Follow
Elizabeth Quaglia
Elizabeth Quaglia
Verified email at rhul.ac.uk
Title
Cited by
Cited by
Year
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
B Libert, KG Paterson, EA Quaglia
Public Key Cryptography–PKC 2012: 15th International Conference on Practice…, 2012
2192012
Time-specific encryption
KG Paterson, EA Quaglia
International Conference on Security and Cryptography for Networks, 1-16, 2010
1162010
Robust encryption, revisited
P Farshim, B Libert, KG Paterson, EA Quaglia
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice…, 2013
542013
Conquering generals: an np-hard proof of useful work
AF Loe, EA Quaglia
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for…, 2018
372018
Performance evaluation of secure network coding using homomorphic signature
SH Lee, M Gerla, H Krawczyk, KW Lee, EA Quaglia
2011 International Symposium on Networking Coding, 1-6, 2011
32*2011
You shall not join: A measurement study of cryptocurrency peer-to-peer bootstrapping techniques
AF Loe, EA Quaglia
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications…, 2019
202019
CryptoCache: Network caching with confidentiality
J Leguay, GS Paschos, EA Quaglia, B Smyth
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
192017
Signal-flow-based analysis of wireless security protocols
apar, D Goeckel, KG Paterson, EA Quaglia, D Towsley, M Zafer
Information and Computation 226, 37-56, 2013
192013
Secret, verifiable auctions from elections
EA Quaglia, B Smyth
Theoretical Computer Science 730, 44-92, 2018
14*2018
SoK: anonymous credentials
SA Kakvi, KM Martin, C Putman, EA Quaglia
International Conference on Research in Security Standardisation, 129-151, 2023
122023
A critique of game-based definitions of receipt-freeness for voting
A Fraser, EA Quaglia, B Smyth
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD…, 2019
122019
A short introduction to secrecy and verifiability for elections
EA Quaglia, B Smyth
arXiv preprint arXiv:1702.03168, 2017
12*2017
Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes
A McCarthy, B Smyth, EA Quaglia
Financial Cryptography and Data Security: 18th International Conference, FC…, 2014
122014
{InfoSec} Cinema: Using Films for Information Security Teaching
J Blasco, EA Quaglia
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
112018
TIDE: a novel approach to constructing timed-release encryption
AF Loe, L Medley, C O’Connell, EA Quaglia
Australasian Conference on Information Security and Privacy, 244-264, 2022
102022
Sok: Delay-based cryptography
L Medley, AF Loe, EA Quaglia
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 169-183, 2023
92023
Authentication with weaker trust assumptions for voting systems
EA Quaglia, B Smyth
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on…, 2018
92018
Attacks against GSMA’s M2M remote provisioning (Short Paper)
M Meyer, EA Quaglia, B Smyth
Financial Cryptography and Data Security: 22nd International Conference, FC…, 2018
92018
A new approach to modelling centralised reputation systems
L Garms, EA Quaglia
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on…, 2019
72019
Applications of timed-release encryption with implicit authentication
A Loe, L Medley, C O’Connell, EA Quaglia
International Conference on Cryptology in Africa, 490-515, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20