Segui
Elizabeth Quaglia
Elizabeth Quaglia
Email verificata su rhul.ac.uk
Titolo
Citata da
Citata da
Anno
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
B Libert, KG Paterson, EA Quaglia
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
2142012
Time-specific encryption
KG Paterson, EA Quaglia
International Conference on Security and Cryptography for Networks, 1-16, 2010
1152010
Robust encryption, revisited
P Farshim, B Libert, KG Paterson, EA Quaglia
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
532013
Conquering generals: an np-hard proof of useful work
AF Loe, EA Quaglia
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for …, 2018
322018
Performance evaluation of secure network coding using homomorphic signature
SH Lee, M Gerla, H Krawczyk, KW Lee, EA Quaglia
2011 International Symposium on Networking Coding, 1-6, 2011
32*2011
CryptoCache: Network caching with confidentiality
J Leguay, GS Paschos, EA Quaglia, B Smyth
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
182017
Signal-flow-based analysis of wireless security protocols
Ç Çapar, D Goeckel, KG Paterson, EA Quaglia, D Towsley, M Zafer
Information and Computation 226, 37-56, 2013
182013
You shall not join: A measurement study of cryptocurrency peer-to-peer bootstrapping techniques
AF Loe, EA Quaglia
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
172019
Secret, verifiable auctions from elections
EA Quaglia, B Smyth
Theoretical Computer Science 730, 44-92, 2018
13*2018
A short introduction to secrecy and verifiability for elections
EA Quaglia, B Smyth
arXiv preprint arXiv:1702.03168, 2017
12*2017
A critique of game-based definitions of receipt-freeness for voting
A Fraser, EA Quaglia, B Smyth
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019
112019
Sok: Delay-based cryptography
L Medley, AF Loe, EA Quaglia
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 169-183, 2023
102023
Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes
A McCarthy, B Smyth, EA Quaglia
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
102014
TIDE: a novel approach to constructing timed-release encryption
AF Loe, L Medley, C O’Connell, EA Quaglia
Australasian Conference on Information Security and Privacy, 244-264, 2022
92022
{InfoSec} Cinema: Using Films for Information Security Teaching
J Blasco, EA Quaglia
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
92018
Authentication with weaker trust assumptions for voting systems
EA Quaglia, B Smyth
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018
92018
Attacks against GSMA’s M2M remote provisioning (Short Paper)
M Meyer, EA Quaglia, B Smyth
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
92018
SoK: Anonymous Credentials
SA Kakvi, KM Martin, C Putman, EA Quaglia
International Conference on Research in Security Standardisation, 129-151, 2023
82023
Epoch confidentiality in updatable encryption
J Knapp, EA Quaglia
International Conference on Provable Security, 60-67, 2022
62022
A new approach to modelling centralised reputation systems
L Garms, EA Quaglia
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
62019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20