Guillaume Scerri

According to our database1, Guillaume Scerri authored at least 19 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Pessimism of the Will, Optimism of the Intellect: Fair Protocols with Malicious but Rational Agents.
CoRR, 2024

A new PET for Data Collection via Forms with Data Minimization, Full Accuracy and Informed Consent.
Proceedings of the Proceedings 27th International Conference on Extending Database Technology, 2024

A Probabilistic Logic for Concrete Security.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2022
Consent-driven Data Reuse in Multi-tasking Crowdsensing Systems: A Privacy-by-Design Solution.
Pervasive Mob. Comput., 2022

2021
Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy.
CoRR, 2021

Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications, 2021

2020
Secure Distributed Queries over Large Sets of Personal Home Boxes.
Trans. Large Scale Data Knowl. Centered Syst., 2020

Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Personal Database Security and Trusted Execution Environments: A Tutorial at the Crossroads.
Proc. VLDB Endow., 2019

Personal Data Management Systems: The security and functionality standpoint.
Inf. Syst., 2019

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Manifest-Based Framework for Organizing the Management of Personal Data at the Edge of the Network.
Proceedings of the Information Systems Development: Information Systems Beyond 2020, 2019

2017
Symbolic Models for Isolated Execution Environments.
IACR Cryptol. ePrint Arch., 2017

2016
Analysis of Key Wrapping APIs: Generic Policies, Computational Security.
IACR Cryptol. ePrint Arch., 2016

Foundations of Hardware-Based Attested Computation and Application to SGX.
IACR Cryptol. ePrint Arch., 2016

Secure Multiparty Computation from SGX.
IACR Cryptol. ePrint Arch., 2016

2015
Proofs of security protocols revisited. (Les preuves de protocoles cryptographiques revisitées).
PhD thesis, 2015

2013
Tractable Inference Systems: An Extension with a Deducibility Predicate.
Proceedings of the Automated Deduction - CADE-24, 2013

2012
Security proof with dishonest keys.
IACR Cryptol. ePrint Arch., 2012


  Loading...