


default search action
Colin Boyd
Person information
- affiliation: Queensland University of Technology, Brisbane, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c180]Colin Boyd, Bor de Kock, Lise Millerjord:
Modular Design of KEM-Based Authenticated Key Exchange. ACISP 2023: 553-579 - [c179]Colin Boyd, Elsie Mestl Fondevik, Kristian Gjøsteen, Lise Millerjord:
Hybrid Group Key Exchange with Application to Constrained Networks. ISC 2023: 455-472 - [i41]Colin Boyd, Bor de Kock, Lise Millerjord:
Modular Design of KEM-Based Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2023: 167 (2023) - 2021
- [j38]Colin Boyd, Kai Gellert
:
A Modern View on Forward Security. Comput. J. 64(4): 639-652 (2021) - [j37]Colin Boyd:
Introduction to the Special Issue on TLS 1.3. J. Cryptol. 34(3): 24 (2021) - [c178]Colin Boyd, Gareth T. Davies
, Bor de Kock
, Kai Gellert
, Tibor Jager, Lise Millerjord
:
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. ASIACRYPT (4) 2021: 681-710 - [c177]Enio Marku, Gergely Biczók
, Colin Boyd:
SafeLib: a practical library for outsourcing stateful network functions securely. NetSoft 2021: 244-252 - [i40]Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord:
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. IACR Cryptol. ePrint Arch. 2021: 702 (2021) - 2020
- [b2]Colin Boyd, Anish Mathuria, Douglas Stebila
:
Protocols for Authentication and Key Establishment, Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-58145-2, pp. 1-440 - [j36]Enio Marku, Gergely Biczók
, Colin Boyd:
Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Commun. Mag. 58(7): 72-77 (2020) - [j35]Man Ho Au, Jinguang Han, Qianhong Wu, Colin Boyd:
Special Issue on Cryptographic Currency and Blockchain Technology. Future Gener. Comput. Syst. 107: 758-759 (2020) - [c176]Colin Boyd, Kristian Gjøsteen, Shuang Wu:
A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. FMBC@CAV 2020: 5:1-5:13 - [c175]Colin Boyd, Gareth T. Davies
, Kristian Gjøsteen, Yao Jiang
:
Fast and Secure Updatable Encryption. CRYPTO (1) 2020: 464-493 - [c174]Colin Boyd, Thomas Haines, Peter B. Rønne
:
Vote Selling Resistant Voting. Financial Cryptography Workshops 2020: 345-359
2010 – 2019
- 2019
- [c173]Colin Boyd, Kristian Gjøsteen, Clémentine Gritti, Thomas Haines:
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. INDOCRYPT 2019: 250-270 - [c172]Enio Marku, Gergely Biczók
, Colin Boyd:
Towards protected VNFs for multi-operator service delivery. NetSoft 2019: 19-23 - [i39]Colin Boyd, Kai Gellert:
A Modern View on Forward Security. IACR Cryptol. ePrint Arch. 2019: 1362 (2019) - [i38]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
RISE and SHINE: Fast and Secure Updatable Encryption. IACR Cryptol. ePrint Arch. 2019: 1457 (2019) - 2018
- [c171]Colin Boyd, Gareth T. Davies
, Kristian Gjøsteen, Håvard Raddum
, Mohsen Toorani
:
Definitions for Plaintext-Existence Hiding in Cloud Storage. ARES 2018: 41:1-41:7 - [c170]Halldis Sohoel, Martin Gilje Jaatun, Colin Boyd:
OWASP Top 10 - Do Startups Care? Cyber Security 2018: 1-8 - [c169]Colin Boyd, Christopher Carr:
Valuable Puzzles for Proofs-of-Work. DPM/CBT@ESORICS 2018: 130-139 - [c168]Colin Boyd, Gareth T. Davies
, Kristian Gjøsteen, Yao Jiang
:
Offline Assisted Group Key Exchange. ISC 2018: 268-285 - [c167]Colin Boyd, Gareth T. Davies
, Kristian Gjøsteen, Håvard Raddum
, Mohsen Toorani
:
Security Notions for Cloud Storage and Deduplication. ProvSec 2018: 347-365 - [i37]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Offline Assisted Group Key Exchange. IACR Cryptol. ePrint Arch. 2018: 114 (2018) - [i36]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. IACR Cryptol. ePrint Arch. 2018: 748 (2018) - 2017
- [j34]Kenneth Radke, Colin Boyd:
Security Proofs for Protocols Involving Humans. Comput. J. 60(4): 527-540 (2017) - [j33]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [c166]Frederik Armknecht
, Colin Boyd, Gareth T. Davies
, Kristian Gjøsteen, Mohsen Toorani
:
Side Channels in Deduplication: Trade-offs between Leakage and Efficiency. AsiaCCS 2017: 266-274 - [c165]Colin Boyd, Britta Hale
:
Secure Channels and Termination: The Last Word on TLS. LATINCRYPT 2017: 44-65 - [i35]Christopher Carr, Colin Boyd, Xavier Boyen, Thomas Haines:
Bitcoin Unchained. ERCIM News 2017(110) (2017) - [i34]Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. IACR Cryptol. ePrint Arch. 2017: 243 (2017) - [i33]Colin Boyd, Britta Hale:
Secure Channels and Termination: The Last Word on TLS. IACR Cryptol. ePrint Arch. 2017: 784 (2017) - [i32]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum:
Security notions for cloud storage and deduplication. IACR Cryptol. ePrint Arch. 2017: 1208 (2017) - 2016
