Author of the publication

Query Processing in Blockchain Systems: Current State and Future Challenges

, , , and . Future Internet, 14 (1): 1:1-1:31 (December 2021)
DOI: 10.3390/fi14010001

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Gritti, Clémentine
add a person with the name Gritti, Clémentine
 

Other publications of authors with the same name

Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy., , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 485-505. Springer, (2017)How to Provide High-Utility Time Series Data in a Privacy-Aware Manner: A VAULT to Manage Time Series Data, , , , and . International Journal on Advances in Security, 13 (3 & 4): 88--108 (December 2020)Trustworthy, Secure, and Privacy-aware Food Monitoring Enabled by Blockchains and the IoT, , , and . 2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), page 1-4. IEEE, (2020)Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy., , and . ACISP, volume 9144 of Lecture Notes in Computer Science, page 395-412. Springer, (2015)Efficient File Sharing in Electronic Health Records., , and . ISPEC, volume 9065 of Lecture Notes in Computer Science, page 499-513. Springer, (2015)Logarithmic size ring signatures without random oracles., , and . IET Information Security, 10 (1): 1-7 (2016)Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently., , , , and . JoWUA, 5 (4): 3-28 (2014)Blockchain-Based Electronic Health Records Management: A Comprehensive Review and Future Research Direction., , and . IEEE Access, (2022)PSSST! The Privacy System for Smart Service Platforms: An Enabler for Confidable Smart Environments, , , and . Proceedings of the 4ᵗʰ International Conference on Internet of Things, Big Data and Security, volume 1 of IoTBDS '19, page 57–68. Heraklion, SciTePress, (May 2019)A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks., , , and . INDOCRYPT, volume 11898 of Lecture Notes in Computer Science, page 250-270. Springer, (2019)