Follow
Elizabeth Quaglia
Elizabeth Quaglia
Verified email at rhul.ac.uk
Title
Cited by
Cited by
Year
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
B Libert, KG Paterson, EA Quaglia
Public Key Cryptography–PKC 2012: 15th International Conference on Practice…, 2012
2172012
Time-specific encryption
KG Paterson, EA Quaglia
International Conference on Security and Cryptography for Networks, 1-16, 2010
1162010
Robust encryption, revisited
P Farshim, B Libert, KG Paterson, EA Quaglia
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice…, 2013
532013
Conquering generals: an np-hard proof of useful work
AF Loe, EA Quaglia
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for…, 2018
382018
Performance evaluation of secure network coding using homomorphic signature
SH Lee, M Gerla, H Krawczyk, KW Lee, EA Quaglia
2011 International Symposium on Networking Coding, 1-6, 2011
32*2011
Sok: Delay-based cryptography
L Medley, AF Loe, EA Quaglia
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 169-183, 2023
202023
You shall not join: A measurement study of cryptocurrency peer-to-peer bootstrapping techniques
AF Loe, EA Quaglia
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications…, 2019
192019
CryptoCache: Network caching with confidentiality
J Leguay, GS Paschos, EA Quaglia, B Smyth
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
192017
Signal-flow-based analysis of wireless security protocols
apar, D Goeckel, KG Paterson, EA Quaglia, D Towsley, M Zafer
Information and Computation 226, 37-56, 2013
182013
Secret, verifiable auctions from elections
EA Quaglia, B Smyth
Theoretical Computer Science 730, 44-92, 2018
13*2018
SoK: Anonymous Credentials
SA Kakvi, KM Martin, C Putman, EA Quaglia
International Conference on Research in Security Standardisation, 129-151, 2023
122023
A short introduction to secrecy and verifiability for elections
EA Quaglia, B Smyth
arXiv preprint arXiv:1702.03168, 2017
12*2017
A critique of game-based definitions of receipt-freeness for voting
A Fraser, EA Quaglia, B Smyth
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD…, 2019
112019
Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes
A McCarthy, B Smyth, EA Quaglia
Financial Cryptography and Data Security: 18th International Conference, FC…, 2014
112014
TIDE: a novel approach to constructing timed-release encryption
AF Loe, L Medley, C O’Connell, EA Quaglia
Australasian Conference on Information Security and Privacy, 244-264, 2022
102022
{InfoSec} Cinema: Using Films for Information Security Teaching
J Blasco, EA Quaglia
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
102018
Authentication with weaker trust assumptions for voting systems
EA Quaglia, B Smyth
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on…, 2018
92018
Attacks against GSMA’s M2M remote provisioning (Short Paper)
M Meyer, EA Quaglia, B Smyth
Financial Cryptography and Data Security: 22nd International Conference, FC…, 2018
92018
Applications of timed-release encryption with implicit authentication
A Loe, L Medley, C O’Connell, EA Quaglia
International Conference on Cryptology in Africa, 490-515, 2023
62023
Epoch confidentiality in updatable encryption
J Knapp, EA Quaglia
International Conference on Provable Security, 60-67, 2022
62022
The system can't perform the operation now. Try again later.
Articles 1–20