BibTeX records: Elizabeth A. Quaglia

download as .bib file

@proceedings{DBLP:conf/ima/2023,
  editor       = {Elizabeth A. Quaglia},
  title        = {Cryptography and Coding - 19th {IMA} International Conference, {IMACC}
                  2023, London, UK, December 12-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14421},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-47818-5},
  doi          = {10.1007/978-3-031-47818-5},
  isbn         = {978-3-031-47817-8},
  timestamp    = {Sat, 09 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/LoeMOQ23,
  author       = {Angelique Faye Loe and
                  Liam Medley and
                  Christian O'Connell and
                  Elizabeth A. Quaglia},
  editor       = {Nadia El Mrabet and
                  Luca De Feo and
                  Sylvain Duquesne},
  title        = {Applications of Timed-Release Encryption with Implicit Authentication},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2023 - 14th International Conference
                  on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14064},
  pages        = {490--515},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37679-5\_21},
  doi          = {10.1007/978-3-031-37679-5\_21},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/LoeMOQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FraserGQ23,
  author       = {Ashley Fraser and
                  Lydia Garms and
                  Elizabeth A. Quaglia},
  title        = {On the Incoercibility of Digital Signatures},
  booktitle    = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik,
                  Croatia, July 10-14, 2023},
  pages        = {153--168},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSF57540.2023.00018},
  doi          = {10.1109/CSF57540.2023.00018},
  timestamp    = {Tue, 05 Sep 2023 20:33:27 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/FraserGQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MedleyLQ23,
  author       = {Liam Medley and
                  Angelique Faye Loe and
                  Elizabeth A. Quaglia},
  title        = {SoK: Delay-Based Cryptography},
  booktitle    = {36th {IEEE} Computer Security Foundations Symposium, {CSF} 2023, Dubrovnik,
                  Croatia, July 10-14, 2023},
  pages        = {169--183},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CSF57540.2023.00028},
  doi          = {10.1109/CSF57540.2023.00028},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/MedleyLQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KnappQ23,
  author       = {Jodie Knapp and
                  Elizabeth A. Quaglia},
  editor       = {Elias Athanasopoulos and
                  Bart Mennink},
  title        = {Dynamic Multi-server Updatable Encryption},
  booktitle    = {Information Security - 26th International Conference, {ISC} 2023,
                  Groningen, The Netherlands, November 15-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14411},
  pages        = {475--495},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49187-0\_24},
  doi          = {10.1007/978-3-031-49187-0\_24},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/KnappQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/KnappQ23,
  author       = {Jodie Knapp and
                  Elizabeth A. Quaglia},
  editor       = {Francesco Buccafurri and
                  Elena Ferrari and
                  Gianluca Lax},
  title        = {{CLUE:} Certificateless Updatable Encryption},
  booktitle    = {Proceedings of the Italian Conference on Cyber Security {(ITASEC}
                  2023), Bari, Italy, May 2-5, 2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3488},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3488/paper23.pdf},
  timestamp    = {Thu, 21 Sep 2023 17:01:40 +0200},
  biburl       = {https://dblp.org/rec/conf/itasec/KnappQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/KakviMPQ23,
  author       = {Saqib A. Kakvi and
                  Keith M. Martin and
                  Colin Putman and
                  Elizabeth A. Quaglia},
  editor       = {Felix G{\"{u}}nther and
                  Julia Hesse},
  title        = {SoK: Anonymous Credentials},
  booktitle    = {Security Standardisation Research - 8th International Conference,
                  {SSR} 2023, Lyon, France, April 22-23, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13895},
  pages        = {129--151},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30731-7\_6},
  doi          = {10.1007/978-3-031-30731-7\_6},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/KakviMPQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FraserGQ23,
  author       = {Ashley Fraser and
                  Lydia Garms and
                  Elizabeth A. Quaglia},
  title        = {On the Incoercibility of Digital Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/054},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FraserGQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MedleyLQ23,
  author       = {Liam Medley and
                  Angelique Faye Loe and
                  Elizabeth A. Quaglia},
  title        = {SoK: Delay-based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/687},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MedleyLQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LoeMOQ23,
  author       = {Angelique Faye Loe and
                  Liam Medley and
                  Christian O'Connell and
                  Elizabeth A. Quaglia},
  title        = {Applications of Timed-release Encryption with Implicit Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {688},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/688},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LoeMOQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GarmsNQT22,
  author       = {Lydia Garms and
                  Siaw{-}Lynn Ng and
                  Elizabeth A. Quaglia and
                  Giulia Traverso},
  title        = {Anonymity and rewards in peer rating systems},
  journal      = {J. Comput. Secur.},
  volume       = {30},
  number       = {1},
  pages        = {109--165},
  year         = {2022},
  url          = {https://doi.org/10.3233/JCS-200113},
  doi          = {10.3233/JCS-200113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GarmsNQT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LoeMOQ22,
  author       = {Angelique Faye Loe and
                  Liam Medley and
                  Christian O'Connell and
                  Elizabeth A. Quaglia},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {{TIDE:} {A} Novel Approach to Constructing Timed-Release Encryption},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {244--264},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_13},
  doi          = {10.1007/978-3-031-22301-3\_13},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LoeMOQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ArmourQ22,
  author       = {Marcel Armour and
                  Elizabeth A. Quaglia},
  editor       = {Chunpeng Ge and
                  Fuchun Guo},
  title        = {Subverting Deniability},
  booktitle    = {Provable and Practical Security - 16th International Conference, ProvSec
                  2022, Nanjing, China, November 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13600},
  pages        = {52--59},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20917-8\_4},
  doi          = {10.1007/978-3-031-20917-8\_4},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/ArmourQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/KnappQ22,
  author       = {Jodie Knapp and
                  Elizabeth A. Quaglia},
  editor       = {Chunpeng Ge and
                  Fuchun Guo},
  title        = {Epoch Confidentiality in Updatable Encryption},
  booktitle    = {Provable and Practical Security - 16th International Conference, ProvSec
                  2022, Nanjing, China, November 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13600},
  pages        = {60--67},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20917-8\_5},
  doi          = {10.1007/978-3-031-20917-8\_5},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/KnappQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/BultelFQ22,
  author       = {Xavier Bultel and
                  Ashley Fraser and
                  Elizabeth A. Quaglia},
  editor       = {St{\'{e}}phane Devismes and
                  Franck Petit and
                  Karine Altisen and
                  Giuseppe Antonio Di Luna and
                  Antonio Fern{\'{a}}ndez Anta},
  title        = {Improving the Efficiency of Report and Trace Ring Signatures},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 24th
                  International Symposium, {SSS} 2022, Clermont-Ferrand, France, November
                  15-17, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13751},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-21017-4\_9},
  doi          = {10.1007/978-3-031-21017-4\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/BultelFQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BultelFQ22,
  author       = {Xavier Bultel and
                  Ashley Fraser and
                  Elizabeth A. Quaglia},
  title        = {Improving the Efficiency of Report and Trace Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1293},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1293},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BultelFQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmourQ22,
  author       = {Marcel Armour and
                  Elizabeth A. Quaglia},
  title        = {Subverting Deniability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1405},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1405},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmourQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FraserQ21,
  author       = {Ashley Fraser and
                  Elizabeth A. Quaglia},
  editor       = {Mauro Conti and
                  Marc Stevens and
                  Stephan Krenn},
  title        = {Report and Trace Ring Signatures},
  booktitle    = {Cryptology and Network Security - 20th International Conference, {CANS}
                  2021, Vienna, Austria, December 13-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13099},
  pages        = {179--199},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92548-2\_10},
  doi          = {10.1007/978-3-030-92548-2\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/FraserQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MedleyQ21,
  author       = {Liam Medley and
                  Elizabeth A. Quaglia},
  editor       = {Yu Yu and
                  Moti Yung},
  title        = {Collaborative Verifiable Delay Functions},
  booktitle    = {Information Security and Cryptology - 17th International Conference,
                  Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13007},
  pages        = {507--530},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88323-2\_27},
  doi          = {10.1007/978-3-030-88323-2\_27},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MedleyQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LoeMOQ21,
  author       = {Angelique Faye Loe and
                  Liam Medley and
                  Christian O'Connell and
                  Elizabeth A. Quaglia},
  title        = {A Practical Verifiable Delay Function and Delay Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1293},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1293},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LoeMOQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FraserQ21,
  author       = {Ashley Fraser and
                  Elizabeth A. Quaglia},
  title        = {Report and Trace Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1300},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1300},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FraserQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/KnappQ20,
  author       = {Jodie Knapp and
                  Elizabeth A. Quaglia},
  editor       = {Khoa Nguyen and
                  Wenling Wu and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang},
  title        = {Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles},
  booktitle    = {Provable and Practical Security - 14th International Conference, ProvSec
                  2020, Singapore, November 29 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  pages        = {341--360},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62576-4\_17},
  doi          = {10.1007/978-3-030-62576-4\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/KnappQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FraserQ20,
  author       = {Ashley Fraser and
                  Elizabeth A. Quaglia},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {Protecting the Privacy of Voters: New Definitions of Ballot Secrecy
                  for E-Voting},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {670--697},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_26},
