ClouDedup: secure deduplication with encrypted data for cloud storage P Puzio, R Molva, M Önen, S Loureiro Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th …, 2013 | 257 | 2013 |
Privacy-preserving content-based publish/subscribe networks A Shikfa, M Önen, R Molva IFIP International Information Security Conference, 270-282, 2009 | 93 | 2009 |
PRISM–privacy-preserving search in MapReduce EO Blass, R Di Pietro, R Molva, M Önen Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012 | 86 | 2012 |
PerfectDedup: Secure Data Deduplication P Puzio, R Molva, M Önen, S Loureiro DPM, 2015 | 79 | 2015 |
Sok: Secure aggregation based on cryptographic schemes for federated learning M Mansouri, M Önen, WB Jaballah, M Conti Proc. Priv. Enhancing Technol, 140-157, 2023 | 78 | 2023 |
A-PPL: an accountability policy language M Azraoui, K Elkhiyaoui, M Önen, K Bernsmed, AS De Oliveira, J Sendor International Workshop on Data Privacy Management, 319-326, 2014 | 71 | 2014 |
Privacy and confidentiality in context-based and epidemic forwarding A Shikfa, M Önen, R Molva Computer Communications 33 (13), 1493-1504, 2010 | 64 | 2010 |
Safebook: A distributed privacy preserving online social network LA Cutillo, R Molva, M Önen 2011 IEEE International Symposium on a World of Wireless, Mobile and …, 2011 | 59 | 2011 |
Secure data aggregation with multiple encryption M Önen, R Molva Wireless Sensor Networks: 4th European Conference, EWSN 2007, Delft, The …, 2007 | 55 | 2007 |
Efficient Techniques for Publicly Verifiable Delegation of Computation K Elkhiyaoui, M Önen, M Azraoui, R Molva ACM ASIACCS, 2016 | 53 | 2016 |
Opportunistic networks C Boldrini, K Lee, M Önen, J Ott, E Pagani ELSEVIER SCIENCE BV, 2014 | 51 | 2014 |
PUDA - Privacy and unforgeability for data aggregation I Leontiadis, K Elkhiyaoui, M Önen, R Molva CANS, 2015 | 49 | 2015 |
Emotion-awareness for intelligent vehicle assistants: a research agenda HJ Vögel, C Süß, T Hubregtsen, V Ghaderi, R Chadowitz, E André, ... Proceedings of the 1st International Workshop on Software Engineering for AI …, 2018 | 48 | 2018 |
A leakage-abuse attack against multi-user searchable encryption C Van Rompay, R Molva, M Önen Proceedings on Privacy Enhancing Technologies 2017 (3), 168-178, 2017 | 48 | 2017 |
Multi-user searchable encryption in the cloud C Van Rompay, R Molva, M Önen Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015 | 47 | 2015 |
Stealthguard: Proofs of retrievability with hidden watchdogs M Azraoui, K Elkhiyaoui, R Molva, M Önen Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 45 | 2014 |
Privacy-preserving density-based clustering B Bozdemir, S Canard, O Ermis, H Möllering, M Önen, T Schneider Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 38 | 2021 |
Publicly Verifiable Conjunctive Keyword Search in Outsourced Databases M Azraoui, K Elkhiyaoui, M Önen, R Molva | 38 | 2015 |
Privacy in content-based opportunistic networks A Shikfa, M Önen, R Molva 2009 International Conference on Advanced Information Networking and …, 2009 | 38 | 2009 |
A security protocol for self-organizing data storage N Oualha, M Önen, Y Roudier Proceedings of The Ifip Tc 11 23 rd International Information Security …, 2008 | 38 | 2008 |