Follow
Guillaume Scerri
Guillaume Scerri
Maître de conférences, Université Versailles Saint-Quentin en Yvelines
Verified email at lsv.ens-cachan.fr
Title
Cited by
Cited by
Year
Secure multiparty computation from SGX
R Bahmani, M Barbosa, F Brasser, B Portela, AR Sadeghi, G Scerri, ...
International Conference on Financial Cryptography and Data Security, 477-497, 2017
792017
Foundations of hardware-based attested computation and application to SGX
M Barbosa, B Portela, G Scerri, B Warinschi
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 245-260, 2016
672016
Personal data management systems: The security and functionality standpoint
N Anciaux, P Bonnet, L Bouganim, B Nguyen, P Pucheral, IS Popa, ...
Information Systems 80, 13-35, 2019
402019
Analysis of key wrapping APIs: Generic policies, computational security
G Scerri, R Stanley-Oakes
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 281-295, 2016
262016
Trustworthy distributed computations on personal data using trusted execution environments
R Ladjel, N Anciaux, P Pucheral, G Scerri
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
172019
Tractable inference systems: an extension with a deducibility predicate
H Comon-Lundh, V Cortier, G Scerri
International Conference on Automated Deduction, 91-108, 2013
132013
A manifest-based framework for organizing the management of personal data at the edge of the network
R Ladjel, N Anciaux, P Pucheral, G Scerri
ISD 2019-28th International Conference on Information Systems Development, 2019
112019
Security proof with dishonest keys
H Comon-Lundh, V Cortier, G Scerri
International Conference on Principles of Security and Trust, 149-168, 2012
112012
Personal database security and trusted execution environments: A tutorial at the crossroads
N Anciaux, L Bouganim, P Pucheral, I Popa, G Scerri
Proceedings of the VLDB Endowment (PVLDB), 2019
92019
Symbolic models for isolated execution environments
C Jacomme, S Kremer, G Scerri
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 530-545, 2017
82017
Proofs of security protocols revisited
G Scerri
Ecole Normale Supérieure de Cachan, 2015
72015
Secure multiparty computation from SGX
B Portela, MBM Barbosa, F Brasser, AR Sadeghi, G Scerri, B Warinschi
Financial Cryptography and Data Security 2017: Twenty-First International …, 2017
52017
Oracle simulation: a technique for protocol composition with long term shared secrets
H Comon, C Jacomme, G Scerri
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
42020
Secure distributed queries over large sets of personal home boxes
R Ladjel, N Anciaux, P Pucheral, G Scerri
Transactions on Large-Scale Data-and Knowledge-Centered Systems XLIV, 108-131, 2020
32020
Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation
M Brahem, G Scerri, N Anciaux, V Issarny
2021 IEEE International Conference on Pervasive Computing and Communications …, 2021
22021
Performance of Large Scale Data-Oriented Operations under the TEE Constraints
R Carpentier, N Anciaux, IS Popa, G Scerri
34ème Conférence sur la Gestion de Données–Principes, Technologies et …, 2018
12018
Consent-driven data reuse in Multi-tasking Crowdsensing Systems: A privacy-by-design solution
M Brahem, G Scerri, N Anciaux, V Issarny
Pervasive and Mobile Computing, 101614, 2022
2022
Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy
R Ladjel, N Anciaux, A Bellet, G Scerri
arXiv preprint arXiv:2112.12411, 2021
2021
Semantics of Cryptographic Proofs.
D Baelde, A Koutsos, I Paris, G Scerri
2021
Secure and Distributed Computations for a Personal Data Management System
R Ladjel, N Anciaux, G Scerri, P Pucheral
34ème Conférence sur la Gestion de Données–Principes, Technologies et …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20