The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Colin Boyd: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ernest Foo, Colin Boyd
    Passive Entities: A Strategy for Electronic Payment Design. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:134-148 [Conf]
  2. Colin Boyd
    A Framework for Design of Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:146-157 [Conf]
  3. Colin Boyd
    On Key Agreement and Conference Key Agreement. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:294-302 [Conf]
  4. Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
    An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:371-382 [Conf]
  5. Colin Boyd, Ernest Foo, Chris Pavlovski
    Efficient Electronic Cash Using Batch Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:244-257 [Conf]
  6. Colin Boyd, Anish Mathuria
    Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:344-355 [Conf]
  7. Colin Boyd, Paul Montague, Khanh Quoc Nguyen
    Elliptic Curve Based Password Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:487-501 [Conf]
  8. Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson
    Key Recovery System for the Commercial Environment. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:149-162 [Conf]
  9. Jen Lim, Colin Boyd, Ed Dawson
    Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:216-227 [Conf]
  10. DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson
    Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:334-343 [Conf]
  11. Chris Pavlovski, Colin Boyd
    Attacks Based on Small Factors in Various Group Structures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:36-50 [Conf]
  12. Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto
    A Novel Range Test. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:247-258 [Conf]
  13. Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto
    Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:166-179 [Conf]
  14. Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto
    Protocols with Security Proofs for Mobile Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:358-369 [Conf]
  15. Kapali Viswanathan, Colin Boyd, Ed Dawson
    A Three Phased Schema for Sealed Bid Auction System Design. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:412-426 [Conf]
  16. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Publicly Verifiable Key Escrow with Limited Time Span. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:36-50 [Conf]
  17. Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:494-508 [Conf]
  18. Colin Boyd, Wenbo Mao, Kenneth G. Paterson
    Key Agreement Using Statically Keyed Authenticators. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:248-262 [Conf]
  19. Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd
    Password Based Server Aided Key Exchange . [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:146-161 [Conf]
  20. Jason Smith, Juan Manuel González Nieto, Colin Boyd
    Modelling denial of service attacks on JFK with Meadows's cost-based framework. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:125-134 [Conf]
  21. Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo
    Formal analysis of secure contracting protocol for e-tendering. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:155-164 [Conf]
  22. Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald
    Defining Security Services for Electronic Tendering. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:43-52 [Conf]
  23. Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto
    SKMA: a key management architecture for SCADA systems. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:183-192 [Conf]
  24. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
    Secure Key Issuing in ID-based Cryptography. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:69-74 [Conf]
  25. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Five Sealed-bid Auction Models. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:77-86 [Conf]
  26. Yiu Shing Terry Tin, Colin Boyd, Juanma González Nieto
    Provably Secure Key Exchange: An Engineering Approach. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:97-104 [Conf]
  27. Colin Boyd, Wenbo Mao
    Design and Analysis of Key Exchange Protocols via Secure Channel Identification. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:171-181 [Conf]
  28. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:585-604 [Conf]
  29. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    Errors in Computational Complexity Proofs for Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:624-643 [Conf]
  30. Colin Boyd, Ernest Foo
    Off-Line Fair Payment Protocols Using Convertible Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:271-285 [Conf]
  31. Colin Boyd, Chris Pavlovski
    Attacking and Repairing Batch Verification Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:58-71 [Conf]
  32. Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
    Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:1-18 [Conf]
  33. Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
    A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:57-71 [Conf]
  34. Kun Peng, Colin Boyd, Ed Dawson
    Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:188-204 [Conf]
  35. Colin Boyd
    Towards a classification of key agreement protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:38-43 [Conf]
  36. Colin Boyd
    A Class of Flexible and Efficient Key Management Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:2-8 [Conf]
  37. Wenbo Mao, Colin Boyd
    Towards Formal Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:147-158 [Conf]
  38. Wenbo Mao, Colin Boyd
    Development of Authentication Protocols: Some Misconceptions and a New Approach. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:178-186 [Conf]
  39. Greg Maitland, Colin Boyd
    Co-operatively Formed Group Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:218-235 [Conf]
  40. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    A Security Architecture for Reputation Systems. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:176-185 [Conf]
  41. Riza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Secure e-Voting for Preferential Elections. [Citation Graph (0, 0)][DBLP]
    EGOV, 2003, pp:246-249 [Conf]
  42. Colin Boyd
    A Formal Framework for Authentication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:273-292 [Conf]
  43. Colin Boyd, Wenbo Mao
    Designing Secure Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:93-105 [Conf]
  44. Wenbo Mao, Colin Boyd
    On Strengthening Authentication Protocols to Foil Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:193-204 [Conf]
  45. Colin Boyd, Wenbo Mao
    On a Limitation of BAN Logic. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:240-247 [Conf]
  46. Colin Boyd
    Some Applications of Multiple Key Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:455-467 [Conf]
  47. Colin Boyd
    A New Multiple Key Cipher and an Improved Voting Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:617-625 [Conf]
  48. Colin Boyd
    Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:266-280 [Conf]
  49. Colin Boyd, Kapali Viswanathan
    Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:49-61 [Conf]
  50. Ernest Foo, Colin Boyd
    A Payment Scheme Using Vouchers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:103-121 [Conf]
  51. Colin Boyd
    Digital signature and public key cryptosystems in a prime order subgroup of Zn*. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:346-355 [Conf]
  52. Colin Boyd
    Enforcing traceability in software. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:398-408 [Conf]
  53. Chris Pavlovski, Colin Boyd, Ernest Foo
    Detachable Electronic Coins. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:54-70 [Conf]
  54. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Ciphertext Comparison, a New Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:84-96 [Conf]
  55. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:147-159 [Conf]
  56. Greg Maitland, Colin Boyd
    Fair Electronic Cash Based on a Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:461-465 [Conf]
  57. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Signature Scheme for Controlled Environments. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:119-134 [Conf]
  58. Juan Manuel González Nieto, Colin Boyd, Ed Dawson
    A Public Key Cryptosystem Based on the Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:352-363 [Conf]
  59. Colin Boyd, DongGook Park
    Public key protocols for wireless communications. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:47-57 [Conf]
  60. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
    Providing Receipt-Freeness in Mixnet-Based Voting Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:245-258 [Conf]
  61. Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell
    A security architecture for third generation wireless systems. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:15-32 [Conf]
