Follow
Clementine Gritti
Clementine Gritti
Verified email at canterbury.ac.nz
Title
Cited by
Cited by
Year
Privacy-preserving delegable authentication in the internet of things
C Gritti, M Önen, R Molva
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 861-869, 2019
242019
Efficient dynamic provable data possession with public verifiability and data privacy
C Gritti, W Susilo, T Plantard
Australasian Conference on Information Security and Privacy, 395-412, 2015
232015
Device Identification and Personal Data Attestation in Networks.
C Gritti, M Önen, R Molva, W Susilo, T Plantard
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (4), 1-25, 2018
182018
Trustworthy, secure, and privacy-aware food monitoring enabled by blockchains and the IoT
C Stach, C Gritti, D Przytarski, B Mitschang
2020 IEEE International Conference on Pervasive Computing and Communications …, 2020
112020
Broadcast encryption with dealership
C Gritti, W Susilo, T Plantard, K Liang, DS Wong
International Journal of Information Security 15 (3), 271-283, 2016
112016
Chariot: Cloud-assisted access control for the internet of things
C Gritti, M Önen, R Molva
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018
102018
Bringing privacy control back to citizens: DISPEL---a distributed privacy management platform for the internet of things
C Stach, C Gritti, B Mitschang
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1272-1279, 2020
82020
How to provide high-utility time series data in a privacy-aware manner: A VAULT to manage time series data
C Stach, R Eichler, C Giebler, J Bräcker, C Gritti
International Journal on Advances in Security 13 (3), 2020
82020
Improvements in everlasting privacy: efficient and secure zero knowledge proofs
T Haines, C Gritti
International Joint Conference on Electronic Voting, 116-133, 2019
72019
Logarithmic size ring signatures without random oracles
C Gritti, W Susilo, T Plantard
IET Information Security 10 (1), 1-7, 2016
72016
Privacy-preserving encryption scheme using DNA parentage test
C Gritti, W Susilo, T Plantard, KT Win
Theoretical Computer Science 580, 1-13, 2015
72015
Empowering personal health records with cloud computing: How to encrypt with forthcoming fine-grained policies efficiently
C Gritti, W Susilo, T Plantard, K Liang, DS Wong
72014
Dynamic provable data possession protocols with public verifiability and data privacy
C Gritti, R Chen, W Susilo, T Plantard
International Conference on Information Security Practice and Experience …, 2017
62017
Improvements on efficient dynamic provable data possession scheme with public verifiability and data privacy
C Gritti, W Susilo, T Plantard, R Chen
Centre for Computer and Information Security Research, 1-19, 2014
62014
Lightweight secure bootstrap and message attestation in the Internet of Things
C Gritti, R Molva, M Önen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 775-782, 2018
52018
Certificate-based encryption with keyword search enabling secure authorization in electronic health record
C Gritti, W Susilo, T Plantard
52016
PSSST! The Privacy System for Smart Service Platforms: An Enabler for Confidable Smart Environments.
C Stach, F Steimle, C Gritti, B Mitschang
IoTBDS 19, 57-68, 2019
42019
A Blueprint for a Trustworthy Health Data Platform Encompassing IoT and Blockchain Technologies
D Przytarski, C Stach, C Gritti, B Mitschang
EPiC Series in Computing 76, 56-65, 2021
32021
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks
C Boyd, K Gjøsteen, C Gritti, T Haines
International Conference on Cryptology in India, 250-270, 2019
32019
Efficient file sharing in electronic health records
C Gritti, W Susilo, T Plantard
International Conference on Information Security Practice and Experience …, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20