Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Clémentine Gritti
@article{DBLP:journals/csur/BuserDEGKKLLPSSY23, author = {Maxime Buser and Rafael Dowsley and Muhammed F. Esgin and Cl{\'{e}}mentine Gritti and Shabnam Kasra Kermanshahi and Veronika Kuchta and Jason T. LeGrow and Joseph K. Liu and Rapha{\"{e}}l C.{-}W. Phan and Amin Sakzad and Ron Steinfeld and Jiangshan Yu}, title = {A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {12}, pages = {251:1--251:32}, year = {2023}, url = {https://doi.org/10.1145/3572771}, doi = {10.1145/3572771}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BuserDEGKKLLPSSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/StachG23, author = {Christoph Stach and Cl{\'{e}}mentine Gritti}, title = {Special Issue on Security and Privacy in Blockchains and the IoT Volume {II}}, journal = {Future Internet}, volume = {15}, number = {8}, pages = {272}, year = {2023}, url = {https://doi.org/10.3390/fi15080272}, doi = {10.3390/FI15080272}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/StachG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/SamandariG23, author = {Juliet Samandari and Cl{\'{e}}mentine Gritti}, title = {Post-Quantum Authentication in the {MQTT} Protocol}, journal = {J. Cybersecur. Priv.}, volume = {3}, number = {3}, pages = {416--434}, year = {2023}, url = {https://doi.org/10.3390/jcp3030021}, doi = {10.3390/JCP3030021}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/SamandariG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/McLoughlinGS23, author = {Callum McLoughlin and Cl{\'{e}}mentine Gritti and Juliet Samandari}, editor = {Said El Hajji and Sihem Mesnager and El Mamoun Souidi}, title = {Full Post-Quantum Datagram {TLS} Handshake in the Internet of Things}, booktitle = {Codes, Cryptology and Information Security - 4th International Conference, {C2SI} 2023, Rabat, Morocco, May 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13874}, pages = {57--76}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33017-9\_4}, doi = {10.1007/978-3-031-33017-9\_4}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c2si/McLoughlinGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GrittiH023, author = {Cl{\'{e}}mentine Gritti and Fr{\'{e}}d{\'{e}}ric A. Hayek and Pascal Lafourcade}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Generic Blockchain on Generic Human Behavior}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {206--217}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012091700003555}, doi = {10.5220/0012091700003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GrittiH023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MamunAG22, author = {Abdullah Al Mamun and Sami Azam and Cl{\'{e}}mentine Gritti}, title = {Blockchain-Based Electronic Health Records Management: {A} Comprehensive Review and Future Research Direction}, journal = {{IEEE} Access}, volume = {10}, pages = {5768--5789}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3141079}, doi = {10.1109/ACCESS.2022.3141079}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MamunAG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/PrzytarskiSGM22, author = {Dennis Przytarski and Christoph Stach and Cl{\'{e}}mentine Gritti and Bernhard Mitschang}, title = {Query Processing in Blockchain Systems: Current State and Future Challenges}, journal = {Future Internet}, volume = {14}, number = {1}, pages = {1}, year = {2022}, url = {https://doi.org/10.3390/fi14010001}, doi = {10.3390/FI14010001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/PrzytarskiSGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/StachGBBM22, author = {Christoph Stach and Cl{\'{e}}mentine Gritti and Julia Br{\"{a}}cker and Michael Behringer and Bernhard Mitschang}, title = {Protecting Sensitive Data in the Information Age: State of the Art and Future Prospects}, journal = {Future Internet}, volume = {14}, number = {11}, pages = {302}, year = {2022}, url = {https://doi.org/10.3390/fi14110302}, doi = {10.3390/FI14110302}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/StachGBBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocsap/StachBBGM22, author = {Christoph Stach and Michael Behringer and Julia Br{\"{a}}cker and Cl{\'{e}}mentine Gritti and Bernhard Mitschang}, title = {{SMARTEN} - {A} Sample-Based Approach towards Privacy-Friendly Data Refinement}, journal = {J. Cybersecur. Priv.}, volume = {2}, number = {3}, pages = {606--628}, year = {2022}, url = {https://doi.org/10.3390/jcp2030031}, doi = {10.3390/JCP2030031}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocsap/StachBBGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/StachGPM22, author = {Christoph Stach and Cl{\'{e}}mentine Gritti and Dennis Przytarski and Bernhard Mitschang}, editor = {Jiman Hong and Miroslav Bures and Juw Won Park and Tom{\'{a}}s Cern{\'{y}}}, title = {Can blockchains and data privacy laws be reconciled?: a fundamental study of how privacy-aware blockchains are feasible}, booktitle = {{SAC} '22: The 37th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, April 25 - 29, 2022}, pages = {1218--1227}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3477314.3506986}, doi = {10.1145/3477314.3506986}, timestamp = {Wed, 11 May 2022 08:59:01 +0200}, biburl = {https://dblp.org/rec/conf/sac/StachGPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuserDEGKKLLPSS22, author = {Maxime Buser and Rafael Dowsley and Muhammed F. Esgin and Cl{\'{e}}mentine Gritti and Shabnam Kasra Kermanshahi and Veronika Kuchta and Jason T. LeGrow and Joseph K. Liu and Raphael C.