  62. DongGook Park, Colin Boyd, Ed Dawson
    Micropayments for Wireless Communications. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:192-205 [Conf]
  63. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    An Efficient and Verifiable Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:51-66 [Conf]
  64. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Non-interactive Auction Schemewith Strong Privacy. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:407-420 [Conf]
  65. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Secure Selection Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:132-146 [Conf]
  66. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Strong Binding for Software Key Escrow. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:134-139 [Conf]
  67. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
    Complementing Computational Protocol Analysis with Formal Specifications. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:129-144 [Conf]
  68. Xian Liu, Patrick G. Farrell, Colin Boyd
    Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1997, pp:199-208 [Conf]
  69. Xian Liu, Patrick G. Farrell, Colin Boyd
    A Unified Code. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:84-93 [Conf]
  70. Andrew Smith, Colin Boyd
    An Elliptic Curve Analogue of McCurley's Key Agreement Scheme. [Citation Graph (0, 0)][DBLP]
    IMA Conf., 1995, pp:150-157 [Conf]
  71. Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
    Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:17-32 [Conf]
  72. Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague
    A Password-Based Authenticator: Security Proof and Applications. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:388-401 [Conf]
  73. Colin Boyd
    Design of Secure Key Establishment Protocols: Successes, Failures and Prospects. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:1-13 [Conf]
  74. Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
    Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:176-190 [Conf]
  75. Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Multiplicative Homomorphic E-Voting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:61-72 [Conf]
  76. Kapali Viswanathan, Colin Boyd, Ed Dawson
    An Analysis of Integrity Services in Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:175-187 [Conf]
  77. Colin Boyd, Peter Kearney
    Exploring Fair Exchange Protocols Using Specification Animation. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:209-223 [Conf]
  78. Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson
    Linkability in Practical Electronic Cash Design. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:149-163 [Conf]
  79. DongGook Park, Colin Boyd, Ed Dawson
    Classification of Authentication Protocols: A Practical Approach. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:194-208 [Conf]
  80. Kun Peng, Colin Boyd, Ed Dawson
    A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:374-388 [Conf]
  81. Harikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto
    A Secure Framework for User Privacy in Heterogeneous Location Networks. [Citation Graph (0, 0)][DBLP]
    MATA, 2004, pp:264-274 [Conf]
  82. Colin Boyd, Kim-Kwang Raymond Choo
    Security of Two-Party Identity-Based Key Agreement. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:229-243 [Conf]
  83. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    On Session Key Construction in Provably-Secure Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:116-131 [Conf]
  84. Kun Peng, Colin Boyd, Ed Dawson
    Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:84-98 [Conf]
  85. Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
    Examining the DoS Resistance of HIP. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:616-625 [Conf]
  86. Colin Boyd, Juan Manuel González Nieto
    Round-Optimal Contributory Conference Key Agreement. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:161-174 [Conf]
  87. Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto
    Security-Mediated Certificateless Cryptography. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:508-524 [Conf]
  88. Greg Maitland, Colin Boyd
    A Provably Secure Restrictive Partially Blind Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:99-114 [Conf]
  89. Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson
    Key Recovery in Third Generation Wireless Communication Systems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:223-237 [Conf]
  90. DongGook Park, Colin Boyd, Sang-Jae Moon
    Forward Secrecy and Its Application to Future Mobile Communications Security. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:433-445 [Conf]
  91. Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
    A Correct, Private, and Efficient Mix Network. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:439-454 [Conf]
  92. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
    On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:351-366 [Conf]
  93. Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson
    A taxonomy of electronic cash schemes. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:337-348 [Conf]
  94. Kun Peng, Colin Boyd, Ed Dawson
    Sealed-Bid Micro Auctions. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:246-257 [Conf]
  95. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    An Efficient Off-Line Reputation Scheme Using Articulated Certificates. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:53-62 [Conf]
  96. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    Private Reputation Schemes for P2P systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:196-206 [Conf]
  97. Colin Boyd, Wenbo Mao, Kenneth G. Paterson
    Deniable Authenticated Key Establishment for Internet Protocols. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:255-271 [Conf]
  98. Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
    An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:152-161 [Conf]
  99. Rong Du, Colin Boyd, Ernest Foo
    A Secure E-Tender Submission Protocol. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2006, pp:213-222 [Conf]
  100. Rong Du, Ernest Foo, Juan González Nieto, Colin Boyd
    Designing Secure E-Tendering Systems. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:70-79 [Conf]
  101. Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
    Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:244-256 [Conf]
  102. Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
    Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. [Citation Graph (0, 0)][DBLP]
    Appl. Algebra Eng. Commun. Comput., 2006, v:16, n:6, pp:405-438 [Journal]
  103. Colin Boyd, Anish Mathuria
    Key establishment protocols for secure mobile communications: a critical survey. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:5-6, pp:575-587 [Journal]
  104. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
    The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2788-2797 [Journal]
  105. Kun Peng, Colin Boyd, Ed Dawson
    Batch verification of validity of bids in homomorphic e-auction. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2798-2805 [Journal]
  106. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Hybrid Key Escrow: A New Paradigm. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:1, pp:77-92 [Journal]
  107. Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson
    Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2005, v:20, n:6, pp:- [Journal]
  108. Juan Manuel González Nieto, Colin Boyd, Ed Dawson
    A Public Key Cryptosystem Based On A Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:3, pp:301-316 [Journal]
  109. Audun Jøsang, Roslan Ismail, Colin Boyd
    A survey of trust and reputation systems for online service provision. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2007, v:43, n:2, pp:618-644 [Journal]
  110. Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson
    Key recovery for the commercial environment. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:161-174 [Journal]
  111. Colin Boyd, Wenbo Mao
    Preface to the special issue on ISC 2003. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:227-227 [Journal]
  112. Ed Dawson, Kapali Viswanathan, Colin Boyd
    Compliant cryptologic protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:189-202 [Journal]
  113. Colin Boyd
    Security Architectures Using Formal Methods. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:694-701 [Journal]
  114. Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
    Toward Non-parallelizable Client Puzzles. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:247-264 [Conf]
  115. JaeCheol Ha, JungHoon Ha, Sang-Jae Moon, Colin Boyd
    LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. [Citation Graph (0, 0)][DBLP]
    ICUCT, 2006, pp:80-89 [Conf]
  116. Kun Peng, Colin Boyd, Ed Dawson
    Batch zero-knowledge proof and verification and its applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal]

  117. Efficient One-Round Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]


  118. How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. [Citation Graph (, )][DBLP]


  119. Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. [Citation Graph (, )][DBLP]


  120. Universally composable contributory group key exchange. [Citation Graph (, )][DBLP]


  121. A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault. [Citation Graph (, )][DBLP]


  122. Low-Cost and Strong-Security RFID Authentication Protocol. [Citation Graph (, )][DBLP]


  123. HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. [Citation Graph (, )][DBLP]


  124. Continuous Biometric Authentication: Can It Be More Practical? [Citation Graph (, )][DBLP]


  125. Generic One Round Group Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]


  126. Efficient Certificateless KEM in the Standard Model. [Citation Graph (, )][DBLP]


  127. On the Connection Between Signcryption and One-Pass Key Establishment. [Citation Graph (, )][DBLP]


  128. Verifier-Key-Flexible Universal Designated-Verifier Signatures. [Citation Graph (, )][DBLP]


  129. A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality. [Citation Graph (, )][DBLP]


  130. Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). [Citation Graph (, )][DBLP]


  131. Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. [Citation Graph (, )][DBLP]


  132. A Multiple-Control Fuzzy Vault. [Citation Graph (, )][DBLP]


  133. Faster Pairings on Special Weierstrass Curves. [Citation Graph (, )][DBLP]


  134. Strongly Secure Certificateless Key Agreement. [Citation Graph (, )][DBLP]


  135. Delaying Mismatched Field Multiplications in Pairing Computations. [Citation Graph (, )][DBLP]


  136. Avoiding Full Extension Field Arithmetic in Pairing Computations. [Citation Graph (, )][DBLP]


  137. Designing a secure e-tender submission protocol. [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.013secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002