Elizabeth Quaglia
Elizabeth Quaglia
Bestätigte E-Mail-Adresse bei rhul.ac.uk
Titel
Zitiert von
Zitiert von
Jahr
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
B Libert, KG Paterson, EA Quaglia
International Workshop on Public Key Cryptography, 206-224, 2012
1502012
Time-specific encryption
KG Paterson, EA Quaglia
International Conference on Security and Cryptography for Networks, 1-16, 2010
822010
Robust encryption, revisited
P Farshim, B Libert, KG Paterson, EA Quaglia
International Workshop on Public Key Cryptography, 352-368, 2013
342013
Performance evaluation of secure network coding using homomorphic signature
SH Lee, M Gerla, H Krawczyk, KW Lee, EA Quaglia
2011 International Symposium on Networking Coding, 1-6, 2011
25*2011
Signal-flow-based analysis of wireless security protocols
Ç Çapar, D Goeckel, KG Paterson, EA Quaglia, D Towsley, M Zafer
Information and Computation 226, 37-56, 2013
152013
A short introduction to secrecy and verifiability for elections
EA Quaglia, B Smyth
arXiv preprint arXiv:1702.03168, 2017
11*2017
Secret, verifiable auctions from elections
EA Quaglia, B Smyth
Theoretical Computer Science 730, 44-92, 2018
10*2018
Cryptocache: Network caching with confidentiality
J Leguay, GS Paschos, EA Quaglia, B Smyth
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
102017
Hawk and Aucitas: e-auction schemes from the Helios and Civitas e-voting schemes
A McCarthy, B Smyth, EA Quaglia
International Conference on Financial Cryptography and Data Security, 51-63, 2014
82014
Authentication with weaker trust assumptions for voting systems
EA Quaglia, B Smyth
International Conference on Cryptology in Africa, 322-343, 2018
62018
Conquering generals: an np-hard proof of useful work
AF Loe, EA Quaglia
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for …, 2018
42018
Attacks Against GSMA’s M2M Remote Provisioning (Short Paper)
M Meyer, EA Quaglia, B Smyth
International Conference on Financial Cryptography and Data Security, 243-252, 2018
32018
Geo-specific encryption through implicitly authenticated location for 5G wireless systems
EA Quaglia, S Tomasin
2016 IEEE 17th International Workshop on Signal Processing Advances in …, 2016
32016
You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques
AF Loe, EA Quaglia
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
22019
A critique of game-based definitions of receipt-freeness for voting
A Fraser, EA Quaglia, B Smyth
International Conference on Provable Security, 189-205, 2019
22019
InfoSec Cinema: Using Films for Information Security Teaching
J Blasco, EA Quaglia
2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18), 2018
22018
A new approach to modelling centralised reputation systems
L Garms, EA Quaglia
International Conference on Cryptology in Africa, 429-447, 2019
12019
Wireless communication device for communication in a wireless communication network
E Quaglia, B Smyth, TH Yuen
US Patent App. 16/577,842, 2020
2020
Anonymity and Rewards in Peer Rating Systems
L Garms, SL Ng, EA Quaglia, G Traverso
Cryptology ePrint Archive, Report 2020/790, 2020
2020
System and method for efficient and secure communications between devices
D Naccache, E Quaglia, B Smyth
US Patent App. 16/529,470, 2019
2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20