- [j32]Hussain Nyeem
, Wageeh W. Boles
, Colin Boyd:
Modelling attacks on self-authentication watermarking. Multim. Tools Appl. 75(23): 15849-15880 (2016) - [c164]Colin Boyd, Christopher Carr:
Fair Client Puzzles from the Bitcoin Blockchain. ACISP (1) 2016: 161-177 - [c163]Colin Boyd, Britta Hale
, Stig Frode Mjølsnes
, Douglas Stebila
:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016: 55-71 - [c162]Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. Mycrypt 2016: 111-126 - [c161]Gergely Biczók
, Balázs Sonkoly
, Nikolett Bereczky, Colin Boyd:
Private VNFs for collaborative multi-operator service delivery: An architectural case. NOMS 2016: 1249-1252 - [i31]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016(106) (2016) - [i30]Colin Boyd, Christopher Carr:
Fair Client Puzzles from the Bitcoin Blockchain. IACR Cryptol. ePrint Arch. 2016: 680 (2016) - [i29]Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side channels in deduplication: trade-offs between leakage and efficiency. IACR Cryptol. ePrint Arch. 2016: 977 (2016) - 2015
- [j31]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett
:
CHURNs: Freshness Assurance for Humans. Comput. J. 58(10): 2404-2425 (2015) - [j30]Younes Seifi, Suriadi Suriadi, Ernest Foo
, Colin Boyd:
Analysis of two authorization protocols using Colored Petri Nets. Int. J. Inf. Sec. 14(3): 221-247 (2015) - [j29]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Colin Boyd:
Identity-based proxy signatures: a generic construction and a concrete scheme from RSA. Secur. Commun. Networks 8(18): 3602-3614 (2015) - [c160]Janaka Alawatugoda
, Douglas Stebila
, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography 2015: 86-106 - [c159]Janaka Alawatugoda
, Douglas Stebila
, Colin Boyd:
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. IMACC 2015: 277-294 - [i28]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. IACR Cryptol. ePrint Arch. 2015: 335 (2015) - [i27]Chris Pavlovski, Colin Boyd:
Microcash: Efficient Off-Line Small Payments. IACR Cryptol. ePrint Arch. 2015: 635 (2015) - [i26]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. IACR Cryptol. ePrint Arch. 2015: 1150 (2015) - [i25]Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand:
A Guide to Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2015: 1192 (2015) - 2014
- [j28]Long Ngo, Colin Boyd, Juan Manuel González Nieto:
Automated Proofs for Computational Indistinguishability. Comput. J. 57(10): 1513-1536 (2014) - [j27]Hussain Nyeem
, Wageeh W. Boles
, Colin Boyd:
Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP J. Adv. Signal Process. 2014: 135 (2014) - [j26]Aiiad Albeshri
, Colin Boyd, Juan Manuel González Nieto:
Enhanced GeoProof: improved geographic assurance for data in the cloud. Int. J. Inf. Sec. 13(2): 191-198 (2014) - [j25]Younes Seifi, Suriadi Suriadi, Ernest Foo
, Colin Boyd:
Security properties analysis in a TPM-based protocol. Int. J. Secur. Networks 9(2): 85-103 (2014) - [c158]Janaka Alawatugoda
, Colin Boyd, Douglas Stebila
:
Continuous After-the-Fact Leakage-Resilient Key Exchange. ACISP 2014: 258-273 - [c157]Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila:
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. AISC 2014: 37-45 - [c156]Janaka Alawatugoda
, Douglas Stebila
, Colin Boyd:
Modelling after-the-fact leakage for key exchange. AsiaCCS 2014: 207-216 - [c155]Mats Sandvoll, Colin Boyd, Bjørn B. Larsen:
PassCue: The Shared Cues System in Practice. PASSWORDS 2014: 119-137 - [c154]Britta Hale
, Colin Boyd:
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. SSR 2014: 236-255 - [i24]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling After-the-fact Leakage for Key Exchange. IACR Cryptol. ePrint Arch. 2014: 131 (2014) - [i23]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient Key Exchange (full version). IACR Cryptol. ePrint Arch. 2014: 264 (2014) - [i22]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 724 (2014) - 2013
- [j24]Hussain Nyeem
, Wageeh W. Boles
, Colin Boyd:
A Review of Medical Image Watermarking Requirements for Teleradiology. J. Digit. Imaging 26(2): 326-343 (2013) - [j23]Colin Boyd:
Cryptography in the Cloud: Advances and Challenges. J. Inform. and Commun. Convergence Engineering 11(1): 17-23 (2013) - [j22]Dongdong Sun, Colin Boyd, Juan Manuel González Nieto:
Predicate encryption for multi-inner-products. Secur. Commun. Networks 6(3): 325-339 (2013) - [c153]Hussain Nyeem
, Wageeh W. Boles
, Colin Boyd:
Utilizing Least Significant Bit-Planes of RONI Pixels for Medical Image Watermarking. DICTA 2013: 1-8 - [c152]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013: 381-399 - [c151]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Laurie Buys
