Follow
Guillaume Scerri
Guillaume Scerri
Maître de conférences, Université Versailles Saint-Quentin en Yvelines
Verified email at lsv.ens-cachan.fr
Title
Cited by
Cited by
Year
Secure multiparty computation from SGX
R Bahmani, M Barbosa, F Brasser, B Portela, AR Sadeghi, G Scerri, ...
International Conference on Financial Cryptography and Data Security, 477-497, 2017
1112017
Foundations of hardware-based attested computation and application to SGX
M Barbosa, B Portela, G Scerri, B Warinschi
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 245-260, 2016
822016
Personal data management systems: The security and functionality standpoint
N Anciaux, P Bonnet, L Bouganim, B Nguyen, P Pucheral, IS Popa, ...
Information Systems 80, 13-35, 2019
632019
Analysis of key wrapping apis: Generic policies, computational security
G Scerri, R Stanley-Oakes
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 281-295, 2016
282016
Trustworthy distributed computations on personal data using trusted execution environments
R Ladjel, N Anciaux, P Pucheral, G Scerri
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
232019
Personal database security and trusted execution environments: A tutorial at the crossroads
N Anciaux, L Bouganim, P Pucheral, IS Popa, G Scerri
Proceedings of the VLDB Endowment (PVLDB), 2019
162019
Tractable inference systems: An extension with a deducibility predicate
H Comon-Lundh, V Cortier, G Scerri
International Conference on Automated Deduction, 91-108, 2013
142013
Symbolic models for isolated execution environments
C Jacomme, S Kremer, G Scerri
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 530-545, 2017
122017
A manifest-based framework for organizing the management of personal data at the edge of the network
R Ladjel, N Anciaux, P Pucheral, G Scerri
ISD 2019-28th International Conference on Information Systems Development, 2019
112019
Security proof with dishonest keys
H Comon-Lundh, V Cortier, G Scerri
International Conference on Principles of Security and Trust, 149-168, 2012
112012
Proofs of security protocols revisited
G Scerri
Ecole Normale Supérieure de Cachan, 2015
92015
Secure multiparty computation from SGX
B Portela, MBM Barbosa, F Brasser, AR Sadeghi, G Scerri, B Warinschi
Financial Cryptography and Data Security 2017: Twenty-First International …, 2017
72017
Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation
M Brahem, G Scerri, N Anciaux, V Issarny
2021 IEEE International Conference on Pervasive Computing and Communications …, 2021
62021
Oracle simulation: a technique for protocol composition with long term shared secrets
H Comon, C Jacomme, G Scerri
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
52020
Consent-driven data reuse in multi-tasking crowdsensing systems: A privacy-by-design solution
M Brahem, G Scerri, N Anciaux, V Issarny
Pervasive and Mobile Computing 83, 101614, 2022
22022
Secure distributed queries over large sets of personal home boxes
R Ladjel, N Anciaux, P Pucheral, G Scerri
Transactions on Large-Scale Data-and Knowledge-Centered Systems XLIV …, 2020
22020
A new PET for data collection via forms with data minimization, full accuracy and informed consent
N Anciaux, S Frittella, B Geoffroy, B Nguyen, G Scerri
EDBT 2024-International Conference on Extending Database Technology, 2024
12024
Performance of Large Scale Data-Oriented Operations under the TEE Constraints
R Carpentier, N Anciaux, IS Popa, G Scerri
34ème Conférence sur la Gestion de Données–Principes, Technologies et …, 2018
12018
Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy
R Ladjel, N Anciaux, A Bellet, G Scerri
arXiv preprint arXiv:2112.12411, 2021
2021
Semantics of Cryptographic Proofs.
D Baelde, ENS Rennes, A Koutsos, I Paris, G Scerri
2021
The system can't perform the operation now. Try again later.
Articles 1–20