Privacy-preserving delegable authentication in the internet of things C Gritti, M Önen, R Molva Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 861-869, 2019 | 29 | 2019 |
Efficient dynamic provable data possession with public verifiability and data privacy C Gritti, W Susilo, T Plantard Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 24 | 2015 |
Device Identification and Personal Data Attestation in Networks. C Gritti, M Önen, R Molva, W Susilo, T Plantard J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9 (4), 1-25, 2018 | 20 | 2018 |
Query processing in blockchain systems: Current state and future challenges D Przytarski, C Stach, C Gritti, B Mitschang Future internet 14 (1), 1, 2021 | 16 | 2021 |
Trustworthy, secure, and privacy-aware food monitoring enabled by blockchains and the IoT C Stach, C Gritti, D Przytarski, B Mitschang 2020 IEEE International Conference on Pervasive Computing and Communications …, 2020 | 16 | 2020 |
Bringing privacy control back to citizens: DISPEL---a distributed privacy management platform for the internet of things C Stach, C Gritti, B Mitschang Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1272-1279, 2020 | 14 | 2020 |
Broadcast encryption with dealership C Gritti, W Susilo, T Plantard, K Liang, DS Wong International Journal of Information Security 15, 271-283, 2016 | 14 | 2016 |
How to provide high-utility time series data in a privacy-aware manner: A VAULT to manage time series data C Stach, R Eichler, C Giebler, J Bräcker, C Gritti International Journal on Advances in Security 13 (3), 2020 | 13 | 2020 |
Chariot: Cloud-assisted access control for the internet of things C Gritti, M Önen, R Molva 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018 | 13 | 2018 |
Dynamic provable data possession protocols with public verifiability and data privacy C Gritti, R Chen, W Susilo, T Plantard Information Security Practice and Experience: 13th International Conference …, 2017 | 12 | 2017 |
Blockchain-based electronic health records management: a comprehensive review and future research direction A Al Mamun, S Azam, C Gritti IEEE Access 10, 5768-5789, 2022 | 9 | 2022 |
Improvements in everlasting privacy: efficient and secure zero knowledge proofs T Haines, C Gritti Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019 …, 2019 | 8 | 2019 |
Logarithmic size ring signatures without random oracles C Gritti, W Susilo, T Plantard IET Information Security 10 (1), 1-7, 2016 | 7 | 2016 |
Privacy-preserving encryption scheme using DNA parentage test C Gritti, W Susilo, T Plantard, KT Win Theoretical Computer Science 580, 1-13, 2015 | 7 | 2015 |
Improvements on efficient dynamic provable data possession scheme with public verifiability and data privacy C Gritti, W Susilo, T Plantard, R Chen Centre for Computer and Information Security Research, 1-19, 2014 | 7 | 2014 |
Empowering personal health records with cloud computing: How to encrypt with forthcoming fine-grained policies efficiently C Gritti, W Susilo, T Plantard, K Liang, DS Wong | 7 | 2014 |
Lightweight secure bootstrap and message attestation in the Internet of Things C Gritti, R Molva, M Önen Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 775-782, 2018 | 6 | 2018 |
PSSST! The Privacy System for Smart Service Platforms: An Enabler for Confidable Smart Environments. C Stach, F Steimle, C Gritti, B Mitschang IoTBDS 19, 57-68, 2019 | 5 | 2019 |
Certificate-based encryption with keyword search enabling secure authorization in electronic health record C Gritti, W Susilo, T Plantard | 5 | 2016 |
A Blueprint for a Trustworthy Health Data Platform Encompassing IoT and Blockchain Technologies D Przytarski, C Stach, C Gritti, B Mitschang Proceedings of the ISCA 29th International Conference on Software …, 2020 | 4 | 2020 |