Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Colin
    Last name: Boyd
    DBLP: b/ColinBoyd
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 225  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Colin Boyd, Britta Hale, Stig Fr. Mjølsnes, Douglas Stebila.
    From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
    Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Colin Boyd, Christopher Carr.
    Fair Client Puzzles from the Bitcoin Blockchain.
    Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I 2016 (0) 2016
    Conference paper
    Gergely Biczók, Balázs Sonkoly, Nikolett Bereczky, Colin Boyd.
    Private VNFs for collaborative multi-operator service delivery: An architectural case.
    2016 IEEE/IFIP Network Operations and Management Symposium, NOMS 2016, Istanbul, Turkey, April 25-29, 2016 2016 (0) 2016
    Conference paper
    Colin Boyd, Christopher Carr.
    Fair Client Puzzles from the Bitcoin Blockchain.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani.
    Using Cryptography to Control Your Data at a Distance.
    ERCIM News 2016, Volume 2016 (0) 2016
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side channels in deduplication: trade-offs between leakage and efficiency.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Hussain Nyeem, Wageeh W. Boles, Colin Boyd.
    Modelling attacks on self-authentication watermarking.
    Multimedia Tools Appl. 2016, Volume 75 (0) 2016
    Conference paper
    Janaka Alawatugoda, Colin Boyd, Douglas Stebila.
    Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd.
    Analysis of two authorization protocols using Colored Petri Nets.
    Int. J. Inf. Sec. 2015, Volume 14 (0) 2015
    Conference paper
    Janaka Alawatugoda, Douglas Stebila, Colin Boyd.
    Protecting Encrypted Cookies from Compression Side-Channel Attacks.
    Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Chris Pavlovski, Colin Boyd.
    Microcash: Efficient Off-Line Small Payments.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett.
    CHURNs: Freshness Assurance for Humans.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Colin Boyd, Britta Hale, Stig Fr. Mjølsnes, Douglas Stebila.
    From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Janaka Alawatugoda, Douglas Stebila, Colin Boyd.
    Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange.
    Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings 2015 (0) 2015
    Conference paper
    Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Colin Boyd.
    Identity-based proxy signatures: a generic construction and a concrete scheme from RSA.
    Security and Communication Networks 2015, Volume 8 (0) 2015
    Conference paper
    Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand 0001.
    A Guide to Fully Homomorphic Encryption.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Janaka Alawatugoda, Douglas Stebila, Colin Boyd.
    Modelling After-the-fact Leakage for Key Exchange.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Aiiad Albeshri, Colin Boyd, Juan Manuel González Nieto.
    Enhanced GeoProof: improved geographic assurance for data in the cloud.
    Int. J. Inf. Sec. 2014, Volume 13 (0) 2014
    Conference paper
    Janaka Alawatugoda, Colin Boyd, Douglas Stebila.
    Continuous After-the-fact Leakage-Resilient Key Exchange (full version).
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Janaka Alawatugoda, Douglas Stebila, Colin Boyd.
    Modelling after-the-fact leakage for key exchange.
    9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014 2014 (0) 2014
    Conference paper
    Janaka Alawatugoda, Colin Boyd, Douglas Stebila.
    Continuous After-the-Fact Leakage-Resilient Key Exchange.
    Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Long Ngo, Colin Boyd, Juan Manuel González Nieto.
    Automated Proofs for Computational Indistinguishability.
    Comput. J. 2014, Volume 57 (0) 2014
    Conference paper
    Hussain Nyeem, Wageeh W. Boles, Colin Boyd.
    Digital image watermarking: its formal model, fundamental properties and possible attacks.
    EURASIP J. Adv. Sig. Proc. 2014, Volume 2014 (0) 2014
    Conference paper
    Janaka Alawatugoda, Douglas Stebila, Colin Boyd.
    Protecting Encrypted Cookies from Compression Side-Channel Attacks.
    IACR Cryptology ePrint Archive 2014, Volume 2014 (0) 2014
    Conference paper
    Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Mark Manulis, Douglas Stebila.
    Formalising Human Recognition: a Fundamental Building Block for Security Proofs.
    Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014 2014 (0) 2014
    Conference paper
    Britta Hale, Colin Boyd.
    Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.
    Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Mats Sandvoll, Colin Boyd, Bjørn B. Larsen.
    PassCue: The Shared Cues System in Practice.
    Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers 2015 (0) 2014
    Conference paper
    Dongdong Sun, Colin Boyd, Juan Manuel González Nieto.
    Predicate encryption for multi-inner-products.
    Security and Communication Networks 2013, Volume 6 (0) 2013
    Conference paper
    Hussain Nyeem, Wageeh W. Boles, Colin Boyd.
    A Review of Medical Image Watermarking Requirements for Teleradiology.
    J. Digital Imaging 2013, Volume 26 (0) 2013
    Conference paper
    Colin Boyd, Cas J. F. Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila.
    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Colin Boyd, Cas J. F. Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila.
