QUT ePrints

Browse By Person: Boyd, Colin

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 151.

Book

Boyd, Colin & Pieprzyk, Josef (Eds.) (2011) AISC '11 Proceedings of the Ninth Australasian Information Security Conference. Australian Computer Society, Inc, Darlinghurst, NSW.

Dawson, Edward P., Duncan, William D., Christensen, Sharon A., Black, Peter J., Foo, Ernest, Du, Rong, et al. (2006) eTendering - Security and Legal Issues. Cooperative Research Centre for Construction Innovation, for Icon.Net Pty Ltd., Brisbane. (Unpublished)
Number of full-text downloads 1,141

Boyd, Colin & Mathuria, Anish (2003) Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer-Veriag, Berlin,Germany.

Journal Article

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2014) Analysis of two authorization protocols using Colored Petri Nets. International Journal of Information Security. (In Press)

Nyeem, Hussain, Boles, Wageeh W., & Boyd, Colin (2014) Digital image watermarking : a formal model, fundamental properties, and possible attacks. EURASIP Journal on Advances in Signal Processing. (In Press)
Number of full-text downloads 9

Albeshri, Aiiad, Boyd, Colin, & Nieto, Juan Gonzalez (2013) Enhanced geoproof : improved geographic assurance for data in the cloud. International Journal of Information Security, 13(2), pp. 191-198.

Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2013) Automated proofs of computational indistinguishability. The Computer Journal.

Boyd, Colin (2013) Cryptography in the cloud : advances and challenges. Journal of Information and Communication Convergence Engineering, 11(1), pp. 17-23.

Sun, Dongdong, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2013) Predicate encryption for multi-inner-products. Security and Communications Networks, 6(3), pp. 325-339.

Boyd, Colin, Cremers, Cas, Feltz, Michele, Paterson, Kenneth G., Bertram, Poettering, & Stebila, Douglas (2013) ASICS : authenticated key exchange security incorporating certification systems. Lecture Notes in Computer Science [Computer Security - ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013, Proceedings], 8134, pp. 381-399.
Number of full-text downloads 46

Nyeem, Hussain, Wageeh, Boles, & Boyd, Colin (2013) A review of medical image watermarking requirements for teleradiology. Journal of Digital Imaging, 26(2), pp. 326-343.
Number of full-text downloads 23
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Rangasamy, Jothi, Stebila, Douglas, Kuppusamy, Lakshmi, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Efficient modular exponentiation-based puzzles for denial-of-service protection. Lecture Notes in Computer Science, 7259, pp. 319-331.

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, Gonzalez Nieto, Juan M., & Kuppusamy, Lakshmi (2012) Effort-release public-key encryption from cryptographic puzzles. Lecture Notes in Computer Science, 7372, pp. 194-207.

Lee, Kaleb, Gonzalez Nieto, Juan M., & Boyd, Colin (2012) A state-aware RFID privacy model with reader corruption. Lecture Notes in Computer Science, 7672, pp. 324-338.

Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2011) Modeling key compromise impersonation attacks on group key exchange protocols. ACM Transactions on Information and System Security, 14(4), 28:1-28:24.
Number of citations in Web of Science® 2

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) Strongly Secure Certificateless Key Agreement. Lecture Notes in Computer Science (LNCS), 5671, pp. 206-230.
Number of full-text downloads 430
Number of citations in Scopus 16
Number of citations in Web of Science® 14

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) Identity-based strong designated verifier signature schemes: Attacks and new construction. Computers and Electrical Engineering, 35(1), pp. 49-53.
Number of citations in Scopus 27
Number of citations in Web of Science® 11

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2009) Efficient one-round key exchange in the efficient one-round key exchange in the standard model. International Journal of Applied Cryptography, 1, pp. 181-199.
Number of full-text downloads 107
Number of citations in Scopus 19

Costello, Craig, Hisil, Huseyin, Boyd, Colin, Gonzalez Nieto, Juan Manuel, & Wong, Kenneth Koon-Ho (2009) Faster pairings on special Weierstrass curves. Lecture Notes in Computer Science, LNCS 5, pp. 89-101.
Number of full-text downloads 107
Number of citations in Scopus 12
Number of citations in Web of Science® 12

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) A novel identity-based strong designated verifier signature scheme. Journal of Systems and Software, 82(2), pp. 270-273.
Number of citations in Scopus 40
Number of citations in Web of Science® 21

Kang, Baoyuan, Boyd, Colin, & Dawson, Edward (2009) A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Computers and Electrical Engineering, 35(1), p. 9.
Number of citations in Scopus 6
Number of citations in Web of Science® 3

Boyd, Colin, Du, Rong, & Foo, Ernest (2008) Designing a secure e-tender submission protocol. Electronic Commerce Research, 8(3), pp. 115-142.
Number of citations in Scopus 1

