Blockchain-based electronic health records management: a comprehensive review and future research direction A Al Mamun, S Azam, C Gritti IEEE Access 10, 5768-5789, 2022 | 70 | 2022 |
Query processing in blockchain systems: Current state and future challenges D Przytarski, C Stach, C Gritti, B Mitschang Future Internet 14 (1), 1, 2021 | 31 | 2021 |
Privacy-preserving delegable authentication in the internet of things C Gritti, M Önen, R Molva Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 861-869, 2019 | 31 | 2019 |
A survey on exotic signatures for post-quantum blockchain: Challenges and research directions M Buser, R Dowsley, M Esgin, C Gritti, S Kasra Kermanshahi, V Kuchta, ... ACM Computing Surveys 55 (12), 1-32, 2023 | 25 | 2023 |
Device identification and personal data attestation in networks C Gritti, M Önen, R Molva, W Susilo, T Plantard Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2018 | 25 | 2018 |
Efficient dynamic provable data possession with public verifiability and data privacy C Gritti, W Susilo, T Plantard Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 25 | 2015 |
Trustworthy, secure, and privacy-aware food monitoring enabled by blockchains and the IoT C Stach, C Gritti, D Przytarski, B Mitschang 2020 IEEE International Conference on Pervasive Computing and Communications …, 2020 | 22 | 2020 |
Bringing privacy control back to citizens: DISPEL---a distributed privacy management platform for the internet of things C Stach, C Gritti, B Mitschang Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1272-1279, 2020 | 20 | 2020 |
Chariot: Cloud-assisted access control for the internet of things C Gritti, M Önen, R Molva 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018 | 15 | 2018 |
Broadcast encryption with dealership C Gritti, W Susilo, T Plantard, K Liang, DS Wong International Journal of Information Security 15, 271-283, 2016 | 15 | 2016 |
How to provide high-utility time series data in a privacy-aware manner: A VAULT to manage time series data C Stach, R Eichler, C Giebler, J Bräcker, C Gritti International Journal on Advances in Security 13 (3), 2020 | 14 | 2020 |
Dynamic provable data possession protocols with public verifiability and data privacy C Gritti, R Chen, W Susilo, T Plantard Information Security Practice and Experience: 13th International Conference …, 2017 | 13 | 2017 |
Protecting sensitive data in the information age: State of the art and future prospects C Stach, C Gritti, J Bräcker, M Behringer, B Mitschang Future Internet 14 (11), 302, 2022 | 12 | 2022 |
Logarithmic size ring signatures without random oracles C Gritti, W Susilo, T Plantard IET Information Security 10 (1), 1-7, 2016 | 10 | 2016 |
Improvements in everlasting privacy: efficient and secure zero knowledge proofs T Haines, C Gritti Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019 …, 2019 | 9 | 2019 |
Lightweight secure bootstrap and message attestation in the Internet of Things C Gritti, R Molva, M Önen Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 775-782, 2018 | 9 | 2018 |
Empowering personal health records with cloud computing: How to encrypt with forthcoming fine-grained policies efficiently C Gritti, W Susilo, T Plantard, K Liang, DS Wong | 9 | 2014 |
Post-quantum authentication in the MQTT protocol J Samandari, C Gritti Journal of Cybersecurity and Privacy 3 (3), 416-434, 2023 | 8 | 2023 |
Publicly verifiable proofs of data replication and retrievability for cloud storage C Gritti 2020 International Computer Symposium (ICS), 431-436, 2020 | 8 | 2020 |
Assessment and treatment of privacy issues in blockchain systems C Stach, C Gritti, D Przytarski, B Mitschang ACM SIGAPP Applied Computing Review 22 (3), 5-24, 2022 | 7 | 2022 |