  doi          = {10.1007/978-3-030-81652-0\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FraserQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GarmsNQT20,
  author       = {Lydia Garms and
                  Siaw{-}Lynn Ng and
                  Elizabeth A. Quaglia and
                  Giulia Traverso},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {Anonymity and Rewards in Peer Rating Systems},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {277--297},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_14},
  doi          = {10.1007/978-3-030-57990-6\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/GarmsNQT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarmsNQT20,
  author       = {Lydia Garms and
                  Siaw{-}Lynn Ng and
                  Elizabeth A. Quaglia and
                  Giulia Traverso},
  title        = {Anonymity and Rewards in Peer Rating Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {790},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/790},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarmsNQT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KnappQ20,
  author       = {Jodie Knapp and
                  Elizabeth A. Quaglia},
  title        = {Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1078},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1078},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KnappQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FraserQ20,
  author       = {Ashley Fraser and
                  Elizabeth A. Quaglia},
  title        = {Protecting the Privacy of Voters: New Definitions of Ballot Secrecy
                  for E-Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1332},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1332},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FraserQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GarmsQ19,
  author       = {Lydia Garms and
                  Elizabeth A. Quaglia},
  editor       = {Johannes Buchmann and
                  Abderrahmane Nitaj and
                  Tajje{-}eddine Rachidi},
  title        = {A New Approach to Modelling Centralised Reputation Systems},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2019 - 11th International Conference
                  on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11627},
  pages        = {429--447},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23696-0\_22},
  doi          = {10.1007/978-3-030-23696-0\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GarmsQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LoeQ19,
  author       = {Angelique Faye Loe and
                  Elizabeth Anne Quaglia},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {You Shall Not Join: {A} Measurement Study of Cryptocurrency Peer-to-Peer
                  Bootstrapping Techniques},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2231--2247},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3345649},
  doi          = {10.1145/3319535.3345649},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LoeQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FraserQS19,
  author       = {Ashley Fraser and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {A Critique of Game-Based Definitions of Receipt-Freeness for Voting},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {189--205},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_11},
  doi          = {10.1007/978-3-030-31919-9\_11},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FraserQS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-02254,
  author       = {Maxime Meyer and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {An Overview of GSMA's {M2M} Remote Provisioning Specification},
  journal      = {CoRR},
  volume       = {abs/1906.02254},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.02254},
  eprinttype    = {arXiv},
  eprint       = {1906.02254},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-02254.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarmsQ19,
  author       = {Lydia Garms and
                  Elizabeth A. Quaglia},
  title        = {A New Approach to Modelling Centralised Reputation Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarmsQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FraserQS19,
  author       = {Ashley Fraser and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {A critique of game-based definitions of receipt-freeness for voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/853},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FraserQS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/QuagliaS18,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {Secret, verifiable auctions from elections},
  journal      = {Theor. Comput. Sci.},
  volume       = {730},
  pages        = {44--92},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2018.03.022},
  doi          = {10.1016/J.TCS.2018.03.022},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/QuagliaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/QuagliaS18,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  editor       = {Antoine Joux and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Authentication with Weaker Trust Assumptions for Voting Systems},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10831},
  pages        = {322--343},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89339-6\_18},
  doi          = {10.1007/978-3-319-89339-6\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/QuagliaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MeyerQS18,
  author       = {Maxime Meyer and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Attacks Against GSMA's {M2M} Remote Provisioning (Short Paper)},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {243--252},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_13},
  doi          = {10.1007/978-3-662-58387-6\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MeyerQS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/LoeQ18,
  author       = {Angelique Faye Loe and
                  Elizabeth A. Quaglia},
  title        = {Conquering Generals: an NP-Hard Proof of Useful Work},
  booktitle    = {Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains
                  for Distributed Systems, CRYBLOCK@MobiSys 2018, Munich, Germany, June
                  15, 2018},
  pages        = {54--59},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3211933.3211943},
  doi          = {10.1145/3211933.3211943},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisys/LoeQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BlascoQ18,
