Elizabeth A. Quaglia

Orcid: 0000-0002-4010-773X

According to our database1, Elizabeth A. Quaglia authored at least 36 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SoK: Anonymous Credentials.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023

CLUE: Certificateless Updatable Encryption.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

Dynamic Multi-server Updatable Encryption.
Proceedings of the Information Security - 26th International Conference, 2023

SoK: Delay-Based Cryptography.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

On the Incoercibility of Digital Signatures.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Applications of Timed-Release Encryption with Implicit Authentication.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
Improving the Efficiency of Report and Trace Ring Signatures.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2022

Epoch Confidentiality in Updatable Encryption.
Proceedings of the Provable and Practical Security, 2022

Subverting Deniability.
Proceedings of the Provable and Practical Security, 2022

TIDE: A Novel Approach to Constructing Timed-Release Encryption.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
A Practical Verifiable Delay Function and Delay Encryption Scheme.
IACR Cryptol. ePrint Arch., 2021

Collaborative Verifiable Delay Functions.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

Report and Trace Ring Signatures.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Anonymity and Rewards in Peer Rating Systems.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

2019
An Overview of GSMA's M2M Remote Provisioning Specification.
CoRR, 2019

A Critique of Game-Based Definitions of Receipt-Freeness for Voting.
Proceedings of the Provable Security, 2019

You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

A New Approach to Modelling Centralised Reputation Systems.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019

2018
Secret, verifiable auctions from elections.
Theor. Comput. Sci., 2018

InfoSec Cinema: Using Films for Information Security Teaching.
Proceedings of the 2018 USENIX Workshop on Advances in Security Education, 2018

Conquering Generals: an NP-Hard Proof of Useful Work.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

Attacks Against GSMA's M2M Remote Provisioning (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2018

Authentication with Weaker Trust Assumptions for Voting Systems.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
A short introduction to secrecy and verifiability for elections.
CoRR, 2017

Increasing the Security of Wireless Communication through Relaying and Interference Generation.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

CryptoCache: Network caching with confidentiality.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Geo-specific encryption through implicitly authenticated location for 5G wireless systems.
Proceedings of the 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2016

2015
Constructing secret, verifiable auction schemes from election schemes.
IACR Cryptol. ePrint Arch., 2015

2014
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Signal-flow-based analysis of wireless security protocols.
Inf. Comput., 2013

Robust Encryption, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

2012
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
Anonymous Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2011

2010
Time-Specific Encryption.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010


  Loading...