{-}W. Phan and Amin Sakzad and Ron Steinfeld and Jiangshan Yu}, title = {A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges {\&} Research Directions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1151}, year = {2022}, url = {https://eprint.iacr.org/2022/1151}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BuserDEGKKLLPSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrittiRS21, author = {Cl{\'{e}}mentine Gritti and Emanuel Regnath and Sebastian Steinhorst}, title = {Practical and Scalable Access Control Mechanism for the Internet of Things}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2021}, url = {https://eprint.iacr.org/2021/140}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GrittiRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intcompsymp/Gritti20, author = {Cl{\'{e}}mentine Gritti}, title = {Publicly Verifiable Proofs of Data Replication and Retrievability for Cloud Storage}, booktitle = {International Computer Symposium, {ICS} 2020, Tainan, Taiwan, December 17-19, 2020}, pages = {431--436}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICS51289.2020.00091}, doi = {10.1109/ICS51289.2020.00091}, timestamp = {Wed, 03 Mar 2021 13:05:39 +0100}, biburl = {https://dblp.org/rec/conf/intcompsymp/Gritti20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/StachGPM20, author = {Christoph Stach and Cl{\'{e}}mentine Gritti and Dennis Przytarski and Bernhard Mitschang}, title = {Trustworthy, Secure, and Privacy-aware Food Monitoring Enabled by Blockchains and the IoT}, booktitle = {2020 {IEEE} International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2020, Austin, TX, USA, March 23-27, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/PerComWorkshops48775.2020.9156150}, doi = {10.1109/PERCOMWORKSHOPS48775.2020.9156150}, timestamp = {Wed, 12 Aug 2020 11:55:59 +0200}, biburl = {https://dblp.org/rec/conf/percom/StachGPM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/StachGM20, author = {Christoph Stach and Cl{\'{e}}mentine Gritti and Bernhard Mitschang}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {Bringing privacy control back to citizens: {DISPEL} - a distributed privacy management platform for the internet of things}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {1272--1279}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3375754}, doi = {10.1145/3341105.3375754}, timestamp = {Thu, 02 Apr 2020 17:08:04 +0200}, biburl = {https://dblp.org/rec/conf/sac/StachGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BoydGGH19, author = {Colin Boyd and Kristian Gj{\o}steen and Cl{\'{e}}mentine Gritti and Thomas Haines}, editor = {Feng Hao and Sushmita Ruj and Sourav Sen Gupta}, title = {A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11898}, pages = {250--270}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35423-7\_13}, doi = {10.1007/978-3-030-35423-7\_13}, timestamp = {Wed, 20 Mar 2024 15:23:22 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/BoydGGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/StachSGM19, author = {Christoph Stach and Frank Steimle and Cl{\'{e}}mentine Gritti and Bernhard Mitschang}, editor = {Muthu Ramachandran and Robert John Walters and Gary B. Wills and V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Victor Chang}, title = {PSSST! The Privacy System for Smart Service Platforms: An Enabler for Confidable Smart Environments}, booktitle = {Proceedings of the 4th International Conference on Internet of Things, Big Data and Security, IoTBDS 2019, Heraklion, Crete, Greece, May 2-4, 2019}, pages = {57--68}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007672900570068}, doi = {10.5220/0007672900570068}, timestamp = {Tue, 29 Sep 2020 09:39:42 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/StachSGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/GrittiOM19, author = {Cl{\'{e}}mentine Gritti and Melek {\"{O}}nen and Refik Molva}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {Privacy-preserving delegable authentication in the internet of things}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {861--869}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297365}, doi = {10.1145/3297280.3297365}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/GrittiOM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/HainesG19, author = {Thomas Haines and Cl{\'{e}}mentine Gritti}, editor = {Robert Krimmer and Melanie Volkamer and V{\'{e}}ronique Cortier and Bernhard Beckert and Ralf K{\"{u}}sters and Uwe Serd{\"{u}}lt and David Duenas{-}Cid}, title = {Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs}, booktitle = {Electronic Voting - 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11759}, pages = {116--133}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30625-0\_8}, doi = {10.1007/978-3-030-30625-0\_8}, timestamp = {Sun, 02 Oct 2022 16:16:57 +0200}, biburl = {https://dblp.org/rec/conf/voteid/HainesG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HainesG19, author = {Thomas Haines and Cl{\'{e}}mentine Gritti}, title = {Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {901}, year = {2019}, url = {https://eprint.iacr.org/2019/901}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HainesG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GrittiOMSP18, author = {Cl{\'{e}}mentine Gritti and Melek {\"{O}}nen and Refik Molva and Willy Susilo and Thomas Plantard}, title = {Device Identification and Personal Data Attestation in Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {4}, pages = {1--25}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.12.31.001}, doi = {10.22667/JOWUA.2018.12.31.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GrittiOMSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/GrittiOM18, author = {Cl{\'{e}}mentine Gritti and Melek {\"{O}}nen and Refik Molva}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {{CHARIOT:} Cloud-Assisted Access Control for the Internet of Things}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514217}, doi = {10.1109/PST.2018.8514217}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/GrittiOM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/GrittiMO18, author = {Cl{\'{e}}mentine Gritti and Refik Molva and Melek {\"{O}}nen}, editor = {Hisham M. Haddad and Roger L. Wainwright and Richard Chbeir}, title = {Lightweight secure bootstrap and message attestation in the internet of things}, booktitle = {Proceedings of the 33rd Annual {ACM} Symposium on Applied Computing, {SAC} 2018, Pau, France, April 09-13, 2018}, pages = {775--782}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3167132.3167218}, doi = {10.1145/3167132.3167218}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/GrittiMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrittiOM18, author = {Cl{\'{e}}mentine Gritti and Melek {\"{O}}nen and Refik Molva}, title = {{CHARIOT:} Cloud-Assisted Access Control for the Internet of Things}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2018}, url = {https://eprint.iacr.org/2018/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrittiOM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GrittiCSP17, author = {Cl{\'{e}}mentine Gritti and Rongmao Chen and Willy Susilo and Thomas Plantard}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {485--505}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_29}, doi = {10.1007/978-3-319-72359-4\_29}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GrittiCSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-08434, author = {Cl{\'{e}}mentine Gritti and Rongmao Chen and Willy Susilo and Thomas Plantard}, title = {Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy}, journal = {CoRR}, volume = {abs/1709.08434}, year = {2017}, url = {http://arxiv.org/abs/1709.08434}, eprinttype = {arXiv}, eprint = {1709.08434}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-08434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/GrittiSP16, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard}, title = {Logarithmic size ring signatures without random oracles}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {1}, pages = {1--7}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2014.0428}, doi = {10.1049/IET-IFS.2014.0428}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/GrittiSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GrittiSPLW16, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard and Kaitai Liang and Duncan S. Wong}, title = {Broadcast encryption with dealership}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {3}, pages = {271--283}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0285-x}, doi = {10.1007/S10207-015-0285-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/GrittiSPLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/GrittiSP16, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard}, title = {Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record}, journal = {J. Internet Serv. Inf. Secur.}, volume = {6}, number = {4}, pages = {1--34}, year = {2016}, url = {https://doi.org/10.22667/JISIS.2016.11.31.001}, doi = {10.22667/JISIS.2016.11.31.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/GrittiSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/GrittiSPW15, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard and Khin Than Win}, title = {Privacy-preserving encryption scheme using {DNA} parentage test}, journal = {Theor. Comput. Sci.}, volume = {580}, pages = {1--13}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2015.02.021}, doi = {10.1016/J.TCS.2015.02.021}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/GrittiSPW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GrittiSP15, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard}, editor = {Ernest Foo and Douglas Stebila}, title = {Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {395--412}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_23}, doi = {10.1007/978-3-319-19962-7\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GrittiSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GrittiSP15, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Efficient File Sharing in Electronic Health Records}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {499--513}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_34}, doi = {10.1007/978-3-319-17533-1\_34}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/GrittiSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GrittiSPLW14, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard and Kaitai Liang and Duncan S. Wong}, title = {Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {3--28}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.003}, doi = {10.22667/JOWUA.2014.12.31.003}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GrittiSPLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/EneGL13, author = {Cristian Ene and Cl{\'{e}}mentine Gritti and Yassine Lakhnech}, editor = {Willy Susilo and Reza Reyhanitabar}, title = {{CIL} Security Proof for a Password-Based Key Exchange}, booktitle = {Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8209}, pages = {59--85}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41227-1\_4}, doi = {10.1007/978-3-642-41227-1\_4}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/EneGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.