R Molva, G Noubir, A Shikfa
IEEE Transactions on Dependable and Secure Computing 8 (3), 466-480, 2010
Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices
QM Malluhi, A Shikfa, VD Tran, VC Trinh
Computer Communications 145, 113-125, 2019
Privacy in context-based and epidemic forwarding
A Shikfa, M Onen, R Molva
2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009
Vulnerabilities and countermeasures in electrical substations
S Hussain, JH Fernandez, AK Al-Ali, A Shikfa
International Journal of Critical Infrastructure Protection 33, 100406, 2021
Optimistic fair exchange for secure forwarding
M Onen, A Shikfa, R Molva
2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems …, 2007
Securing Aggregate Queries for DNA Databases
M Nassar, Q Malluhi, M Atallah, A Shikfa
IEEE Transactions on Cloud Computing, 1-1, 2017
Semantic search over encrypted data
T Moataz, A Shikfa, N Cuppens-Boulahia, F Cuppens
ICT 2013, 1-5, 2013
Method and system to perform secure Boolean search over encrypted documents
T Moataz, A Shikfa
US Patent App. 10/095,719, 2018
Bootstrapping security associations in opportunistic networks
A Shikfa, M Önen, R Molva
2010 8th IEEE International Conference on Pervasive Computing and …, 2010
Systems and methods for enabling searchable encryption
A Shikfa, S Papillon
US Patent 9,135,454, 2015
Broker-based private matching
A Shikfa, M Önen, R Molva
International Symposium on Privacy Enhancing Technologies Symposium, 264-284, 2011
The system can't perform the operation now. Try again later.
Articles 1–20