Elizabeth Quaglia
Elizabeth Quaglia
Adresă de e-mail confirmată pe rhul.ac.uk
Citat de
Citat de
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
B Libert, KG Paterson, EA Quaglia
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
Time-specific encryption
KG Paterson, EA Quaglia
International Conference on Security and Cryptography for Networks, 1-16, 2010
Robust encryption, revisited
P Farshim, B Libert, KG Paterson, EA Quaglia
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
Performance evaluation of secure network coding using homomorphic signature
SH Lee, M Gerla, H Krawczyk, KW Lee, EA Quaglia
2011 International Symposium on Networking Coding, 1-6, 2011
Conquering generals: an np-hard proof of useful work
AF Loe, EA Quaglia
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for …, 2018
CryptoCache: Network caching with confidentiality
J Leguay, GS Paschos, EA Quaglia, B Smyth
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
Signal-flow-based analysis of wireless security protocols
Ç Çapar, D Goeckel, KG Paterson, EA Quaglia, D Towsley, M Zafer
Information and Computation 226, 37-56, 2013
You shall not join: A measurement study of cryptocurrency peer-to-peer bootstrapping techniques
AF Loe, EA Quaglia
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Secret, verifiable auctions from elections
EA Quaglia, B Smyth
Theoretical Computer Science 730, 44-92, 2018
A short introduction to secrecy and verifiability for elections
EA Quaglia, B Smyth
arXiv preprint arXiv:1702.03168, 2017
A critique of game-based definitions of receipt-freeness for voting
A Fraser, EA Quaglia, B Smyth
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019
{InfoSec} Cinema: Using Films for Information Security Teaching
J Blasco, EA Quaglia
2018 USENIX Workshop on Advances in Security Education (ASE 18), 2018
Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes
A McCarthy, B Smyth, EA Quaglia
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
Authentication with weaker trust assumptions for voting systems
EA Quaglia, B Smyth
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018
Attacks against GSMA’s M2M remote provisioning (Short Paper)
M Meyer, EA Quaglia, B Smyth
Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018
Tide: A novel approach to constructing timed-release encryption
AF Loe, L Medley, C O’Connell, EA Quaglia
Australasian Conference on Information Security and Privacy, 244-264, 2022
A new approach to modelling centralised reputation systems
L Garms, EA Quaglia
Progress in Cryptology–AFRICACRYPT 2019: 11th International Conference on …, 2019
SoK: Delay-based Cryptography
L Medley, AF Loe, EA Quaglia
Cryptology ePrint Archive, 2023
Fair and sound secret sharing from homomorphic time-lock puzzles
J Knapp, EA Quaglia
Provable and Practical Security: 14th International Conference, ProvSec 2020 …, 2020
Server and method for transmitting a geo-encrypted message
E Quaglia, S Tomasin
US Patent App. 15/936,197, 2018
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20