M2M security: Challenges and solutions A Barki, A Bouabdallah, S Gharout, J Traoré IEEE Communications Surveys & Tutorials 18 (2), 1241-1254, 2016 | 152 | 2016 |
Remote electronic voting can be efficient, verifiable and coercion-resistant R Araújo, A Barki, S Brunet, J Traoré International Conference on Financial Cryptography and Data Security, 224-232, 2016 | 45 | 2016 |
Improved algebraic MACs and practical keyed-verification anonymous credentials A Barki, S Brunet, N Desmoulins, J Traoré International Conference on Selected Areas in Cryptography, 360-380, 2016 | 25 | 2016 |
Anonymous attestations made practical A Barki, N Desmoulins, S Gharout, J Traoré Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 16 | 2017 |
Achieving privacy and accountability in traceable digital currency A Barki, A Gouget Cryptology ePrint Archive, 2020 | 11 | 2020 |
Private eCash in Practice (Short Paper) A Barki, S Brunet, N Desmoulins, S Gambs, S Gharout, J Traoré International Conference on Financial Cryptography and Data Security, 99-109, 2016 | 10 | 2016 |
Method for anonymously identifying a security module A Barki, S Gharout, J Traore, L Coureau US Patent App. 15/778,482, 2018 | 6 | 2018 |
Revisiting security properties in single secret leader election A Barki, A Gouget, A Toulemonde 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-3, 2021 | 1 | 2021 |
Procédé d’authentification anonyme d’une carte SIM embarquée (eUICC) auprès d’un serveur de découverte A Barki, L Coureau, S Gharout, J Traoré | | 2015 |