Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model B Libert, KG Paterson, EA Quaglia Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 221 | 2012 |
Time-specific encryption KG Paterson, EA Quaglia International Conference on Security and Cryptography for Networks, 1-16, 2010 | 118 | 2010 |
Robust encryption, revisited P Farshim, B Libert, KG Paterson, EA Quaglia Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013 | 58 | 2013 |
Conquering generals: an np-hard proof of useful work AF Loe, EA Quaglia Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for …, 2018 | 39 | 2018 |
Performance evaluation of secure network coding using homomorphic signature SH Lee, M Gerla, H Krawczyk, KW Lee, EA Quaglia 2011 International Symposium on Networking Coding, 1-6, 2011 | 32* | 2011 |
You shall not join: A measurement study of cryptocurrency peer-to-peer bootstrapping techniques AF Loe, EA Quaglia Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 22 | 2019 |
CryptoCache: Network caching with confidentiality J Leguay, GS Paschos, EA Quaglia, B Smyth 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 20 | 2017 |
Signal-flow-based analysis of wireless security protocols Ç Çapar, D Goeckel, KG Paterson, EA Quaglia, D Towsley, M Zafer Information and Computation 226, 37-56, 2013 | 20 | 2013 |
SoK: anonymous credentials SA Kakvi, KM Martin, C Putman, EA Quaglia International Conference on Research in Security Standardisation, 129-151, 2023 | 16 | 2023 |
A critique of game-based definitions of receipt-freeness for voting A Fraser, EA Quaglia, B Smyth Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019 | 14 | 2019 |
Secret, verifiable auctions from elections EA Quaglia, B Smyth Theoretical Computer Science 730, 44-92, 2018 | 14* | 2018 |
{InfoSec} Cinema: Using Films for Information Security Teaching J Blasco, EA Quaglia 2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018 | 12 | 2018 |
A short introduction to secrecy and verifiability for elections EA Quaglia, B Smyth arXiv preprint arXiv:1702.03168, 2017 | 12* | 2017 |
Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes A McCarthy, B Smyth, EA Quaglia Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 12 | 2014 |
TIDE: a novel approach to constructing timed-release encryption AF Loe, L Medley, C O’Connell, EA Quaglia Australasian Conference on Information Security and Privacy, 244-264, 2022 | 11 | 2022 |
Sok: Delay-based cryptography L Medley, AF Loe, EA Quaglia 2023 IEEE 36th Computer Security Foundations Symposium (CSF), 169-183, 2023 | 10 | 2023 |
Authentication with weaker trust assumptions for voting systems EA Quaglia, B Smyth Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018 | 9 | 2018 |
Attacks against GSMA’s M2M remote provisioning (Short Paper) M Meyer, EA Quaglia, B Smyth Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018 | 9 | 2018 |
A new approach to modelling centralised reputation systems L Garms, EA Quaglia Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019 | 8 | 2019 |
Applications of timed-release encryption with implicit authentication A Loe, L Medley, C O’Connell, EA Quaglia International Conference on Cryptology in Africa, 490-515, 2023 | 7 | 2023 |