Privacy-preserving delegable authentication in the internet of things C Gritti, M Önen, R Molva Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 861-869, 2019 | 24 | 2019 |
Efficient dynamic provable data possession with public verifiability and data privacy C Gritti, W Susilo, T Plantard Australasian Conference on Information Security and Privacy, 395-412, 2015 | 23 | 2015 |
Device Identification and Personal Data Attestation in Networks. C Gritti, M Önen, R Molva, W Susilo, T Plantard J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (4), 1-25, 2018 | 18 | 2018 |
Trustworthy, secure, and privacy-aware food monitoring enabled by blockchains and the IoT C Stach, C Gritti, D Przytarski, B Mitschang 2020 IEEE International Conference on Pervasive Computing and Communications …, 2020 | 11 | 2020 |
Broadcast encryption with dealership C Gritti, W Susilo, T Plantard, K Liang, DS Wong International Journal of Information Security 15 (3), 271-283, 2016 | 11 | 2016 |
Chariot: Cloud-assisted access control for the internet of things C Gritti, M Önen, R Molva 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018 | 10 | 2018 |
Bringing privacy control back to citizens: DISPEL---a distributed privacy management platform for the internet of things C Stach, C Gritti, B Mitschang Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1272-1279, 2020 | 8 | 2020 |
How to provide high-utility time series data in a privacy-aware manner: A VAULT to manage time series data C Stach, R Eichler, C Giebler, J Bräcker, C Gritti International Journal on Advances in Security 13 (3), 2020 | 8 | 2020 |
Improvements in everlasting privacy: efficient and secure zero knowledge proofs T Haines, C Gritti International Joint Conference on Electronic Voting, 116-133, 2019 | 7 | 2019 |
Logarithmic size ring signatures without random oracles C Gritti, W Susilo, T Plantard IET Information Security 10 (1), 1-7, 2016 | 7 | 2016 |
Privacy-preserving encryption scheme using DNA parentage test C Gritti, W Susilo, T Plantard, KT Win Theoretical Computer Science 580, 1-13, 2015 | 7 | 2015 |
Empowering personal health records with cloud computing: How to encrypt with forthcoming fine-grained policies efficiently C Gritti, W Susilo, T Plantard, K Liang, DS Wong | 7 | 2014 |
Improvements on efficient dynamic provable data possession scheme with public verifiability and data privacy C Gritti, W Susilo, T Plantard, R Chen Centre for Computer and Information Security Research, 1-19, 2014 | 6 | 2014 |
Lightweight secure bootstrap and message attestation in the Internet of Things C Gritti, R Molva, M Önen Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 775-782, 2018 | 5 | 2018 |
Dynamic provable data possession protocols with public verifiability and data privacy C Gritti, R Chen, W Susilo, T Plantard International Conference on Information Security Practice and Experience …, 2017 | 5 | 2017 |
Certificate-based encryption with keyword search enabling secure authorization in electronic health record C Gritti, W Susilo, T Plantard | 5 | 2016 |
PSSST! The Privacy System for Smart Service Platforms: An Enabler for Confidable Smart Environments. C Stach, F Steimle, C Gritti, B Mitschang IoTBDS 19, 57-68, 2019 | 4 | 2019 |
A Blueprint for a Trustworthy Health Data Platform Encompassing IoT and Blockchain Technologies D Przytarski, C Stach, C Gritti, B Mitschang EPiC Series in Computing 76, 56-65, 2021 | 3 | 2021 |
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks C Boyd, K Gjøsteen, C Gritti, T Haines International Conference on Cryptology in India, 250-270, 2019 | 3 | 2019 |
Efficient file sharing in electronic health records C Gritti, W Susilo, T Plantard International Conference on Information Security Practice and Experience …, 2015 | 2 | 2015 |