Secure multiparty computation from SGX R Bahmani, M Barbosa, F Brasser, B Portela, AR Sadeghi, G Scerri, ... International Conference on Financial Cryptography and Data Security, 477-497, 2017 | 119 | 2017 |
Foundations of hardware-based attested computation and application to SGX M Barbosa, B Portela, G Scerri, B Warinschi 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 245-260, 2016 | 87 | 2016 |
Personal data management systems: The security and functionality standpoint N Anciaux, P Bonnet, L Bouganim, B Nguyen, P Pucheral, IS Popa, ... Information Systems 80, 13-35, 2019 | 72 | 2019 |
Analysis of key wrapping apis: Generic policies, computational security G Scerri, R Stanley-Oakes 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 281-295, 2016 | 28 | 2016 |
Trustworthy distributed computations on personal data using trusted execution environments R Ladjel, N Anciaux, P Pucheral, G Scerri 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 24 | 2019 |
Personal database security and trusted execution environments: A tutorial at the crossroads N Anciaux, L Bouganim, P Pucheral, IS Popa, G Scerri Proceedings of the VLDB Endowment (PVLDB), 2019 | 17 | 2019 |
Symbolic models for isolated execution environments C Jacomme, S Kremer, G Scerri 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 530-545, 2017 | 14 | 2017 |
Tractable inference systems: An extension with a deducibility predicate H Comon-Lundh, V Cortier, G Scerri International Conference on Automated Deduction, 91-108, 2013 | 14 | 2013 |
A manifest-based framework for organizing the management of personal data at the edge of the network R Ladjel, N Anciaux, P Pucheral, G Scerri ISD 2019-28th International Conference on Information Systems Development, 2019 | 12 | 2019 |
Security proof with dishonest keys H Comon-Lundh, V Cortier, G Scerri International Conference on Principles of Security and Trust, 149-168, 2012 | 12 | 2012 |
Proofs of security protocols revisited G Scerri Ecole Normale Supérieure de Cachan, 2015 | 9 | 2015 |
Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation M Brahem, G Scerri, N Anciaux, V Issarny 2021 IEEE International Conference on Pervasive Computing and Communications …, 2021 | 7 | 2021 |
Oracle simulation: a technique for protocol composition with long term shared secrets H Comon, C Jacomme, G Scerri Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 7 | 2020 |
Secure multiparty computation from SGX B Portela, MBM Barbosa, F Brasser, AR Sadeghi, G Scerri, B Warinschi Financial Cryptography and Data Security 2017: Twenty-First International …, 2017 | 7 | 2017 |
A Probabilistic Logic for Concrete Security D Baelde, C Fontaine, A Koutsos, G Scerri, T Vignon CSF 2024-, 2024 | 2 | 2024 |
Consent-driven data reuse in multi-tasking crowdsensing systems: A privacy-by-design solution M Brahem, G Scerri, N Anciaux, V Issarny Pervasive and Mobile Computing 83, 101614, 2022 | 2 | 2022 |
Secure distributed queries over large sets of personal home boxes R Ladjel, N Anciaux, P Pucheral, G Scerri Transactions on Large-Scale Data-and Knowledge-Centered Systems XLIV …, 2020 | 2 | 2020 |
A new PET for data collection via forms with data minimization, full accuracy and informed consent N Anciaux, S Frittella, B Joffroy, B Nguyen, G Scerri 27th International Conference on Extending Database Technology, EDBT 2024, 2024 | 1 | 2024 |
Performance of Large Scale Data-Oriented Operations under the TEE Constraints R Carpentier, N Anciaux, IS Popa, G Scerri 34ème Conférence sur la Gestion de Données–Principes, Technologies et …, 2018 | 1 | 2018 |
Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy R Ladjel, N Anciaux, A Bellet, G Scerri arXiv preprint arXiv:2112.12411, 2021 | | 2021 |