Search the dblp DataBase
Colin Boyd :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ernest Foo , Colin Boyd Passive Entities: A Strategy for Electronic Payment Design. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:134-148 [Conf ] Colin Boyd A Framework for Design of Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:146-157 [Conf ] Colin Boyd On Key Agreement and Conference Key Agreement. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:294-302 [Conf ] Colin Boyd , Kim-Kwang Raymond Choo , Anish Mathuria An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:371-382 [Conf ] Colin Boyd , Ernest Foo , Chris Pavlovski Efficient Electronic Cash Using Batch Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:244-257 [Conf ] Colin Boyd , Anish Mathuria Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:344-355 [Conf ] Colin Boyd , Paul Montague , Khanh Quoc Nguyen Elliptic Curve Based Password Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:487-501 [Conf ] Juanma González Nieto , Kapali Viswanathan , Colin Boyd , Ed Dawson Key Recovery System for the Commercial Environment. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:149-162 [Conf ] Jen Lim , Colin Boyd , Ed Dawson Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:216-227 [Conf ] DongGook Park , JungJoon Kim , Colin Boyd , Ed Dawson Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:334-343 [Conf ] Chris Pavlovski , Colin Boyd Attacks Based on Small Factors in Various Group Structures. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:36-50 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Eiji Okamoto A Novel Range Test. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:247-258 [Conf ] Yiu Shing Terry Tin , Colin Boyd , Juan Manuel González Nieto Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:166-179 [Conf ] Yiu Shing Terry Tin , Harikrishna Vasanta , Colin Boyd , Juan Manuel González Nieto Protocols with Security Proofs for Mobile Applications. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:358-369 [Conf ] Kapali Viswanathan , Colin Boyd , Ed Dawson A Three Phased Schema for Sealed Bid Auction System Design. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:412-426 [Conf ] Kapali Viswanathan , Colin Boyd , Ed Dawson Publicly Verifiable Key Escrow with Limited Time Span. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:36-50 [Conf ] Riza Aditya , Kun Peng , Colin Boyd , Ed Dawson , Byoungcheon Lee Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:494-508 [Conf ] Colin Boyd , Wenbo Mao , Kenneth G. Paterson Key Agreement Using Statically Keyed Authenticators. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:248-262 [Conf ] Yvonne Cliff , Yiu Shing Terry Tin , Colin Boyd Password Based Server Aided Key Exchange . [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:146-161 [Conf ] Jason Smith , Juan Manuel González Nieto , Colin Boyd Modelling denial of service attacks on JFK with Meadows's cost-based framework. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2006, pp:125-134 [Conf ] Rong Du , Ernest Foo , Colin Boyd , Kim-Kwang Raymond Choo Formal analysis of secure contracting protocol for e-tendering. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2006, pp:155-164 [Conf ] Rong Du , Ernest Foo , Colin Boyd , Brian Fitzgerald Defining Security Services for Electronic Tendering. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2004, pp:43-52 [Conf ] Robert Dawson , Colin Boyd , Ed Dawson , Juan Manuel González Nieto SKMA: a key management architecture for SCADA systems. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2006, pp:183-192 [Conf ] Byoungcheon Lee , Colin Boyd , Ed Dawson , Kwangjo Kim , Jeongmo Yang , Seungjae Yoo Secure Key Issuing in ID-based Cryptography. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2004, pp:69-74 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Kapali Viswanathan Five Sealed-bid Auction Models. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:77-86 [Conf ] Yiu Shing Terry Tin , Colin Boyd , Juanma González Nieto Provably Secure Key Exchange: An Engineering Approach. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:97-104 [Conf ] Colin Boyd , Wenbo Mao Design and Analysis of Key Exchange Protocols via Secure Channel Identification. