What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Elizabeth A. Quaglia
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/africacrypt
Applications of Timed-Release Encryption with Implicit Authentication.
Angelique Faye Loe
Liam Medley
Christian O'Connell
Elizabeth A. Quaglia
2022
conf/acisp
TIDE: A Novel Approach to Constructing Timed-Release Encryption.
Angelique Faye Loe
Liam Medley
Christian O'Connell
Elizabeth A. Quaglia
2022
conf/provsec
Epoch Confidentiality in Updatable Encryption.
Jodie Knapp
Elizabeth A. Quaglia
2022
conf/provsec
Subverting Deniability.
Marcel Armour
Elizabeth A. Quaglia
2021
conf/cans
Report and Trace Ring Signatures.
Ashley Fraser
Elizabeth A. Quaglia
2020
conf/provsec
Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles.
Jodie Knapp
Elizabeth A. Quaglia
2020
conf/sacrypt
Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting.
Ashley Fraser
Elizabeth A. Quaglia
2019
conf/provsec
A Critique of Game-Based Definitions of Receipt-Freeness for Voting.
Ashley Fraser
Elizabeth A. Quaglia
Ben Smyth
2019
conf/africacrypt
A New Approach to Modelling Centralised Reputation Systems.
Lydia Garms
Elizabeth A. Quaglia
2018
conf/uss
InfoSec Cinema: Using Films for Information Security Teaching.
Jorge Blasco
Elizabeth A. Quaglia
2018
conf/fc
Attacks Against GSMA's M2M Remote Provisioning (Short Paper).
Maxime Meyer
Elizabeth A. Quaglia
Ben Smyth
2018
conf/africacrypt
Authentication with Weaker Trust Assumptions for Voting Systems.
Elizabeth A. Quaglia
Ben Smyth
2014
conf/fc
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes.
Adam McCarthy
Ben Smyth
Elizabeth A. Quaglia
2013
conf/pkc
Robust Encryption, Revisited.
Pooya Farshim
Benoît Libert
Kenneth G. Paterson
Elizabeth A. Quaglia
2012
conf/pkc
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model.
Benoît Libert
Kenneth G. Paterson
Elizabeth A. Quaglia
Coauthors
Adam McCarthy
(1)
Angelique Faye Loe
(2)
Ashley Fraser
(3)
Ben Smyth
(4)
Benoît Libert
(2)
Christian O'Connell
(2)
Elizabeth A. Quaglia
(15)
Jodie Knapp
(2)
Jorge Blasco
(1)
Kenneth G. Paterson
(2)
Liam Medley
(2)
Lydia Garms
(1)
Marcel Armour
(1)
Maxime Meyer
(1)
Pooya Farshim
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to