Josang, Audun, Ismail, Roslan, & Boyd, Colin A. (2007) A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), pp. 618-644.
Number of full-text downloads 5,101
Number of citations in Scopus 1,143
Number of citations in Web of Science® 539

Peng, Kun, Boyd, Colin, & Dawson, Edward (2007) Batch Zero-Knowledge Proof and Verification and Its Applications. ACM Transactions on Information and System Security, 10(2), pp. 1-28.
Number of citations in Scopus 14
Number of citations in Web of Science® 6

Smith, Jason, Tritilanunt, Suratose, Boyd, Colin A., Gonzalez Nieto, Juan M., & Foo, Ernest (2007) Denial-of-service resistance in key establishment. International Journal of Wireless and Mobile Computing, 2(1), pp. 59-71.
Number of full-text downloads 191
Number of citations in Scopus 5

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, Kim, Hwan-Koo, Moon, Sang-Jae, & Park, Jea-Hoon (2007) HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed FRID System. Lecture Notes in Computer Science, 4809, pp. 557-567.

Boyd, Colin, Gonzalez Nieto, Juan, Ha, Jae-Cheol, & Moon, Sang-Jae (2007) Low Cost and Strong-Security RFID Authentication Protocol. Lecture Notes in Computer Science, 4809, pp. 795-807.
Number of citations in Scopus 10
Number of citations in Web of Science® 13

Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan Manuel (2007) On the Connection Between Signcryption and One-pass Key Establishment. Cryptography and Coding (LNCS), 4887, pp. 277-301.
Number of full-text downloads 142
Number of citations in Scopus 3
Number of citations in Web of Science® 4

Ha, JeaCheol, Moon, SangJae, Nieto, Juan Manuel Gonzalez, & Boyd, Colin (2007) Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP). Emerging Technologies in Knowledge Discovery and Data Mining (LNCS), 4819, pp. 574-583.
Number of full-text downloads 64
Number of citations in Scopus 7
Number of citations in Web of Science® 5

Tritilanunt, Suratose, Boyd, Colin A., Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Toward Non-parallelizable Client Puzzles. Cryptology and Network Security (LNCS), 4856, pp. 247-264.
Number of full-text downloads 614
Number of citations in Scopus 6
Number of citations in Web of Science® 9

Boyd, Colin, Gonzalez Nieto, Juan, Okamoto, Eiji, Okamoto, Takeshi, & Tso, Raylin (2007) Verifier-Key-Flexible Universal Designated-Verifier Signatures. Lecture Notes in Computer Science, 4887, pp. 403-421.
Number of citations in Web of Science® 2

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2006) The Importance of Proofs of Security for Key Establishment Protocols: Formal Analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun Protocols. Computer Communications, 29(15), pp. 2788-2797.
Number of full-text downloads 547
Number of citations in Scopus 13
Number of citations in Web of Science® 10

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Batch Verification of Validity of Bids in Homomorphic E-auction. Computer Communications, 29(15), pp. 2798-2805.
Number of full-text downloads 64
Number of citations in Scopus 12
Number of citations in Web of Science® 10

Boyd, Colin, Cliff, Yvonne, & Tin, Yiu (2006) Password Based Server Aided Key Exchange. Applied Cryptography and Network Security (LNCS), 3989, pp. 146-161.
Number of full-text downloads 97
Number of citations in Scopus 6
Number of citations in Web of Science® 5

Chow, Sherman, Boyd, Colin A., & Gonzalez Nieto, Juan M. (2006) Security-Mediated Certificateless Cryptography. Public Key Cryptology- PKC 2006 (LNCS), 3958, pp. 508-524.
Number of full-text downloads 123
Number of citations in Scopus 17
Number of citations in Web of Science® 19

Boyd, Colin A., Choo, Kim-Kwang Raymond, & Mathuria, Anish (2006) An extension to Bellare and Rogaway (1993) model: resetting compromised long-term keys. Lecture Notes in Computer Science, 4058, pp. 371-382.
Number of full-text downloads 316
Number of citations in Scopus 2
Number of citations in Web of Science® 4

Gonzalez Nieto, Juan M., Boyd, Colin A., & Dawson, Edward P. (2005) A Public Key Cryptosystem Based On A Subgroup Membership Problem. Designs, Codes and Cryptography, 36(3), pp. 301-316.
Number of citations in Scopus 9
Number of citations in Web of Science® 2

Boyd, Colin, Mao, Wenbo, & Paterson, Kenneth (2005) Deniable Authenticated Key Establishment for Internet Protocols. Lecture Notes in Computer Science: Security Protocols, 3364, pp. 255-271.
Number of citations in Scopus 3
Number of citations in Web of Science® 3

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) An Efficient and Verifiable Solution to the Millionaire Problem. Lecture Notes in Computer Science, pp. 51-66.
Number of full-text downloads 138
Number of citations in Scopus 3