    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.
    Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Hussain Nyeem, Wageeh W. Boles, Colin Boyd.
    Counterfeiting attacks on block-wise dependent fragile watermarking schemes.
    The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013 2013 (0) 2013
    Conference paper
    Hussain Nyeem, Wageeh W. Boles, Colin Boyd.
    Utilizing Least Significant Bit-Planes of RONI Pixels for Medical Image Watermarking.
    2013 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2013, Hobart, Australia, November 26-28, 2013 2013 (0) 2013
    Conference paper
    Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Laurie Buys.
    "Who decides?": security and privacy in the wild.
    Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25 - 29, 2013 2013 (0) 2013
    Journal article
    Colin Boyd.
    Cryptography in the Cloud: Advances and Challenges.
    J. Inform. and Commun. Convergence Engineering 2013, Volume 11 (0) 2013
    Conference paper
    Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy.
    Effort-Release Public-Key Encryption from Cryptographic Puzzles.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Kaleb Lee, Colin Boyd, Juan Manuel González Nieto.
    Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Aiiad Albeshri, Colin Boyd, Juan Manuel González Nieto.
    GeoProof: Proofs of Geographic Location for Cloud Computing Environment.
    32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012 2012 (0) 2012
    Conference paper
    Kaleb Lee, Juan Manuel González Nieto, Colin Boyd.
    A State-Aware RFID Privacy Model with Reader Corruption.
    CSS 2012 (0) 2012
    Conference paper
    Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto.
    Practical client puzzles in the standard model.
    7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 2012 (0) 2012
    Conference paper
    Colin Boyd, Denis Edwards, Philip Loftus, Timothy G. Schaefer.
    Chief information officer (CIO) panel: how to groom IT leadership as change agents.
    2012 Computers and People Research Conference, SIGMIS-CPR '12, Milwaukee, WI, USA, May 31 - June 02, 2012 2012 (0) 2012
    Conference paper
    Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd.
    Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets.
    Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012 2012 (0) 2012
    Conference paper
    Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton.
    Towards a Secure Human-and-Computer Mutual Authentication Protocol.
    Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012 2012 (0) 2012
    Conference paper
    Kaleb Lee, Juan Manuel González Nieto, Colin Boyd.
    Improving the Efficiency of RFID Authentication with Pre-Computation.
    Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012 2012 (0) 2012
    Conference paper
    Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto.
    Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols.
    Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Long Ngo, Colin Boyd, Juan Gonz'lez Nieto.
    Automated Proofs for Diffie-Hellman-Based Key Exchanges.
    Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011 2011 (0) 2011
    Conference paper
    Kenneth Radke, Margot Brereton, Seyed Mirisaee, Sunil Ghelawat, Colin Boyd, Juan Manuel González Nieto.
    Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing.
    Human-Computer Interaction - INTERACT 2011 - 13th IFIP TC 13 International Conference, Lisbon, Portugal, September 5-9, 2011, Proceedings, Part II 2011 (0) 2011
    Conference paper
    Eesa Al Solami, Colin Boyd, Andrew Clark, Irfan Ahmed.
    User-representative feature selection for keystroke dynamics.
    5th International Conference on Network and System Security, NSS 2011, Milan, Italy, September 6-8, 2011 2011 (0) 2011
    Conference paper
    Colin Boyd, Juan Manuel González Nieto.
    On Forward Secrecy in One-Round Key Exchange.
    Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto.
    Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy.
    Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto.
    An integrated approach to cryptographic mitigation of denial-of-service attacks.
    Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011 2011 (0) 2011
    Conference paper
    Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto.
    Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Conference paper
    Hussain Nyeem, Wageeh W. Boles, Colin Boyd.
    Developing a Digital Image Watermarking Model.
    2011 International Conference on Digital Image Computing: Techniques and Applications (DICTA), Noosa, QLD, Australia, December 6-8, 2011 2011 (0) 2011
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis.
    Modeling key compromise impersonation attacks on group key exchange protocols.
    ACM Trans. Inf. Syst. Secur. 2011, Volume 14 (0) 2011
    Conference paper
    Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton.
    Ceremony Analysis: Strengths and Weaknesses.
    Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto.
    Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong.
    Delaying Mismatched Field Multiplications in Pairing Computations.
    Arithmetic of Finite Fields, Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Eesa Al Solami, Colin Boyd, Andrew Clark, Asadul K. Islam.
    Continuous Biometric Authentication: Can It Be More Practical?
    12th IEEE International Conference on High Performance Computing and Communications, HPCC 2010, 1-3 September 2010, Melbourne, Australia 2010 (0) 2010
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    Attribute-Based Authenticated Key Exchange.
    Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Long Ngo, Colin Boyd, Juan Manuel González Nieto.
    Automating Computational Proofs for Public-Key-Based Key Exchange.
    Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Kenneth Radke, Colin Boyd, Margot Brereton, Juan Manuel González Nieto.
    How HCI design influences web security decisions.
    Proceedings of the 22nd Australasian Computer-Human Interaction Conference, OZCHI 2010, Brisbane, Australia, November 22-26, 2010 2010 (0) 2010
    Journal article
    Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong.
    Avoiding Full Extension Field Arithmetic in Pairing Computations.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    One Round Group Key Exchange with Forward Security in the Standard Model.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    Attribute-based Authenticated Key Exchange.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong.
    Delaying Mismatched Field Multiplications in Pairing Computations.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto.
    Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    Dongdong Sun, Colin Boyd, Juan Manuel González Nieto.
    Delegation in Predicate Encryption Supporting Disjunctive Queries.
    Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong.
    Avoiding Full Extension Field Arithmetic in Pairing Computations.
    Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings 2010 (0) 2010
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis.
    Generic One Round Group Key Exchange in the Standard Model.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Georg Lippold, Colin Boyd, Juan Manuel González Nieto.
    Efficient Certificateless KEM in the Standard Model.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Colin Boyd, Ernest Foo.
    A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
    Sensor Systems and Software - First International ICST Conference, S-CUBE 2009, Pisa, Italy, September 7-9, 2009, Revised Selected Papers 2010 (0) 2009
    Journal article
    Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto.
    How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Journal article
    Craig Costello, Hüseyin Hisil, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong.
    Faster Pairings on Special Weierstrass Curves.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    On the Connection between Signcryption and One-pass Key Establishment.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    Universally Composable Contributory Group Key Exchange.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Georg Lippold, Colin Boyd, Juan Manuel González Nieto.
    Efficient Certificateless KEM in the Standard Model.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Georg Lippold, Colin Boyd, Juan Manuel González Nieto.
    Strongly Secure Certificateless Key Agreement.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis.
    Generic One Round Group Key Exchange in the Standard Model.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    Strong Designated Verifier Signature in a Multi-user Setting.
    Seventh Australasian Information Security Conference, AISC 2009, Wellington, New Zealand, January 2009 2009 (0) 2009
    Conference paper
    Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto.
    How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.
    Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings 2009 (0) 2009
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    Universally composable contributory group key exchange.
    Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 2009 (0) 2009
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.
    Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Craig Costello, Hüseyin Hisil, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong.
    Faster Pairings on Special Weierstrass Curves.
    Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Georg Lippold, Colin Boyd, Juan Manuel González Nieto.
    Strongly Secure Certificateless Key Agreement.
    Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Baoyuan Kang, Colin Boyd, Ed Dawson.
    A novel identity-based strong designated verifier signature scheme.
    Journal of Systems and Software 2009, Volume 82 (0) 2009
    Conference paper
    Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson.
    One-round key exchange in the standard model.
    IJACT 2008, Volume 1 (0) 2009
    Journal article
    Baoyuan Kang, Colin Boyd, Ed Dawson.
    Identity-based strong designated verifier signature schemes: Attacks and new construction.
    Computers Electrical Engineering 2009, Volume 35 (0) 2009
    Journal article
    Baoyuan Kang, Colin Boyd, Ed Dawson.
    A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
    Computers Electrical Engineering 2009, Volume 35 (0) 2009
    Journal article
    Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson.
    Efficient One-round Key Exchange in the Standard Model.
    IACR Cryptology ePrint Archive 2008, Volume 2008 (0) 2008
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    ID-based One-pass Authenticated Key Establishment.
    Sixth Australasian Information Security Conference, AISC 2008, Wollongong, NSW, Australia, January 2008 2008 (0) 2008
    Conference paper
    Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson.
    Efficient One-Round Key Exchange in the Standard Model.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Marianne Hirschbichler, Colin Boyd, Wageeh Boles.
    A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault.
    Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, DICTA 2008, Canberra, ACT, Australia, 1-3 December 2008 2008 (0) 2008
    Conference paper
    Marianne Hirschbichler, Colin Boyd, Wageeh Boles.
    A Multiple-Control Fuzzy Vault.
    Sixth Annual Conference on Privacy, Security and Trust, PST 2008, October 1-3, 2008, Fredericton, New Brunswick, Canada 2008 (0) 2008
    Conference paper
    Rong Du, Ernest Foo, Colin Boyd.
    Designing a secure e-tender submission protocol.
    Electronic Commerce Research 2008, Volume 8 (0) 2008
    Conference paper
    Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto.
    Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.
    Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30 - February 2, 2007. Proceedings 2007 (0) 2007
    Conference paper
    Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto.
    Toward Non-parallelizable Client Puzzles.
    Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings 2007 (0) 2007
    Conference paper
    JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd.
    Low-Cost and Strong-Security RFID Authentication Protocol.
    Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings 2007 (0) 2007
    Conference paper
    JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd.
    HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.
    Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings 2007 (0) 2007
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto.
    On the Connection Between Signcryption and One-Pass Key Establishment.
    Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings 2007 (0) 2007
    Show item 1 to 100 of 225  

    Your query returned 225 matches in the database.