Secure multiparty computation from SGX R Bahmani, M Barbosa, F Brasser, B Portela, AR Sadeghi, G Scerri, ... Financial Cryptography and Data Security: 21st International Conference, FC …, 2017 | 93 | 2017 |
Foundations of hardware-based attested computation and application to SGX M Barbosa, B Portela, G Scerri, B Warinschi 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 245-260, 2016 | 78 | 2016 |
Personal data management systems: The security and functionality standpoint N Anciaux, P Bonnet, L Bouganim, B Nguyen, P Pucheral, IS Popa, ... Information Systems 80, 13-35, 2019 | 51 | 2019 |
Analysis of key wrapping APIs: Generic policies, computational security G Scerri, R Stanley-Oakes 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 281-295, 2016 | 26 | 2016 |
Trustworthy distributed computations on personal data using trusted execution environments R Ladjel, N Anciaux, P Pucheral, G Scerri 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | 20 | 2019 |
Tractable inference systems: an extension with a deducibility predicate H Comon-Lundh, V Cortier, G Scerri Automated Deduction–CADE-24: 24th International Conference on Automated …, 2013 | 13 | 2013 |
Personal database security and trusted execution environments: A tutorial at the crossroads N Anciaux, L Bouganim, P Pucheral, IS Popa, G Scerri Proceedings of the VLDB Endowment (PVLDB), 2019 | 12 | 2019 |
A manifest-based framework for organizing the management of personal data at the edge of the network R Ladjel, N Anciaux, P Pucheral, G Scerri ISD 2019-28th International Conference on Information Systems Development, 2019 | 11 | 2019 |
Security Proof with Dishonest Keys. H Comon-Lundh, V Cortier, G Scerri POST 12, 149-168, 2012 | 11 | 2012 |
Symbolic models for isolated execution environments C Jacomme, S Kremer, G Scerri 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 530-545, 2017 | 9 | 2017 |
Proofs of security protocols revisited G Scerri Ecole Normale Supérieure de Cachan, 2015 | 7 | 2015 |
Secure multiparty computation from SGX B Portela, MBM Barbosa, F Brasser, AR Sadeghi, G Scerri, B Warinschi Financial Cryptography and Data Security 2017: Twenty-First International …, 2017 | 6 | 2017 |
Oracle simulation: a technique for protocol composition with long term shared secrets H Comon, C Jacomme, G Scerri Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 5 | 2020 |
Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation M Brahem, G Scerri, N Anciaux, V Issarny 2021 IEEE International Conference on Pervasive Computing and Communications …, 2021 | 3 | 2021 |
Secure distributed queries over large sets of personal home boxes R Ladjel, N Anciaux, P Pucheral, G Scerri Transactions on Large-Scale Data-and Knowledge-Centered Systems XLIV …, 2020 | 3 | 2020 |
Performance of Large Scale Data-Oriented Operations under the TEE Constraints R Carpentier, N Anciaux, IS Popa, G Scerri 34ème Conférence sur la Gestion de Données–Principes, Technologies et …, 2018 | 1 | 2018 |
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution M Brahem, G Scerri, N Anciaux, V Issarny Pervasive and Mobile Computing 83, 101614, 2022 | | 2022 |
Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy R Ladjel, N Anciaux, A Bellet, G Scerri arXiv preprint arXiv:2112.12411, 2021 | | 2021 |
Semantics of Cryptographic Proofs. D Baelde, ENS Rennes, A Koutsos, I Paris, G Scerri | | 2021 |
Secure and distributed computations for a personal data management system R Ladjel, N Anciaux, G Scerri, P Pucheral 34ème Conférence sur la Gestion de Données–Principes, Technologies et …, 2018 | | 2018 |