Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Cédric Van Rompay
@incollection{DBLP:series/aise/GiordanoMOMACFLCMRB19, author = {Silvia Giordano and Victor Morel and Melek {\"{O}}nen and Mirco Musolesi and Davide Andreoletti and Felipe Cardoso and Alan Ferrari and Luca Luceri and Claude Castelluccia and Daniel Le M{\'{e}}tayer and C{\'{e}}dric Van Rompay and Benjamin Baron}, editor = {Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Antonio F. Skarmeta}, title = {UPRISE-IoT: User-Centric Privacy {\&} Security in the IoT}, booktitle = {Security and Privacy in the Internet of Things: Challenges and Solutions}, series = {Ambient Intelligence and Smart Environments}, volume = {27}, pages = {44--60}, publisher = {{IOS} Press}, year = {2019}, url = {https://doi.org/10.3233/AISE200004}, doi = {10.3233/AISE200004}, timestamp = {Wed, 13 May 2020 14:43:58 +0200}, biburl = {https://dblp.org/rec/series/aise/GiordanoMOMACFLCMRB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RompayMO18, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, editor = {Aziz Mohaisen and Qian Wang}, title = {Secure and Scalable Multi-User Searchable Encryption}, booktitle = {Proceedings of the 6th International Workshop on Security in Cloud Computing, SCC@AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}, pages = {15--25}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3201595.3201597}, doi = {10.1145/3201595.3201597}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RompayMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RompayO18, author = {C{\'{e}}dric Van Rompay and Melek {\"{O}}nen}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Breaking and Fixing the Security Proof of Garbled Bloom Filters}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {263--277}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_17}, doi = {10.1007/978-3-319-95729-6\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/RompayO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/RompayMO18, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {393--408}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_23}, doi = {10.1007/978-3-030-01950-1\_23}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/RompayMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RompayMO18, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, title = {Secure and Scalable Multi-User Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2018}, url = {http://eprint.iacr.org/2018/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RompayMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/RompayMO17, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, title = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {3}, pages = {168}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0034}, doi = {10.1515/POPETS-2017-0034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/RompayMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RompayMO17, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, title = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2017}, url = {http://eprint.iacr.org/2017/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RompayMO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/RompayMO15, author = {C{\'{e}}dric Van Rompay and Refik Molva and Melek {\"{O}}nen}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Multi-user Searchable Encryption in the Cloud}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {299--316}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_17}, doi = {10.1007/978-3-319-23318-5\_17}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/RompayMO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.