Follow
Clementine Gritti
Clementine Gritti
Verified email at canterbury.ac.nz
Title
Cited by
Cited by
Year
Blockchain-based electronic health records management: a comprehensive review and future research direction
A Al Mamun, S Azam, C Gritti
IEEE Access 10, 5768-5789, 2022
522022
Privacy-preserving delegable authentication in the internet of things
C Gritti, M Önen, R Molva
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 861-869, 2019
312019
Query processing in blockchain systems: Current state and future challenges
D Przytarski, C Stach, C Gritti, B Mitschang
Future Internet 14 (1), 1, 2021
292021
Efficient dynamic provable data possession with public verifiability and data privacy
C Gritti, W Susilo, T Plantard
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
252015
Device identification and personal data attestation in networks
C Gritti, M Önen, R Molva, W Susilo, T Plantard
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2018
242018
Trustworthy, secure, and privacy-aware food monitoring enabled by blockchains and the IoT
C Stach, C Gritti, D Przytarski, B Mitschang
2020 IEEE International Conference on Pervasive Computing and Communications …, 2020
232020
A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
M Buser, R Dowsley, M Esgin, C Gritti, S Kasra Kermanshahi, V Kuchta, ...
ACM Computing Surveys 55 (12), 1-32, 2023
192023
Bringing privacy control back to citizens: DISPEL---a distributed privacy management platform for the internet of things
C Stach, C Gritti, B Mitschang
Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1272-1279, 2020
172020
Chariot: Cloud-assisted access control for the internet of things
C Gritti, M Önen, R Molva
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018
152018
Broadcast encryption with dealership
C Gritti, W Susilo, T Plantard, K Liang, DS Wong
International Journal of Information Security 15, 271-283, 2016
152016
How to provide high-utility time series data in a privacy-aware manner: A VAULT to manage time series data
C Stach, R Eichler, C Giebler, J Bräcker, C Gritti
International Journal on Advances in Security 13 (3), 2020
142020
Dynamic provable data possession protocols with public verifiability and data privacy
C Gritti, R Chen, W Susilo, T Plantard
Information Security Practice and Experience: 13th International Conference …, 2017
132017
Protecting sensitive data in the information age: State of the art and future prospects
C Stach, C Gritti, J Bräcker, M Behringer, B Mitschang
Future Internet 14 (11), 302, 2022
122022
Logarithmic size ring signatures without random oracles
C Gritti, W Susilo, T Plantard
IET Information Security 10 (1), 1-7, 2016
102016
Improvements in everlasting privacy: efficient and secure zero knowledge proofs
T Haines, C Gritti
Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019 …, 2019
92019
Publicly verifiable proofs of data replication and retrievability for cloud storage
C Gritti
2020 International Computer Symposium (ICS), 431-436, 2020
82020
Lightweight secure bootstrap and message attestation in the Internet of Things
C Gritti, R Molva, M Önen
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 775-782, 2018
82018
Empowering personal health records with cloud computing: How to encrypt with forthcoming fine-grained policies efficiently
C Gritti, W Susilo, T Plantard, K Liang, DS Wong
82014
A Blueprint for a Trustworthy Health Data Platform Encompassing IoT and Blockchain Technologies
D Przytarski, C Stach, C Gritti, B Mitschang
Proceedings of the ISCA 29th International Conference on Software …, 2020
72020
Privacy-preserving encryption scheme using DNA parentage test
C Gritti, W Susilo, T Plantard, KT Win
Theoretical Computer Science 580, 1-13, 2015
72015
The system can't perform the operation now. Try again later.
Articles 1–20