:
"Who decides?": security and privacy in the wild. OZCHI 2013: 27-36 - [c150]Hussain Nyeem
, Wageeh W. Boles
, Colin Boyd:
Counterfeiting attacks on block-wise dependent fragile watermarking schemes. SIN 2013: 86-93 - [e10]Colin Boyd, Leonie Simpson:
Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings. Lecture Notes in Computer Science 7959, Springer 2013, ISBN 978-3-642-39058-6 [contents] - [i21]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. IACR Cryptol. ePrint Arch. 2013: 398 (2013) - 2012
- [c149]Jothi Rangasamy
, Douglas Stebila
, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy
:
Effort-Release Public-Key Encryption from Cryptographic Puzzles. ACISP 2012: 194-207 - [c148]Kaleb Lee, Colin Boyd, Juan Manuel González Nieto:
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking. ACISP 2012: 434-441 - [c147]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton:
Towards a Secure Human-and-Computer Mutual Authentication Protocol. AISC 2012: 39-46 - [c146]Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets. AISC 2012: 47-58 - [c145]Kaleb Lee, Juan Manuel González Nieto, Colin Boyd:
Improving the Efficiency of RFID Authentication with Pre-Computation. AISC 2012: 91-100 - [c144]Lakshmi Kuppusamy
, Jothi Rangasamy
, Douglas Stebila
, Colin Boyd, Juan Manuel González Nieto:
Practical client puzzles in the standard model. AsiaCCS 2012: 42-43 - [c143]Kaleb Lee, Juan Manuel González Nieto, Colin Boyd:
A State-Aware RFID Privacy Model with Reader Corruption. CSS 2012: 324-338 - [c142]Aiiad Albeshri
, Colin Boyd, Juan Manuel González Nieto:
GeoProof: Proofs of Geographic Location for Cloud Computing Environment. ICDCS Workshops 2012: 506-514 - [c141]Colin Boyd, Denis Edwards, Philip Loftus, Timothy G. Schaefer:
Chief information officer (CIO) panel: how to groom IT leadership as change agents. CPR 2012: 1-2 - 2011
- [j21]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis
:
Modeling key compromise impersonation attacks on group key exchange protocols. ACM Trans. Inf. Syst. Secur. 14(4): 28:1-28:24 (2011) - [c140]Jothi Rangasamy
, Douglas Stebila
, Colin Boyd, Juanma González Nieto:
An integrated approach to cryptographic mitigation of denial-of-service attacks. AsiaCCS 2011: 114-123 - [c139]Long Ngo, Colin Boyd, Juanma González Nieto:
Automated Proofs for Diffie-Hellman-Based Key Exchanges. CSF 2011: 51-65 - [c138]Douglas Stebila
, Lakshmi Kuppusamy
, Jothi Rangasamy
, Colin Boyd, Juan Manuel González Nieto:
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. CT-RSA 2011: 284-301 - [c137]Hussain Nyeem
, Wageeh W. Boles
, Colin Boyd:
Developing a Digital Image Watermarking Model. DICTA 2011: 468-473 - [c136]Jothi Rangasamy
, Douglas Stebila
, Lakshmi Kuppusamy
, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection. ICISC 2011: 319-331 - [c135]Colin Boyd, Juanma González Nieto:
On Forward Secrecy in One-Round Key Exchange. IMACC 2011: 451-468 - [c134]Lakshmi Kuppusamy
, Jothi Rangasamy
, Douglas Stebila
, Colin Boyd, Juanma González Nieto:
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy. INDOCRYPT 2011: 379-398 - [c133]Kenneth Radke, Margot Brereton
, Seyed Hadi Mirisaee, Sunil Ghelawat, Colin Boyd, Juan Manuel González Nieto:
Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing. INTERACT (2) 2011: 524-532 - [c132]Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed
:
User-representative feature selection for keystroke dynamics. NSS 2011: 229-233 - [c131]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton
:
Ceremony Analysis: Strengths and Weaknesses. SEC 2011: 104-115 - [e9]Colin Boyd, Josef Pieprzyk:
Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. CRPIT 116, Australian Computer Society 2011, ISBN 978-1-920682-96-5 [contents] - [i20]Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection. IACR Cryptol. ePrint Arch. 2011: 665 (2011) - 2010
- [c130]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Attribute-Based Authenticated Key Exchange. ACISP 2010: 300-317 - [c129]Craig Costello
, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong
:
Avoiding Full Extension Field Arithmetic in Pairing Computations. AFRICACRYPT 2010: 203-224 - [c128]Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Asadul K. Islam:
Continuous Biometric Authentication: Can It Be More Practical? HPCC 2010: 647-652 - [c127]Kenneth Radke, Colin Boyd, Margot Brereton
, Juan Manuel González Nieto:
How HCI design influences web security decisions. OZCHI 2010: 252-255 - [c126]Long Ngo, Colin Boyd, Juan Manuel González Nieto:
Automating Computational Proofs for Public-Key-Based Key Exchange. ProvSec 2010: 53-69 - [c125]Dongdong Sun, Colin Boyd, Juan Manuel González Nieto:
Delegation in Predicate Encryption Supporting Disjunctive Queries. SEC 2010: 229-240 - [c124]Craig Costello
, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong
:
Delaying Mismatched Field Multiplications in Pairing Computations. WAIFI 2010: 196-214 - [e8]Colin Boyd, Willy Susilo:
8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010. CRPIT 105, Australian Computer Society 2010, ISBN 978-1-920682-86-6 [contents] - [i19]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
One Round Group Key Exchange with Forward Security in the Standard Model. IACR Cryptol. ePrint Arch. 2010: 83 (2010) - [i18]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Attribute-based Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2010: 84 (2010) - [i17]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Avoiding Full Extension Field Arithmetic in Pairing Computations. IACR Cryptol. ePrint Arch. 2010: 104 (2010) - [i16]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Delaying Mismatched Field Multiplications in Pairing Computations. IACR Cryptol. ePrint Arch. 2010: 123 (2010) - [i15]Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto:
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. IACR Cryptol. ePrint Arch. 2010: 649 (2010)
2000 – 2009
- 2009
- [j20]Baoyuan Kang
, Colin Boyd, Ed Dawson
:
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Comput. Electr. Eng. 35(1): 9-17 (2009) - [j19]Baoyuan Kang
, Colin Boyd, Ed Dawson
:
Identity-based strong designated verifier signature schemes: Attacks and new construction. Comput. Electr. Eng. 35(1): 49-53 (2009) - [j18]Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
One-round key exchange in the standard model. Int. J. Appl. Cryptogr. 1(3): 181-199 (2009) - [j17]Baoyuan Kang
, Colin Boyd, Ed Dawson
:
A novel identity-based strong designated verifier signature scheme. J. Syst. Softw. 82(2): 270-273 (2009) - [c123]Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto:
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. ACNS 2009: 53-70 - [c122]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Strong Designated Verifier Signature in a Multi-user Setting. AISC 2009: 21-31 - [c121]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Universally composable contributory group key exchange. AsiaCCS 2009: 146-156 - [c120]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis
:
Generic One Round Group Key Exchange in the Standard Model. ICISC 2009: 1-15 - [c119]Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Efficient Certificateless KEM in the Standard Model. ICISC 2009: 34-46 - [c118]Craig Costello
, Hüseyin Hisil, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong
:
Faster Pairings on Special Weierstrass Curves. Pairing 2009: 89-101 - [c117]Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Strongly Secure Certificateless Key Agreement. Pairing 2009: 206-230 - [c116]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Public Key Cryptography 2009: 105-123 - [c115]Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Colin Boyd, Ernest Foo
:
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA. S-CUBE 2009: 66-82 - [e7]Colin Boyd, Juan Manuel González Nieto:
Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. Lecture Notes in Computer Science 5594, Springer 2009, ISBN 978-3-642-02619-5 [contents] - [i14]Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto:
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. IACR Cryptol. ePrint Arch. 2009: 136 (2009) - [i13]Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Strongly Secure Certificateless Key Agreement. IACR Cryptol. ePrint Arch. 2009: 219 (2009) - [i12]Craig Costello, Hüseyin Hisil, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Faster Pairings on Special Weierstrass Curves. IACR Cryptol. ePrint Arch. 2009: 243 (2009) - [i11]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. IACR Cryptol. ePrint Arch. 2009: 291 (2009) - [i10]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Universally Composable Contributory Group Key Exchange. IACR Cryptol. ePrint Arch. 2009: 300 (2009) - [i9]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
On the Connection between Signcryption and One-pass Key Establishment. IACR Cryptol. ePrint Arch. 2009: 436 (2009) - [i8]Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Efficient Certificateless KEM in the Standard Model. IACR Cryptol. ePrint Arch. 2009: 451 (2009) - [i7]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Generic One Round Group Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2009: 514 (2009) - 2008
- [j16]Rong Du, Ernest Foo
, Colin Boyd:
Designing a secure e-tender submission protocol. Electron. Commer. Res. 8(3): 115-142 (2008) - [c114]Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
Efficient One-Round Key Exchange in the Standard Model. ACISP 2008: 69-83 - [c113]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
ID-based One-pass Authenticated Key Establishment. AISC 2008: 39-46 - [c112]Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles
:
A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault. DICTA 2008: 540-547 - [c111]Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles
:
A Multiple-Control Fuzzy Vault. PST 2008: 36-47 - [i6]Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
Efficient One-round Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2008: 7 (2008) - 2007
- [j15]Audun Jøsang
, Roslan Ismail, Colin Boyd:
A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2): 618-644 (2007) - [j14]Jason Smith, Suratose Tritilanunt, Colin Boyd, Juan Manuel González Nieto, Ernest Foo
:
Denial-of-service resistance in key establishment. Int. J. Wirel. Mob. Comput. 2(1): 59-71 (2007) - [j13]Kun Peng, Colin Boyd, Ed Dawson
:
Batch zero-knowledge proof and verification and its applications. ACM Trans. Inf. Syst. Secur. 10(2): 6 (2007) - [c110]Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. ACSC 2007: 191-200 - [c109]Suratose Tritilanunt, Colin Boyd, Ernest Foo
, Juan Manuel González Nieto:
Toward Non-parallelizable Client Puzzles. CANS 2007: 247-264 - [c108]JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd:
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. EUC Workshops 2007: 557-567 - [c107]JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd:
Low-Cost and Strong-Security RFID Authentication Protocol. EUC Workshops 2007: 795-807 - [c106]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
On the Connection Between Signcryption and One-Pass Key Establishment. IMACC 2007: 277-301 - [c105]Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto:
Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMACC 2007: 403-421 - [c104]Jason Dowling
, Birgit M. Planitz, Anthony J. Maeder
, Jiang Du, Binh Pham, Colin Boyd, Shaokang Chen, Andrew P. Bradley
, Stuart Crozier
:
A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality. IWDW 2007: 454-466 - [c103]JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd:
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). PAKDD Workshops 2007: 574-583 - 2006
- [j12]Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto:
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Appl. Algebra Eng. Commun. Comput. 16(6): 405-438 (2006) - [j11]Kim-Kwang Raymond Choo
, Colin Boyd, Yvonne Hitchcock:
The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Comput. Commun. 29(15): 2788-2797 (2006) - [j10]Kun Peng, Colin Boyd, Ed Dawson
:
Batch verification of validity of bids in homomorphic e-auction. Comput. Commun. 29(15): 2798-2805 (2006) - [c102]Kun Peng, Colin Boyd, Ed Dawson
, Eiji Okamoto:
A Novel Range Test. ACISP 2006: 247-258 - [c101]Colin Boyd, Kim-Kwang Raymond Choo
, Anish Mathuria:
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. ACISP 2006: 371-382 - [c100]Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd:
Password Based Server Aided Key Exchange . ACNS 2006: 146-161 - [c99]Jason Smith, Juan Manuel González Nieto, Colin Boyd:
Modelling denial of service attacks on JFK with Meadows's cost-based framework. ACSW 2006: 125-134 - [c98]Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo:
Formal analysis of secure contracting protocol for e-tendering. ACSW 2006: 155-164 - [c97]Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto:
SKMA: a key management architecture for SCADA systems. ACSW 2006: 183-192 - [c96]Jaimee Brown, Juan Manuel González Nieto, Colin Boyd:
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. CANS 2006: 1-18 - [c95]JaeCheol Ha, JungHoon Ha, Sang-Jae Moon, Colin Boyd:
LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. ICUCT 2006: 80-89 - [c94]Jaimee Brown, Juan Manuel González Nieto, Colin Boyd:
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. INDOCRYPT 2006: 176-190 - [c93]Suratose Tritilanunt, Colin Boyd, Ernest Foo
, Juan Manuel González Nieto:
Examining the DoS Resistance of HIP. OTM Workshops (1) 2006: 616-625 - [c92]Sherman S. M. Chow
, Colin Boyd, Juan Manuel González Nieto:
Security-Mediated Certificateless Cryptography. Public Key Cryptography 2006: 508-524 - [c91]Kun Peng, Colin Boyd, Ed Dawson
:
Sealed-Bid Micro Auctions. SEC 2006: 246-257 - [c90]Rong Du, Colin Boyd, Ernest Foo
:
A Secure E-Tender Submission Protocol. TrustBus 2006: 213-222 - 2005
- [j9]Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson:
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. Comput. Syst. Sci. Eng. 20(6) (2005) - [j8]Juan Manuel González Nieto, Colin Boyd, Ed Dawson
:
A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptogr. 36(3): 301-316 (2005) - [j7]Colin Boyd, Wenbo Mao:
Preface to the special issue on ISC 2003. Int. J. Inf. Sec. 4(4): 227-227 (2005) - [c89]Kim-Kwang Raymond Choo
, Colin Boyd, Yvonne Hitchcock:
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. ASIACRYPT 2005: 585-604 - [c88]Kim-Kwang Raymond Choo
, Colin Boyd, Yvonne Hitchcock:
Errors in Computational Complexity Proofs for Protocols. ASIACRYPT 2005: 624-643 - [c87]Kun Peng, Colin Boyd, Ed Dawson:
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. CRYPTO 2005: 188-204 - [c86]Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Ciphertext Comparison, a New Solution to the Millionaire Problem. ICICS 2005: 84-96 - [c85]Kun Peng, Colin Boyd, Ed Dawson:
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. ISC 2005: 374-388 - [c84]Kun Peng, Colin Boyd, Ed Dawson:
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. Mycrypt 2005: 84-98 - [c83]Kim-Kwang Raymond Choo
, Colin Boyd, Yvonne Hitchcock:
On Session Key Construction in Provably-Secure Key Establishment Protocols. Mycrypt 2005: 116-131 - [c82]Colin Boyd, Kim-Kwang Raymond Choo
:
Security of Two-Party Identity-Based Key Agreement. Mycrypt 2005: 229-243 - [c81]Rong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd:
Designing Secure E-Tendering Systems. TrustBus 2005: 70-79 - [e6]Colin Boyd, Juan Manuel González Nieto:
Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Lecture Notes in Computer Science 3574, Springer 2005, ISBN 3-540-26547-3 [contents] - [i5]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols. IACR Cryptol. ePrint Arch. 2005: 206 (2005) - [i4]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. IACR Cryptol. ePrint Arch. 2005: 270 (2005) - [i3]Kun Peng, Colin Boyd, Ed Dawson:
Batch Verification of Validity of Bids in Homomorphic E-auction. IACR Cryptol. ePrint Arch. 2005: 346 (2005) - [i2]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock:
Errors in Computational Complexity Proofs for Protocols. IACR Cryptol. ePrint Arch. 2005: 351 (2005) - 2004
- [c80]Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto:
Protocols with Security Proofs for Mobile Applications. ACISP 2004: 358-369 - [c79]Colin Boyd, Wenbo Mao, Kenneth G. Paterson:
Key Agreement Using Statically Keyed Authenticators. ACNS 2004: 248-262 - [c78]Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ACNS 2004: 494-508 - [c77]Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald:
Defining Security Services for Electronic Tendering. ACSW 2004: 43-52 - [c76]Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Secure Key Issuing in ID-based Cryptography. ACSW 2004: 69-74 - [c75]Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71 - [c74]Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee:
An Efficient and Verifiable Solution to the Millionaire Problem. ICISC 2004: 51-66 - [c73]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:
Complementing Computational Protocol Analysis with Formal Specifications. Formal Aspects in Security and Trust 2004: 129-144 - [c72]Colin Boyd:
Design of Secure Key Establishment Protocols: Successes, Failures and Prospects. INDOCRYPT 2004: 1-13 - [c71]Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto:
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. INDOCRYPT 2004: 17-32 - [c70]Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee:
Multiplicative Homomorphic E-Voting. INDOCRYPT 2004: 61-72 - [c69]Harikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto:
A Secure Framework for User Privacy in Heterogeneous Location Networks. MATA 2004: 264-274 - [c68]Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan:
A Correct, Private, and Efficient Mix Network. Public Key Cryptography 2004: 439-454 - [c67]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. SCN 2004: 351-366 - [c66]Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell:
An Efficient Off-Line Reputation Scheme Using Articulated Certificates. WOSIS 2004: 53-62 - [c65]Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell:
Private Reputation Schemes for P2P systems. WOSIS 2004: 196-206 - [c64]Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson:
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. TrustBus 2004: 152-161 - [i1]Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. IACR Cryptol. ePrint Arch. 2004: 345 (2004) - 2003
- [b1]Colin Boyd, Anish Mathuria:
Protocols for Authentication and Key Establishment. Information Security and Cryptography, Springer 2003, ISBN 978-3-642-07716-6, pp. I-XXIV, 1-323 - [c63]Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto:
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. ACISP 2003: 166-179 - [c62]Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Five Sealed-bid Auction Models. ACSW 2003: 77-86 - [c61]Yiu Shing Terry Tin, Colin Boyd, Juanma González Nieto:
Provably Secure Key Exchange: An Engineering Approach. ACSW 2003: 97-104 - [c60]Roslan Ismail, Colin Boyd, Audun Jøsang
, Selwyn Russell:
A Security Architecture for Reputation Systems. EC-Web 2003: 176-185 - [c59]Riza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Secure e-Voting for Preferential Elections. EGOV 2003: 246-249 - [c58]Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. ICISC 2003: 245-258 - [c57]Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague:
A Password-Based Authenticator: Security Proof and Applications. INDOCRYPT 2003: 388-401 - [c56]Colin Boyd, Juan Manuel González Nieto:
Round-Optimal Contributory Conference Key Agreement. Public Key Cryptography 2003: 161-174 - [c55]Colin Boyd, Wenbo Mao, Kenneth G. Paterson:
Deniable Authenticated Key Establishment for Internet Protocols. Security Protocols Workshop 2003: 255-271 - [c54]Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan:
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. WISA 2003: 244-256 - [e5]Colin Boyd, Wenbo Mao:
Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings. Lecture Notes in Computer Science 2851, Springer 2003, ISBN 3-540-20176-9 [contents] - 2002
- [j6]Kapali Viswanathan, Colin Boyd, Ed Dawson
:
Hybrid Key Escrow: A New Paradigm. Comput. Secur. 21(1): 77-92 (2002) - [j5]Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson:
Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002) - [j4]Ed Dawson, Kapali Viswanathan, Colin Boyd:
Compliant cryptologic protocols. Int. J. Inf. Sec. 1(3): 189-202 (2002) - [c53]Greg Maitland, Colin Boyd:
Co-operatively Formed Group Signatures. CT-RSA 2002: 218-235 - [c52]Colin Boyd, Kapali Viswanathan:
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. FASec 2002: 49-61 - [c51]Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. ICICS 2002: 147-159 - [c50]Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Non-interactive Auction Schemewith Strong Privacy. ICISC 2002: 407-420 - [c49]Greg Maitland, Colin Boyd:
A Provably Secure Restrictive Partially Blind Signature Scheme. Public Key Cryptography 2002: 99-114 - 2001
- [c48]Chris Pavlovski
, Colin Boyd:
Attacks Based on Small Factors in Various Group Structures. ACISP 2001: 36-50 - [c47]DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson
:
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. ACISP 2001: 334-343 - [c46]Colin Boyd, Paul Montague, Khanh Quoc Nguyen:
Elliptic Curve Based Password Authenticated Key Exchange Protocols. ACISP 2001: 487-501 - [c45]Juan Manuel González Nieto, Colin Boyd, Ed Dawson:
A Public Key Cryptosystem Based on the Subgroup Membership Problem. ICICS 2001: 352-363 - [c44]Greg Maitland, Colin Boyd:
Fair Electronic Cash Based on a Group Signature Scheme. ICICS 2001: 461-465 - [c43]Kapali Viswanathan, Colin Boyd, Ed Dawson:
An Analysis of Integrity Services in Protocols. INDOCRYPT 2001: 175-187 - [e4]Colin Boyd:
Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings. Lecture Notes in Computer Science 2248, Springer 2001, ISBN 3-540-42987-5 [contents] - 2000
- [j3]Colin Boyd, Anish Mathuria:
Key establishment protocols for secure mobile communications: a critical survey. Comput. Commun. 23(5-6): 575-587 (2000) - [c42]Ernest Foo
, Colin Boyd:
Passive Entities: A Strategy for Electronic Payment Design. ACISP 2000: 134-148 - [c41]Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson
:
Key Recovery System for the Commercial Environment. ACISP 2000: 149-162 - [c40]Kapali Viswanathan, Colin Boyd, Ed Dawson
:
A Three Phased Schema for Sealed Bid Auction System Design. ACISP 2000: 412-426 - [c39]Colin Boyd, Chris Pavlovski:
Attacking and Repairing Batch Verification Schemes. ASIACRYPT 2000: 58-71 - [c38]DongGook Park, Colin Boyd, Ed Dawson
:
Micropayments for Wireless Communications. ICISC 2000: 192-205 - [c37]Greg Maitland, Jason Reid, Ernest Foo
, Colin Boyd, Ed Dawson:
Linkability in Practical Electronic Cash Design. ISW 2000: 149-163 - [c36]DongGook Park, Colin Boyd, Ed Dawson:
Classification of Authentication Protocols: A Practical Approach. ISW 2000: 194-208 - [c35]Colin Boyd, Peter Kearney:
Exploring Fair Exchange Protocols Using Specification Animation. ISW 2000: 209-223 - [c34]Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson:
