Elizabeth Quaglia
Elizabeth Quaglia
Verified email at
Cited by
Cited by
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
B Libert, KG Paterson, EA Quaglia
Public Key Cryptography–PKC 2012: 15th International Conference on Practice…, 2012
Time-specific encryption
KG Paterson, EA Quaglia
International Conference on Security and Cryptography for Networks, 1-16, 2010
Robust encryption, revisited
P Farshim, B Libert, KG Paterson, EA Quaglia
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice…, 2013
Conquering generals: an np-hard proof of useful work
AF Loe, EA Quaglia
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for…, 2018
Performance evaluation of secure network coding using homomorphic signature
SH Lee, M Gerla, H Krawczyk, KW Lee, EA Quaglia
2011 International Symposium on Networking Coding, 1-6, 2011
You shall not join: A measurement study of cryptocurrency peer-to-peer bootstrapping techniques
AF Loe, EA Quaglia
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications…, 2019
CryptoCache: Network caching with confidentiality
J Leguay, GS Paschos, EA Quaglia, B Smyth
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
Signal-flow-based analysis of wireless security protocols
apar, D Goeckel, KG Paterson, EA Quaglia, D Towsley, M Zafer
Information and Computation 226, 37-56, 2013
Sok: Delay-based cryptography
L Medley, AF Loe, EA Quaglia
2023 IEEE 36th Computer Security Foundations Symposium (CSF), 169-183, 2023
Secret, verifiable auctions from elections
EA Quaglia, B Smyth
Theoretical Computer Science 730, 44-92, 2018
A short introduction to secrecy and verifiability for elections
EA Quaglia, B Smyth
arXiv preprint arXiv:1702.03168, 2017
A critique of game-based definitions of receipt-freeness for voting
A Fraser, EA Quaglia, B Smyth
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD…, 2019
SoK: Anonymous Credentials
SA Kakvi, KM Martin, C Putman, EA Quaglia
International Conference on Research in Security Standardisation, 129-151, 2023
TIDE: a novel approach to constructing timed-release encryption
AF Loe, L Medley, C O’Connell, EA Quaglia
Australasian Conference on Information Security and Privacy, 244-264, 2022
Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes
A McCarthy, B Smyth, EA Quaglia
Financial Cryptography and Data Security: 18th International Conference, FC…, 2014
{InfoSec} Cinema: Using Films for Information Security Teaching
J Blasco, EA Quaglia
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
Authentication with weaker trust assumptions for voting systems
EA Quaglia, B Smyth
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on…, 2018
Attacks against GSMA’s M2M remote provisioning (Short Paper)
M Meyer, EA Quaglia, B Smyth
Financial Cryptography and Data Security: 22nd International Conference, FC…, 2018
Epoch confidentiality in updatable encryption
J Knapp, EA Quaglia
International Conference on Provable Security, 60-67, 2022
A new approach to modelling centralised reputation systems
L Garms, EA Quaglia
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on…, 2019
The system can't perform the operation now. Try again later.
Articles 1–20