  author       = {Jorge Blasco and
                  Elizabeth A. Quaglia},
  editor       = {Wu{-}chang Feng and
                  Ashley L. Podhradsky},
  title        = {InfoSec Cinema: Using Films for Information Security Teaching},
  booktitle    = {2018 {USENIX} Workshop on Advances in Security Education, {ASE} 2018,
                  Baltimore, MD, USA, August 13, 2018},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/ase18/presentation/blasco},
  timestamp    = {Mon, 01 Feb 2021 08:43:07 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BlascoQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QuagliaS18,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {Authentication with weaker trust assumptions for voting systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QuagliaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LeguayPQS17,
  author       = {Jeremie Leguay and
                  Georgios S. Paschos and
                  Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {CryptoCache: Network caching with confidentiality},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2017, Paris,
                  France, May 21-25, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICC.2017.7996866},
  doi          = {10.1109/ICC.2017.7996866},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LeguayPQS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/RoseQV17,
  author       = {Luca Rose and
                  Elizabeth A. Quaglia and
                  Stefan Valentin},
  title        = {Increasing the Security of Wireless Communication through Relaying
                  and Interference Generation},
  booktitle    = {2017 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2017, San Francisco, CA, USA, March 19-22, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WCNC.2017.7925742},
  doi          = {10.1109/WCNC.2017.7925742},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/RoseQV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/QuagliaS17,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {A short introduction to secrecy and verifiability for elections},
  journal      = {CoRR},
  volume       = {abs/1702.03168},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.03168},
  eprinttype    = {arXiv},
  eprint       = {1702.03168},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/QuagliaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spawc/QuagliaT16,
  author       = {Elizabeth A. Quaglia and
                  Stefano Tomasin},
  title        = {Geo-specific encryption through implicitly authenticated location
                  for 5G wireless systems},
  booktitle    = {17th {IEEE} International Workshop on Signal Processing Advances in
                  Wireless Communications, {SPAWC} 2016, Edinburgh, United Kingdom,
                  July 3-6, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SPAWC.2016.7536732},
  doi          = {10.1109/SPAWC.2016.7536732},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spawc/QuagliaT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QuagliaS15,
  author       = {Elizabeth A. Quaglia and
                  Ben Smyth},
  title        = {Constructing secret, verifiable auction schemes from election schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1204},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QuagliaS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/McCarthySQ14,
  author       = {Adam McCarthy and
                  Ben Smyth and
                  Elizabeth A. Quaglia},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting
                  Schemes},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_4},
  doi          = {10.1007/978-3-662-45472-5\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/McCarthySQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/CaparGPQTZ13,
  author       = {Cagatay Capar and
                  Dennis Goeckel and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia and
                  Don Towsley and
                  Murtaza Zafer},
  title        = {Signal-flow-based analysis of wireless security protocols},
  journal      = {Inf. Comput.},
  volume       = {226},
  pages        = {37--56},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ic.2013.03.004},
  doi          = {10.1016/J.IC.2013.03.004},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/CaparGPQTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FarshimLPQ13,
  author       = {Pooya Farshim and
                  Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Robust Encryption, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {352--368},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_22},
  doi          = {10.1007/978-3-642-36362-7\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/FarshimLPQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LibertPQ12,
  author       = {Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions
                  in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {206--224},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_13},
  doi          = {10.1007/978-3-642-30057-8\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LibertPQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FarshimLPQ12,
  author       = {Pooya Farshim and
                  Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  title        = {Robust Encryption, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {673},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/673},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FarshimLPQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LibertPQ11,
  author       = {Beno{\^{\i}}t Libert and
                  Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  title        = {Anonymous Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LibertPQ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PatersonQ10,
  author       = {Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Time-Specific Encryption},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_1},
  doi          = {10.1007/978-3-642-15317-4\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PatersonQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonQ10,
  author       = {Kenneth G. Paterson and
                  Elizabeth A. Quaglia},
  title        = {Time-Specific Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {347},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/347},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics