Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Colin
    Last name: Boyd
    DBLP: b/ColinBoyd
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 229  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Colin Boyd, Cas J. F. Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila.
    ASICS: authenticated key exchange security incorporating certification systems.
    Int. J. Inf. Sec. 2017, Volume 16 (0) 2017
    Conference paper
    Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines.
    Key Recovery: Inert and Public.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Kenneth Radke, Colin Boyd.
    Security Proofs for Protocols Involving Humans.
    Comput. J. 2017, Volume 60 (0) 2017
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side Channels in Deduplication: Trade-offs between Leakage and Efficiency.
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017 2017 (0) 2017
    Conference paper
    Colin Boyd, Britta Hale, Stig Fr. Mjølsnes, Douglas Stebila.
    From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
    Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Colin Boyd, Christopher Carr.
    Fair Client Puzzles from the Bitcoin Blockchain.
    Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I 2016 (0) 2016
    Conference paper
    Gergely Biczók, Balázs Sonkoly, Nikolett Bereczky, Colin Boyd.
    Private VNFs for collaborative multi-operator service delivery: An architectural case.
    2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016 2016 (0) 2016
    Conference paper
    Colin Boyd, Christopher Carr.
    Fair Client Puzzles from the Bitcoin Blockchain.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani.
    Using Cryptography to Control Your Data at a Distance.
    ERCIM News 2016, Volume 2016 (0) 2016
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side channels in deduplication: trade-offs between leakage and efficiency.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Hussain Nyeem, Wageeh W. Boles, Colin Boyd.
    Modelling attacks on self-authentication watermarking.
    Multimedia Tools Appl. 2016, Volume 75 (0) 2016
    Conference paper
    Janaka Alawatugoda, Colin Boyd, Douglas Stebila.
    Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd.
    Analysis of two authorization protocols using Colored Petri Nets.
    Int. J. Inf. Sec. 2015, Volume 14 (0) 2015
    Conference paper
    Janaka Alawatugoda, Douglas Stebila, Colin Boyd.
    Protecting Encrypted Cookies from Compression Side-Channel Attacks.
    Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Chris Pavlovski, Colin Boyd.
    Microcash: Efficient Off-Line Small Payments.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett.
    CHURNs: Freshness Assurance for Humans.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Colin Boyd, Britta Hale, Stig Fr. Mjølsnes, Douglas Stebila.
    From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Janaka Alawatugoda, Douglas Stebila, Colin Boyd.
    Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange.
    Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings 2015 (0) 2015
    Conference paper
    Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Colin Boyd.
    Identity-based proxy signatures: a generic construction and a concrete scheme from RSA.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Conference paper
    Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Gorke, Martin Strand 0001.
    A Guide to Fully Homomorphic Encryption.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Janaka Alawatugoda, Douglas Stebila, Colin Boyd.
    Modelling After-the-fact Leakage for Key Exchange.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Aiiad Albeshri, Colin Boyd, Juan Manuel González Nieto.
    Enhanced GeoProof: improved geographic assurance for data in the cloud.
    Int. J. Inf. Sec. 2014, Volume 13 (0) 2014
    Conference paper
    Janaka Alawatugoda, Colin Boyd, Douglas Stebila.
    Continuous After-the-fact Leakage-Resilient Key Exchange (full version).
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Janaka Alawatugoda, Douglas Stebila, Colin Boyd.
    Modelling after-the-fact leakage for key exchange.
    9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 2014 (0) 2014
    Conference paper
    Janaka Alawatugoda, Colin Boyd, Douglas Stebila.
    Continuous After-the-Fact Leakage-Resilient Key Exchange.
    Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings 2014 (0) 2014
    Show item 1 to 25 of 229  

    Your query returned 229 matches in the database.