Elizabeth Quaglia
Elizabeth Quaglia
Verified email at rhul.ac.uk
Title
Cited by
Cited by
Year
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
B Libert, KG Paterson, EA Quaglia
International Workshop on Public Key Cryptography, 206-224, 2012
1612012
Time-specific encryption
KG Paterson, EA Quaglia
International Conference on Security and Cryptography for Networks, 1-16, 2010
912010
Robust encryption, revisited
P Farshim, B Libert, KG Paterson, EA Quaglia
International Workshop on Public Key Cryptography, 352-368, 2013
382013
Performance evaluation of secure network coding using homomorphic signature
SH Lee, M Gerla, H Krawczyk, KW Lee, EA Quaglia
2011 International Symposium on Networking Coding, 1-6, 2011
26*2011
Signal-flow-based analysis of wireless security protocols
« «apar, D Goeckel, KG Paterson, EA Quaglia, D Towsley, M Zafer
Information and Computation 226, 37-56, 2013
152013
Cryptocache: Network caching with confidentiality
J Leguay, GS Paschos, EA Quaglia, B Smyth
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
142017
A short introduction to secrecy and verifiability for elections
EA Quaglia, B Smyth
arXiv preprint arXiv:1702.03168, 2017
13*2017
Secret, verifiable auctions from elections
EA Quaglia, B Smyth
Theoretical Computer Science 730, 44-92, 2018
12*2018
Authentication with weaker trust assumptions for voting systems
EA Quaglia, B Smyth
International Conference on Cryptology in Africa, 322-343, 2018
92018
Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes
A McCarthy, B Smyth, EA Quaglia
International Conference on Financial Cryptography and Data Security, 51-63, 2014
92014
A critique of game-based definitions of receipt-freeness for voting
A Fraser, EA Quaglia, B Smyth
International Conference on Provable Security, 189-205, 2019
72019
InfoSec cinema: Using films for information security teaching
J Blasco, EA Quaglia
2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18), 2018
62018
You shall not join: A measurement study of cryptocurrency peer-to-peer bootstrapping techniques
AF Loe, EA Quaglia
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications†…, 2019
52019
Conquering generals: an np-hard proof of useful work
AF Loe, EA Quaglia
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for†…, 2018
52018
A new approach to modelling centralised reputation systems
L Garms, EA Quaglia
International Conference on Cryptology in Africa, 429-447, 2019
42019
Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)
M Meyer, EA Quaglia, B Smyth
International Conference on Financial Cryptography and Data Security, 243-252, 2018
32018
Geo-specific encryption through implicitly authenticated location for 5G wireless systems
EA Quaglia, S Tomasin
2016 IEEE 17th International Workshop on Signal Processing Advances in†…, 2016
32016
An Overview of GSMA's M2M Remote provisioning specification
M Meyer, EA Quaglia, B Smyth
arXiv preprint arXiv:1906.02254, 2019
12019
Fair and sound secret sharing from homomorphic time-lock puzzles
J Knapp, EA Quaglia
International Conference on Provable Security, 341-360, 2020
2020
Anonymity and rewards in peer rating systems
L Garms, SL Ng, EA Quaglia, G Traverso
International Conference on Security and Cryptography for Networks, 277-297, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20