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:171-181 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:585-604 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock Errors in Computational Complexity Proofs for Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:624-643 [Conf ] Colin Boyd , Ernest Foo Off-Line Fair Payment Protocols Using Convertible Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:271-285 [Conf ] Colin Boyd , Chris Pavlovski Attacking and Repairing Batch Verification Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:58-71 [Conf ] Jaimee Brown , Juan Manuel González Nieto , Colin Boyd Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. [Citation Graph (0, 0)][DBLP ] CANS, 2006, pp:1-18 [Conf ] Kun Peng , Riza Aditya , Colin Boyd , Ed Dawson , Byoungcheon Lee A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. [Citation Graph (0, 0)][DBLP ] Cryptographic Algorithms and their Uses, 2004, pp:57-71 [Conf ] Kun Peng , Colin Boyd , Ed Dawson Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:188-204 [Conf ] Colin Boyd Towards a classification of key agreement protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:38-43 [Conf ] Colin Boyd A Class of Flexible and Efficient Key Management Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1996, pp:2-8 [Conf ] Wenbo Mao , Colin Boyd Towards Formal Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1993, pp:147-158 [Conf ] Wenbo Mao , Colin Boyd Development of Authentication Protocols: Some Misconceptions and a New Approach. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:178-186 [Conf ] Greg Maitland , Colin Boyd Co-operatively Formed Group Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:218-235 [Conf ] Roslan Ismail , Colin Boyd , Audun Jøsang , Selwyn Russell A Security Architecture for Reputation Systems. [Citation Graph (0, 0)][DBLP ] EC-Web, 2003, pp:176-185 [Conf ] Riza Aditya , Colin Boyd , Ed Dawson , Kapali Viswanathan Secure e-Voting for Preferential Elections. [Citation Graph (0, 0)][DBLP ] EGOV, 2003, pp:246-249 [Conf ] Colin Boyd A Formal Framework for Authentication. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:273-292 [Conf ] Colin Boyd , Wenbo Mao Designing Secure Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:93-105 [Conf ] Wenbo Mao , Colin Boyd On Strengthening Authentication Protocols to Foil Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:193-204 [Conf ] Colin Boyd , Wenbo Mao On a Limitation of BAN Logic. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:240-247 [Conf ] Colin Boyd Some Applications of Multiple Key Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:455-467 [Conf ] Colin Boyd A New Multiple Key Cipher and an Improved Voting Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:617-625 [Conf ] Colin Boyd Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:266-280 [Conf ] Colin Boyd , Kapali Viswanathan Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. [Citation Graph (0, 0)][DBLP ] FASec, 2002, pp:49-61 [Conf ] Ernest Foo , Colin Boyd A Payment Scheme Using Vouchers. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1998, pp:103-121 [Conf ] Colin Boyd Digital signature and public key cryptosystems in a prime order subgroup of Zn * . [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:346-355 [Conf ] Colin Boyd Enforcing traceability in software. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:398-408 [Conf ] Chris Pavlovski , Colin Boyd , Ernest Foo Detachable Electronic Coins. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:54-70 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Byoungcheon Lee Ciphertext Comparison, a New Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:84-96 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Kapali Viswanathan Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:147-159 [Conf ] Greg Maitland , Colin Boyd Fair Electronic Cash Based on a Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:461-465 [Conf ] Kapali Viswanathan , Colin Boyd , Ed Dawson Signature Scheme for Controlled Environments. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:119-134 [Conf ] Juan Manuel González Nieto , Colin Boyd , Ed Dawson A Public Key Cryptosystem Based on the Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:352-363 [Conf ] Colin Boyd , DongGook Park Public key protocols for wireless communications. [Citation Graph (0, 0)][DBLP ] ICISC, 1998, pp:47-57 [Conf ] Byoungcheon Lee , Colin Boyd , Ed Dawson , Kwangjo Kim , Jeongmo Yang , Seungjae Yoo Providing Receipt-Freeness in Mixnet-Based Voting Protocols. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:245-258 [Conf ] Gary Gaskell , Mark Looi , Ed Dawson , Colin Boyd , Selwyn Russell A security architecture for third generation wireless systems. [Citation Graph (0, 0)][DBLP ] ICISC, 1998, pp:15-32 [Conf ] DongGook Park , Colin Boyd , Ed Dawson Micropayments for Wireless Communications. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:192-205 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Byoungcheon Lee An Efficient and Verifiable Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:51-66 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Kapali Viswanathan Non-interactive Auction Schemewith Strong Privacy. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:407-420 [Conf ] Kapali Viswanathan , Colin Boyd , Ed Dawson Secure Selection Protocols. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:132-146 [Conf ] Kapali Viswanathan , Colin Boyd , Ed Dawson Strong Binding for Software Key Escrow. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:134-139 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock , Greg Maitland Complementing Computational Protocol Analysis with Formal Specifications. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2004, pp:129-144 [Conf ] Xian Liu , Patrick G. Farrell , Colin Boyd Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1997, pp:199-208 [Conf ] Xian Liu , Patrick G. Farrell , Colin Boyd A Unified Code. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:84-93 [Conf ] Andrew Smith , Colin Boyd An Elliptic Curve Analogue of McCurley's Key Agreement Scheme. [Citation Graph (0, 0)][DBLP ] IMA Conf., 1995, pp:150-157 [Conf ] Yvonne Hitchcock , Colin Boyd , Juan Manuel González Nieto Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:17-32 [Conf ] Yvonne Hitchcock , Yiu Shing Terry Tin , Juan Manuel González Nieto , Colin Boyd , Paul Montague A Password-Based Authenticator: Security Proof and Applications. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:388-401 [Conf ] Colin Boyd Design of Secure Key Establishment Protocols: Successes, Failures and Prospects. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:1-13 [Conf ] Jaimee Brown , Juan Manuel González Nieto , Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:176-190 [Conf ] Kun Peng , Riza Aditya , Colin Boyd , Ed Dawson , Byoungcheon Lee Multiplicative Homomorphic E-Voting. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:61-72 [Conf ] Kapali Viswanathan , Colin Boyd , Ed Dawson An Analysis of Integrity Services in Protocols. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:175-187 [Conf ] Colin Boyd , Peter Kearney Exploring Fair Exchange Protocols Using Specification Animation. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:209-223 [Conf ] Greg Maitland , Jason Reid , Ernest Foo , Colin Boyd , Ed Dawson Linkability in Practical Electronic Cash Design. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:149-163 [Conf ] DongGook Park , Colin Boyd , Ed Dawson Classification of Authentication Protocols: A Practical Approach. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:194-208 [Conf ] Kun Peng , Colin Boyd , Ed Dawson A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:374-388 [Conf ] Harikrishna Vasanta , Yiu Shing Terry Tin , Colin Boyd , Mark Looi , Juan Manuel González Nieto A Secure Framework for User Privacy in Heterogeneous Location Networks. [Citation Graph (0, 0)][DBLP ] MATA, 2004, pp:264-274 [Conf ] Colin Boyd , Kim-Kwang Raymond Choo Security of Two-Party Identity-Based Key Agreement. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:229-243 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock On Session Key Construction in Provably-Secure Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:116-131 [Conf ] Kun Peng , Colin Boyd , Ed Dawson Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:84-98 [Conf ] Suratose Tritilanunt , Colin Boyd , Ernest Foo , Juan Manuel González Nieto Examining the DoS Resistance of HIP. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:616-625 [Conf ] Colin Boyd , Juan Manuel González Nieto Round-Optimal Contributory Conference Key Agreement. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:161-174 [Conf ] Sherman S. M. Chow , Colin Boyd , Juan Manuel González Nieto Security-Mediated Certificateless Cryptography. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:508-524 [Conf ] Greg Maitland , Colin Boyd A Provably Secure Restrictive Partially Blind Signature Scheme. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:99-114 [Conf ] Juanma González Nieto , DongGook Park , Colin Boyd , Ed Dawson Key Recovery in Third Generation Wireless Communication Systems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:223-237 [Conf ] DongGook Park , Colin Boyd , Sang-Jae Moon Forward Secrecy and Its Application to Future Mobile Communications Security. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:433-445 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Kapalee Viswanathan A Correct, Private, and Efficient Mix Network. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:439-454 [Conf ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock , Greg Maitland On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:351-366 [Conf ] Ernest Foo , Colin Boyd , William J. Caelli , Ed Dawson A taxonomy of electronic cash schemes. [Citation Graph (0, 0)][DBLP ] SEC, 1997, pp:337-348 [Conf ] Kun Peng , Colin Boyd , Ed Dawson Sealed-Bid Micro Auctions. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:246-257 [Conf ] Roslan Ismail , Colin Boyd , Audun Jøsang , Selwyn Russell An Efficient Off-Line Reputation Scheme Using Articulated Certificates. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:53-62 [Conf ] Roslan Ismail , Colin Boyd , Audun Jøsang , Selwyn Russell Private Reputation Schemes for P2P systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:196-206 [Conf ] Colin Boyd , Wenbo Mao , Kenneth G. Paterson Deniable Authenticated Key Establishment for Internet Protocols. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:255-271 [Conf ] Riza Aditya , Byoungcheon Lee , Colin Boyd , Ed Dawson An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. [Citation Graph (0, 0)][DBLP ] TrustBus, 2004, pp:152-161 [Conf ] Rong Du , Colin Boyd , Ernest Foo A Secure E-Tender Submission Protocol. [Citation Graph (0, 0)][DBLP ] TrustBus, 2006, pp:213-222 [Conf ] Rong Du , Ernest Foo , Juan González Nieto , Colin Boyd Designing Secure E-Tendering Systems. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:70-79 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Kapalee Viswanathan Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:244-256 [Conf ] Yvonne Hitchcock , Colin Boyd , Juan Manuel González Nieto Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:405-438 [Journal ] Colin Boyd , Anish Mathuria Key establishment protocols for secure mobile communications: a critical survey. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:5-6, pp:575-587 [Journal ] Kim-Kwang Raymond Choo , Colin Boyd , Yvonne Hitchcock The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2788-2797 [Journal ] Kun Peng , Colin Boyd , Ed Dawson Batch verification of validity of bids in homomorphic e-auction. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2798-2805 [Journal ] Kapali Viswanathan , Colin Boyd , Ed Dawson Hybrid Key Escrow: A New Paradigm. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:1, pp:77-92 [Journal ] Riza Aditya , Byoungcheon Lee , Colin Boyd , Ed Dawson Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal ] Juan Manuel González Nieto , Colin Boyd , Ed Dawson A Public Key Cryptosystem Based On A Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2005, v:36, n:3, pp:301-316 [Journal ] Audun Jøsang , Roslan Ismail , Colin Boyd A survey of trust and reputation systems for online service provision. [Citation Graph (0, 0)][DBLP ] Decision Support Systems, 2007, v:43, n:2, pp:618-644 [Journal ] Juan Manuel González Nieto , Kapali Viswanathan , Colin Boyd , Andrew Clark , Ed Dawson Key recovery for the commercial environment. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal ] Colin Boyd , Wenbo Mao Preface to the special issue on ISC 2003. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:4, pp:227-227 [Journal ] Ed Dawson , Kapali Viswanathan , Colin Boyd Compliant cryptologic protocols. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2002, v:1, n:3, pp:189-202 [Journal ] Colin Boyd Security Architectures Using Formal Methods. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:694-701 [Journal ] Suratose Tritilanunt , Colin Boyd , Ernest Foo , Juan Manuel González Nieto Toward Non-parallelizable Client Puzzles. [Citation Graph (0, 0)][DBLP ] CANS, 2007, pp:247-264 [Conf ] JaeCheol Ha , JungHoon Ha , Sang-Jae Moon , Colin Boyd LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. [Citation Graph (0, 0)][DBLP ] ICUCT, 2006, pp:80-89 [Conf ] Kun Peng , Colin Boyd , Ed Dawson Batch zero-knowledge proof and verification and its applications. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal ] Efficient One-Round Key Exchange in the Standard Model. [Citation Graph (, )][DBLP ] How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. [Citation Graph (, )][DBLP ] Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. [Citation Graph (, )][DBLP ] Universally composable contributory group key exchange. [Citation Graph (, )][DBLP ] A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault. [Citation Graph (, )][DBLP ] Low-Cost and Strong-Security RFID Authentication Protocol. [Citation Graph (, )][DBLP ] HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. [Citation Graph (, )][DBLP ] Continuous Biometric Authentication: Can It Be More Practical? [Citation Graph (, )][DBLP ] Generic One Round Group Key Exchange in the Standard Model. [Citation Graph (, )][DBLP ] Efficient Certificateless KEM in the Standard Model. [Citation Graph (, )][DBLP ] On the Connection Between Signcryption and One-Pass Key Establishment. [Citation Graph (, )][DBLP ] Verifier-Key-Flexible Universal Designated-Verifier Signatures. [Citation Graph (, )][DBLP ] A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality. [Citation Graph (, )][DBLP ] Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). [Citation Graph (, )][DBLP ] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. [Citation Graph (, )][DBLP ] A Multiple-Control Fuzzy Vault. [Citation Graph (, )][DBLP ] Faster Pairings on Special Weierstrass Curves. [Citation Graph (, )][DBLP ] Strongly Secure Certificateless Key Agreement. [Citation Graph (, )][DBLP ] Delaying Mismatched Field Multiplications in Pairing Computations. [Citation Graph (, )][DBLP ] Avoiding Full Extension Field Arithmetic in Pairing Computations. [Citation Graph (, )][DBLP ] Designing a secure e-tender submission protocol. [Citation Graph (, )][DBLP ] Search in 0.045secs, Finished in 0.049secs