Guillaume Scerri
Guillaume Scerri
Maître de conférences, Université Versailles Saint-Quentin en Yvelines
Verified email at lsv.ens-cachan.fr
Title
Cited by
Cited by
Year
Secure multiparty computation from SGX
R Bahmani, M Barbosa, F Brasser, B Portela, AR Sadeghi, G Scerri, ...
International Conference on Financial Cryptography and Data Security, 477-497, 2017
652017
Foundations of hardware-based attested computation and application to SGX
M Barbosa, B Portela, G Scerri, B Warinschi
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 245-260, 2016
612016
Personal data management systems: The security and functionality standpoint
N Anciaux, P Bonnet, L Bouganim, B Nguyen, P Pucheral, IS Popa, ...
Information Systems 80, 13-35, 2019
272019
Analysis of key wrapping APIs: Generic policies, computational security
G Scerri, R Stanley-Oakes
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 281-295, 2016
242016
Trustworthy distributed computations on personal data using trusted execution environments
R Ladjel, N Anciaux, P Pucheral, G Scerri
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
122019
Tractable inference systems: an extension with a deducibility predicate
H Comon-Lundh, V Cortier, G Scerri
International Conference on Automated Deduction, 91-108, 2013
122013
Security proof with dishonest keys
H Comon-Lundh, V Cortier, G Scerri
International Conference on Principles of Security and Trust, 149-168, 2012
112012
A manifest-based framework for organizing the management of personal data at the edge of the network
R Ladjel, N Anciaux, P Pucheral, G Scerri
ISD 2019-28th International Conference on Information Systems Development, 2019
72019
Proofs of security protocols revisited
G Scerri
Ecole Normale Supérieure de Cachan, 2015
72015
Personal database security and trusted execution environments: A tutorial at the crossroads
N Anciaux, L Bouganim, P Pucheral, I Popa, G Scerri
Proceedings of the VLDB Endowment (PVLDB), 2019
52019
Symbolic models for isolated execution environments
C Jacomme, S Kremer, G Scerri
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 530-545, 2017
52017
Secure multiparty computation from SGX
B Portela, MBM Barbosa, F Brasser, AR Sadeghi, G Scerri, B Warinschi
Financial Cryptography and Data Security 2017: Twenty-First International …, 2017
52017
Secure distributed queries over large sets of personal home boxes
R Ladjel, N Anciaux, P Pucheral, G Scerri
Transactions on Large-Scale Data-and Knowledge-Centered Systems XLIV, 108-131, 2020
32020
Oracle simulation: a technique for protocol composition with long term shared secrets
H Comon, C Jacomme, G Scerri
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
22020
Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation
M Brahem, G Scerri, N Anciaux, V Issarny
2021 IEEE International Conference on Pervasive Computing and Communications …, 2021
2021
Performance of Large Scale Data-Oriented Operations under the TEE Constraints
R Carpentier, N Anciaux, I Popa, G Scerri
34ème Conférence sur la Gestion de Données–Principes, Technologies et …, 2018
2018
Secure and Distributed Computations for a Personal Data Management System
R Ladjel, N Anciaux, G Scerri, P Pucheral
34ème Conférence sur la Gestion de Données–Principes, Technologies et …, 2018
2018
Secure Multiparty Computation from SGX
AR Sadeghi, G Scerri, B Warinschi
Financial Cryptography and Data Security: 21st International Conference, FC …, 2017
2017
Secure Multiparty Computation from SGX
M Barbosa, A Sadeghi, BL Portela, F Brasser, R Bahmani, B Warinschi, ...
2017
A tool for automating the computationally complete symbolic attacker
H Comon-Lundh, V Cortier, G Scerri
Joint Workshop on Foundations of Computer Security and Formal and …, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20