default search action
Clémentine Gritti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Riccardo Taiello, Melek Önen, Clémentine Gritti, Marco Lorenzi:
Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Stragglers. ARES 2024: 13:1-13:12 - [c18]Clémentine Gritti:
OASIS: An Organizational CertificateLess Aggregate Signature Scheme in Distributed Networks for IoT. SAC 2024: 1341-1349 - [c17]Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst:
MATRaCAE: Time-Based Revocable Access Control in the IoT. SECRYPT 2024: 274-285 - [i6]Riccardo Taiello, Melek Önen, Clémentine Gritti, Marco Lorenzi:
Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to Client Stragglers. IACR Cryptol. ePrint Arch. 2024: 942 (2024) - 2023
- [j13]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphaël C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu:
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions. ACM Comput. Surv. 55(12): 251:1-251:32 (2023) - [j12]Christoph Stach, Clémentine Gritti:
Special Issue on Security and Privacy in Blockchains and the IoT Volume II. Future Internet 15(8): 272 (2023) - [j11]Juliet Samandari, Clémentine Gritti:
Post-Quantum Authentication in the MQTT Protocol. J. Cybersecur. Priv. 3(3): 416-434 (2023) - [c16]Callum McLoughlin, Clémentine Gritti, Juliet Samandari:
Full Post-Quantum Datagram TLS Handshake in the Internet of Things. C2SI 2023: 57-76 - [c15]Clémentine Gritti, Frédéric A. Hayek, Pascal Lafourcade:
Generic Blockchain on Generic Human Behavior. SECRYPT 2023: 206-217 - 2022
- [j10]Abdullah Al Mamun, Sami Azam, Clémentine Gritti:
Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction. IEEE Access 10: 5768-5789 (2022) - [j9]Dennis Przytarski, Christoph Stach, Clémentine Gritti, Bernhard Mitschang:
Query Processing in Blockchain Systems: Current State and Future Challenges. Future Internet 14(1): 1 (2022) - [j8]Christoph Stach, Clémentine Gritti, Julia Bräcker, Michael Behringer, Bernhard Mitschang:
Protecting Sensitive Data in the Information Age: State of the Art and Future Prospects. Future Internet 14(11): 302 (2022) - [j7]Christoph Stach, Michael Behringer, Julia Bräcker, Clémentine Gritti, Bernhard Mitschang:
SMARTEN - A Sample-Based Approach towards Privacy-Friendly Data Refinement. J. Cybersecur. Priv. 2(3): 606-628 (2022) - [c14]Christoph Stach, Clémentine Gritti, Dennis Przytarski, Bernhard Mitschang:
Can blockchains and data privacy laws be reconciled?: a fundamental study of how privacy-aware blockchains are feasible. SAC 2022: 1218-1227 - [i5]Maxime Buser, Rafael Dowsley, Muhammed F. Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Jason T. LeGrow, Joseph K. Liu, Raphael C.-W. Phan, Amin Sakzad, Ron Steinfeld, Jiangshan Yu:
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions. IACR Cryptol. ePrint Arch. 2022: 1151 (2022) - 2021
- [i4]Clémentine Gritti, Emanuel Regnath, Sebastian Steinhorst:
Practical and Scalable Access Control Mechanism for the Internet of Things. IACR Cryptol. ePrint Arch. 2021: 140 (2021) - 2020
- [c13]Clémentine Gritti:
Publicly Verifiable Proofs of Data Replication and Retrievability for Cloud Storage. ICS 2020: 431-436 - [c12]Christoph Stach, Clémentine Gritti, Dennis Przytarski, Bernhard Mitschang:
Trustworthy, Secure, and Privacy-aware Food Monitoring Enabled by Blockchains and the IoT. PerCom Workshops 2020: 1-4 - [c11]Christoph Stach, Clémentine Gritti, Bernhard Mitschang:
Bringing privacy control back to citizens: DISPEL - a distributed privacy management platform for the internet of things. SAC 2020: 1272-1279
2010 – 2019
- 2019
- [c10]Colin Boyd, Kristian Gjøsteen, Clémentine Gritti, Thomas Haines:
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. INDOCRYPT 2019: 250-270 - [c9]Christoph Stach, Frank Steimle, Clémentine Gritti, Bernhard Mitschang:
PSSST! The Privacy System for Smart Service Platforms: An Enabler for Confidable Smart Environments. IoTBDS 2019: 57-68 - [c8]Clémentine Gritti, Melek Önen, Refik Molva:
Privacy-preserving delegable authentication in the internet of things. SAC 2019: 861-869 - [c7]Thomas Haines, Clémentine Gritti:
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs. E-VOTE-ID 2019: 116-133 - [i3]Thomas Haines, Clémentine Gritti:
Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs. IACR Cryptol. ePrint Arch. 2019: 901 (2019) - 2018
- [j6]Clémentine Gritti, Melek Önen, Refik Molva, Willy Susilo, Thomas Plantard:
Device Identification and Personal Data Attestation in Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(4): 1-25 (2018) - [c6]Clémentine Gritti, Melek Önen, Refik Molva:
CHARIOT: Cloud-Assisted Access Control for the Internet of Things. PST 2018: 1-6 - [c5]Clémentine Gritti, Refik Molva, Melek Önen:
Lightweight secure bootstrap and message attestation in the internet of things. SAC 2018: 775-782 - [i2]Clémentine Gritti, Melek Önen, Refik Molva:
CHARIOT: Cloud-Assisted Access Control for the Internet of Things. IACR Cryptol. ePrint Arch. 2018: 632 (2018) - 2017
- [c4]Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard:
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. ISPEC 2017: 485-505 - [i1]Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard:
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. CoRR abs/1709.08434 (2017) - 2016
- [j5]Clémentine Gritti, Willy Susilo, Thomas Plantard:
Logarithmic size ring signatures without random oracles. IET Inf. Secur. 10(1): 1-7 (2016) - [j4]Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Broadcast encryption with dealership. Int. J. Inf. Sec. 15(3): 271-283 (2016) - [j3]Clémentine Gritti, Willy Susilo, Thomas Plantard:
Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record. J. Internet Serv. Inf. Secur. 6(4): 1-34 (2016) - 2015
- [j2]Clémentine Gritti, Willy Susilo, Thomas Plantard, Khin Than Win:
Privacy-preserving encryption scheme using DNA parentage test. Theor. Comput. Sci. 580: 1-13 (2015) - [c3]Clémentine Gritti, Willy Susilo, Thomas Plantard:
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy. ACISP 2015: 395-412 - [c2]Clémentine Gritti, Willy Susilo, Thomas Plantard:
Efficient File Sharing in Electronic Health Records. ISPEC 2015: 499-513 - 2014
- [j1]Clémentine Gritti, Willy Susilo, Thomas Plantard, Kaitai Liang, Duncan S. Wong:
Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 3-28 (2014) - 2013
- [c1]Cristian Ene, Clémentine Gritti, Yassine Lakhnech:
CIL Security Proof for a Password-Based Key Exchange. ProvSec 2013: 59-85
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 00:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint