Colin Boyd
Affiliations:- Queensland University of Technology, Brisbane, Australia
According to our database1,
Colin Boyd
authored at least 226 papers
between 1988 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information Security - 26th International Conference, 2023
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021
2020
Information Security and Cryptography, Springer, ISBN: 978-3-662-58145-2, 2020
Future Gener. Comput. Syst., 2020
IEEE Commun. Mag., 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the 2nd Workshop on Formal Methods for Blockchains, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
Private VNFs for collaborative multi-operator service delivery: An architectural case.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
2015
Identity-based proxy signatures: a generic construction and a concrete scheme from RSA.
Secur. Commun. Networks, 2015
Int. J. Inf. Sec., 2015
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
2014
Int. J. Inf. Sec., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Digital image watermarking: its formal model, fundamental properties and possible attacks.
EURASIP J. Adv. Signal Process., 2014
Proceedings of the Security Standardisation Research - First International Conference, 2014
Proceedings of the Technology and Practice of Passwords, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
J. Inform. and Commun. Convergence Engineering, 2013
J. Digit. Imaging, 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the Augmentation, Application, Innovation, Collaboration, OzCHI '13, Adelaide, Australia - November 25, 2013
Utilizing Least Significant Bit-Planes of RONI Pixels for Medical Image Watermarking.
Proceedings of the 2013 International Conference on Digital Image Computing: Techniques and Applications, 2013
2012
Proceedings of the 2012 Computers and People Research Conference, SIGMIS-CPR '12, Milwaukee, WI, USA, May 31, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Tenth Australasian Information Security Conference, 2012
Proceedings of the Tenth Australasian Information Security Conference, 2012
Improving the Efficiency of RFID Authentication with Pre-Computation.
Proceedings of the Tenth Australasian Information Security Conference, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing.
Proceedings of the Human-Computer Interaction - INTERACT 2011, 2011
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the 2011 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the 22nd Australasian Computer-Human Interaction Conference, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
2009
J. Syst. Softw., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Identity-based strong designated verifier signature schemes: Attacks and new construction.
Comput. Electr. Eng., 2009
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
Comput. Electr. Eng., 2009
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.
Proceedings of the Sensor Systems and Software, 2009
Proceedings of the Seventh Australasian Information Security Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, 2008
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
Decis. Support Syst., 2007
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP).
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Proceedings of the Cryptography and Coding, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007
2006
Comput. Commun., 2006
The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Comput. Commun., 2006
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model.
Appl. Algebra Eng. Commun. Comput., 2006
Proceedings of the Trust and Privacy in Digital Business, Third International Conference, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols.
IACR Cryptol. ePrint Arch., 2005
Des. Codes Cryptogr., 2005
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption.
Comput. Syst. Sci. Eng., 2005
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Progress in Cryptology, 2005
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Advances in Cryptology, 2005
2004
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004
Private Reputation Schemes for P2P systems.
Proceedings of the Security In Information Systems, 2004
An Efficient Off-Line Reputation Scheme Using Articulated Certificates.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Mobility Aware Technologies and Applications, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
Proceedings of the Information Security and Cryptology, 2004
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.
Proceedings of the Cryptographic Algorithms and their Uses, 2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Information Security and Cryptography, Springer, ISBN: 978-3-642-07716-6, 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Security Protocols, 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Electronic Government, Second International Conference, 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Formal Aspects of Security, First International Conference, 2002
Proceedings of the Topics in Cryptology, 2002
2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Comput. Commun., 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Information Security and Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
Proceedings of the Information Security and Cryptology, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
A security architecture for third generation wireless systems.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Public key protocols for wireless communications.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
A taxonomy of electronic cash schemes.
Proceedings of the Information Security in Research and Business, 1997
Proceedings of the Cryptography and Coding, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Digital signature and public key cryptosystems in a prime order subgroup of Z<sub>n</sub><sup>*</sup>.
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
Proceedings of the Cryptography and Coding, 1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
1994
Proceedings of the Computer Security, 1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993
1992
1991
Proceedings of the Advances in Cryptology, 1991
1989
Proceedings of the Advances in Cryptology, 1989
1988
Proceedings of the Advances in Cryptology, 1988