Key Recovery in Third Generation Wireless Communication Systems. Public Key Cryptography 2000: 223-237 - [c33]DongGook Park, Colin Boyd, Sang-Jae Moon:
Forward Secrecy and Its Application to Future Mobile Communications Security. Public Key Cryptography 2000: 433-445 - [e3]Ed Dawson
, Andrew J. Clark, Colin Boyd:
Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings. Lecture Notes in Computer Science 1841, Springer 2000, ISBN 3-540-67742-9 [contents]
1990 – 1999
- 1999
- [c32]Kapali Viswanathan, Colin Boyd, Ed Dawson:
Publicly Verifiable Key Escrow with Limited Time Span. ACISP 1999: 36-50 - [c31]Colin Boyd, Ernest Foo
, Chris Pavlovski:
Efficient Electronic Cash Using Batch Signatures. ACISP 1999: 244-257 - [c30]Chris Pavlovski
, Colin Boyd, Ernest Foo
:
Detachable Electronic Coins. ICICS 1999: 54-70 - [c29]Kapali Viswanathan, Colin Boyd, Ed Dawson
:
Signature Scheme for Controlled Environments. ICICS 1999: 119-134 - [c28]Kapali Viswanathan, Colin Boyd, Ed Dawson
:
Secure Selection Protocols. ICISC 1999: 132-146 - [c27]Kapali Viswanathan, Colin Boyd, Ed Dawson
:
Strong Binding for Software Key Escrow. ICPP Workshops 1999: 134-139 - [c26]Xian Liu, Patrick Guy Farrell, Colin Boyd:
A Unified Code. IMACC 1999: 84-93 - 1998
- [c25]Colin Boyd, Anish Mathuria:
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. ACISP 1998: 344-355 - [c24]Colin Boyd, Ernest Foo
:
Off-Line Fair Payment Protocols Using Convertible Signatures. ASIACRYPT 1998: 271-285 - [c23]Ernest Foo
, Colin Boyd:
A Payment Scheme Using Vouchers. Financial Cryptography 1998: 103-121 - [c22]Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell:
A security architecture for third generation wireless systems. ICISC 1998: 15-32 - [c21]Colin Boyd, DongGook Park:
Public key protocols for wireless communications. ICISC 1998: 47-57 - [e2]Colin Boyd, Ed Dawson:
Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings. Lecture Notes in Computer Science 1438, Springer 1998, ISBN 3-540-64732-5 [contents] - 1997
- [j2]Colin Boyd, John G. Cleary, Sean A. Irvine, Ingrid Rinsma-Melchert, Ian H. Witten
:
Integrating error detection into arithmetic coding. IEEE Trans. Commun. 45(1): 1-3 (1997) - [c20]Jen Lim, Colin Boyd, Ed Dawson
:
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. ACISP 1997: 216-227 - [c19]Colin Boyd:
On Key Agreement and Conference Key Agreement. ACISP 1997: 294-302 - [c18]Colin Boyd:
Digital signature and public key cryptosystems in a prime order subgroup of Zn*. ICICS 1997: 346-355 - [c17]Colin Boyd:
Enforcing traceability in software. ICICS 1997: 398-408 - [c16]Xian Liu, Patrick Guy Farrell, Colin Boyd:
Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding. IMACC 1997: 199-208 - [c15]Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson:
A taxonomy of electronic cash schemes. SEC 1997: 337-348 - 1996
- [c14]Colin Boyd:
A Framework for Design of Key Establishment Protocols. ACISP 1996: 146-157 - [c13]Colin Boyd:
A Class of Flexible and Efficient Key Management Protocols. CSFW 1996: 2-8 - 1995
- [c12]Colin Boyd:
Towards a classification of key agreement protocols. CSFW 1995: 38-43 - [c11]Andrew Smith, Colin Boyd:
An Elliptic Curve Analogue of McCurley's Key Agreement Scheme. IMACC 1995: 150-157 - [e1]Colin Boyd:
Cryptography and Coding, 5th IMA Conference, Cirencester, UK, December 18-20, 1995, Proceedings. Lecture Notes in Computer Science 1025, Springer 1995, ISBN 3-540-60693-9 [contents] - 1994
- [c10]Colin Boyd, Wenbo Mao:
Design and Analysis of Key Exchange Protocols via Secure Channel Identification. ASIACRYPT 1994: 171-181 - [c9]Wenbo Mao, Colin Boyd:
Development of Authentication Protocols: Some Misconceptions and a New Approach. CSFW 1994: 178-186 - [c8]Colin Boyd, Wenbo Mao:
Designing Secure Key Exchange Protocols. ESORICS 1994: 93-105 - [c7]Wenbo Mao, Colin Boyd:
On Strengthening Authentication Protocols to Foil Cryptanalysis. ESORICS 1994: 193-204 - 1993
- [j1]Colin Boyd:
Security Architectures Using Formal Methods. IEEE J. Sel. Areas Commun. 11(5): 694-701 (1993) - [c6]Wenbo Mao, Colin Boyd:
Towards Formal Analysis of Security Protocols. CSFW 1993: 147-158 - [c5]Colin Boyd, Wenbo Mao:
On a Limitation of BAN Logic. EUROCRYPT 1993: 240-247 - 1992
- [c4]Colin Boyd:
A Formal Framework for Authentication. ESORICS 1992: 273-292 - 1991
- [c3]Colin Boyd:
Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects. EUROCRYPT 1991: 266-280
1980 – 1989
- 1989
- [c2]Colin Boyd:
A New Multiple Key Cipher and an Improved Voting Scheme. EUROCRYPT 1989: 617-625 - 1988
- [c1]Colin Boyd:
Some Applications of Multiple Key Ciphers. EUROCRYPT 1988: 455-467
Coauthor Index
aka: Juanma González Nieto

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint