Clémentine Gritti

Orcid: 0000-0002-0835-8678

According to our database1, Clémentine Gritti authored at least 31 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023

Post-Quantum Authentication in the MQTT Protocol.
J. Cybersecur. Priv., July, 2023

Special Issue on Security and Privacy in Blockchains and the IoT Volume II.
Future Internet, 2023

Generic Blockchain on Generic Human Behavior.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Full Post-Quantum Datagram TLS Handshake in the Internet of Things.
Proceedings of the Codes, Cryptology and Information Security, 2023

2022
SMARTEN - A Sample-Based Approach towards Privacy-Friendly Data Refinement.
J. Cybersecur. Priv., August, 2022

A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022

Protecting Sensitive Data in the Information Age: State of the Art and Future Prospects.
Future Internet, 2022

Query Processing in Blockchain Systems: Current State and Future Challenges.
Future Internet, 2022

Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction.
IEEE Access, 2022

Can blockchains and data privacy laws be reconciled?: a fundamental study of how privacy-aware blockchains are feasible.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

2021
Practical and Scalable Access Control Mechanism for the Internet of Things.
IACR Cryptol. ePrint Arch., 2021

2020
Bringing privacy control back to citizens: DISPEL - a distributed privacy management platform for the internet of things.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Trustworthy, Secure, and Privacy-aware Food Monitoring Enabled by Blockchains and the IoT.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020

Publicly Verifiable Proofs of Data Replication and Retrievability for Cloud Storage.
Proceedings of the International Computer Symposium, 2020

2019
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2019

Privacy-preserving delegable authentication in the internet of things.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

PSSST! The Privacy System for Smart Service Platforms: An Enabler for Confidable Smart Environments.
Proceedings of the 4th International Conference on Internet of Things, 2019

A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

2018
Device Identification and Personal Data Attestation in Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

CHARIOT: Cloud-Assisted Access Control for the Internet of Things.
IACR Cryptol. ePrint Arch., 2018

Lightweight secure bootstrap and message attestation in the internet of things.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

2017
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy.
Proceedings of the Information Security Practice and Experience, 2017

2016
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record.
J. Internet Serv. Inf. Secur., 2016

Broadcast encryption with dealership.
Int. J. Inf. Sec., 2016

Logarithmic size ring signatures without random oracles.
IET Inf. Secur., 2016

2015
Privacy-preserving encryption scheme using DNA parentage test.
Theor. Comput. Sci., 2015

Efficient File Sharing in Electronic Health Records.
Proceedings of the Information Security Practice and Experience, 2015

Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

2013
CIL Security Proof for a Password-Based Key Exchange.
Proceedings of the Provable Security - 7th International Conference, 2013


  Loading...