| Blockchain-based electronic health records management: a comprehensive review and future research direction A Al Mamun, S Azam, C Gritti IEEE Access 10, 5768-5789, 2022 | 144 | 2022 |
| A survey on exotic signatures for post-quantum blockchain: Challenges and research directions M Buser, R Dowsley, M Esgin, C Gritti, S Kasra Kermanshahi, V Kuchta, ... ACM Computing Surveys 55 (12), 1-32, 2023 | 59 | 2023 |
| Query processing in blockchain systems: Current state and future challenges D Przytarski, C Stach, C Gritti, B Mitschang Future Internet 14 (1), 1, 2021 | 43 | 2021 |
| Privacy-preserving delegable authentication in the internet of things C Gritti, M Önen, R Molva Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 861-869, 2019 | 32 | 2019 |
| Trustworthy, secure, and privacy-aware food monitoring enabled by blockchains and the IoT C Stach, C Gritti, D Przytarski, B Mitschang 2020 IEEE International Conference on Pervasive Computing and Communications …, 2020 | 28 | 2020 |
| Device identification and personal data attestation in networks C Gritti, M Önen, R Molva, W Susilo, T Plantard Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2018 | 28 | 2018 |
| Efficient dynamic provable data possession with public verifiability and data privacy C Gritti, W Susilo, T Plantard Australasian Conference on Information Security and Privacy, 395-412, 2015 | 27 | 2015 |
| Post-quantum authentication in the MQTT protocol J Samandari, C Gritti Journal of cybersecurity and privacy 3 (3), 416-434, 2023 | 22 | 2023 |
| Bringing privacy control back to citizens: DISPEL---a distributed privacy management platform for the internet of things C Stach, C Gritti, B Mitschang Proceedings of the 35th Annual ACM Symposium on Applied Computing, 1272-1279, 2020 | 22 | 2020 |
| Protecting sensitive data in the information age: State of the art and future prospects C Stach, C Gritti, J Bräcker, M Behringer, B Mitschang Future Internet 14 (11), 302, 2022 | 19 | 2022 |
| Broadcast encryption with dealership C Gritti, W Susilo, T Plantard, K Liang, DS Wong International Journal of Information Security 15 (3), 271-283, 2016 | 17 | 2016 |
| Chariot: Cloud-assisted access control for the internet of things C Gritti, M Önen, R Molva 2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-6, 2018 | 16 | 2018 |
| Logarithmic size ring signatures without random oracles C Gritti, W Susilo, T Plantard IET Information Security 10 (1), 1-7, 2016 | 15 | 2016 |
| How to provide high-utility time series data in a privacy-aware manner: A VAULT to manage time series data C Stach, R Eichler, C Giebler, J Bräcker, C Gritti International Journal on Advances in Security 13 (3), 2020 | 13 | 2020 |
| Dynamic provable data possession protocols with public verifiability and data privacy C Gritti, R Chen, W Susilo, T Plantard International Conference on Information Security Practice and Experience …, 2017 | 13 | 2017 |
| Assessment and treatment of privacy issues in blockchain systems C Stach, C Gritti, D Przytarski, B Mitschang ACM SIGAPP Applied Computing Review 22 (3), 5-24, 2022 | 12 | 2022 |
| Publicly verifiable proofs of data replication and retrievability for cloud storage C Gritti 2020 International Computer Symposium (ICS), 431-436, 2020 | 12 | 2020 |
| Full post-quantum datagram TLS handshake in the Internet of Things C McLoughlin, C Gritti, J Samandari International Conference on Codes, Cryptology, and Information Security, 57-76, 2023 | 10 | 2023 |
| Improvements in everlasting privacy: efficient and secure zero knowledge proofs T Haines, C Gritti International Joint Conference on Electronic Voting, 116-133, 2019 | 10 | 2019 |
| Empowering personal health records with cloud computing: How to encrypt with forthcoming fine-grained policies efficiently C Gritti, W Susilo, T Plantard, K Liang, D Wong University of Wollongong, 2014 | 10 | 2014 |