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2005) Errors in Computational Complexity Proofs for Protocols. Lecture Notes in Computer Science, 3788/2005.
Number of full-text downloads 448
Number of citations in Scopus 37
Number of citations in Web of Science® 42

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2005) Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Lecture Notes in Computer Science, 3788/2005, pp. 585-604.
Number of full-text downloads 593
Number of citations in Scopus 68
Number of citations in Web of Science® 59

Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2005) Modular Proofs for Key Exchange: Rigorous Optimizations n the Canetti-Krawczyk Model. Applicable Algebra in Engineering, Communications and Computing, 2005(1), pp. 1-34.
Number of full-text downloads 41
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) A Multiplicative Homomorphic Sealed-Bid Auction-Based on Goldwasser-Micali Encryption. Lecture Notes in Computer Science- Information security, 3650, pp. 374-388.
Number of full-text downloads 108
Number of citations in Scopus 7
Number of citations in Web of Science® 5

Choo, Kim-Kwang R., Boyd, Colin, Hitchcock, Yvonne, & Maitland, Greg M. (2005) On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. Lecture Notes in Computer Science, 3352, pp. 352-367.
Number of full-text downloads 349
Number of citations in Scopus 3
Number of citations in Web of Science® 8

Choo, Kim-Kwang R., Boyd, Colin A., & Hitchcock, Yvonne (2005) On Session Key Construction in Provably-Secure Key Establishment Protocols. Lecture Notes in Computer Science, 3715, pp. 116-131.
Number of full-text downloads 146
Number of citations in Scopus 13
Number of citations in Web of Science® 16

Boyd, Colin & Choo, Kim (2005) Security of Two-Party Identity-Based Key Agreement. Lecture Notes in Computer Science- Process in Cryptology, 3715, pp. 229-243.
Number of full-text downloads 96
Number of citations in Scopus 22
Number of citations in Web of Science® 24

Peng, Kun, Boyd, Colin A., & Dawson, Edward P. (2005) Simple and Efficient Shuffling with provable Correctness and ZK Privacy. Lecture Notes in Computer Science, pp. 188-204.
Number of full-text downloads 72
Number of citations in Web of Science® 20

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2005) Two Models of Efficient Mixnet-Based Receipt-Free Voting Using (Threshold) Re-encryption. International Journal of Computer Systems Science & Engineering, 20(6), pp. 463-472.

Dawson, Edward P., Viswanathan, Kapaleeswaran, & Boyd, Colin A. (2002) Compliant cryptologic protocols. International Journal of Information Security, 1(3), pp. 189-202.

Boyd, Colin, Dawson, Edward, & Viswanathan, Kapaleeswaran (2002) Hybrid Key Escrow: A New Paradigm. Computers & Security, 21(1), pp. 77-100.

Boyd, Colin, Clark, Andrew, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) Key Recovery for the Commercial Environment. International Journal of Information Security, 1(3), pp. 161-174.

Conference Paper

Alawatugoda, Janaka, Stebila, Douglas, & Boyd, Colin (2014) Modelling after-the-fact leakage for key exchange. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), National Institute of Information and Communications Technology (NICT), Kyoto, Japan.
Number of full-text downloads 8

Nyeem, Hussain, Wageeh, Boles, & Boyd, Colin (2013) Utilizing least significant bit-planes of RONI pixels for medical image watermarking. In Proceedings of DICTA 2013 : Digital Image Computing : Techniques and Applications, 2013, IEEE, Wrest Point Hotel, Hobart, TAS. (In Press)
Number of full-text downloads 26

Nyeem, Hussain, Boles, Wageeh, & Boyd, Colin (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes. In Proceedings of the 6th International Conference on Security of Information and Networks, ACM Press and Digital Library, Aksaray, Turkey. (In Press)
Number of full-text downloads 19

Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) A state-aware RFID privacy model with reader corruption. In The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), 12-13 December 2012, Deakin University, Melbourne, VIC.
Number of full-text downloads 47

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2012) Practical client puzzles in the standard model. In Youm, Heung Youl & Won, Yujae (Eds.) Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, SoonChunHyang University, Korea, Korea.

Seifi, Younes, Suriadi, Suriadi, Foo, Ernest, & Boyd, Colin (2012) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured Petri nets. In Pieprzyk, Josef (Ed.) Information Security 2012 - Proceedings of the Tenth Australasian Information Security Conference (AISC 2012): Conferences in Research and Practice in Information Technology, Volume 125, Australian Computer Society Inc., RMIT University, Melbourne, Vic., pp. 47-58.
Number of full-text downloads 99

Albeshri, Aiiad Ahmad, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) Geoproof : proofs of geographic location for cloud computing environment. In Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops 2012, IEEE, Macau, China, pp. 506-514.
Number of full-text downloads 295
Number of citations in Scopus 3

Lee, Kaleb, Gonzalez Nieto, Juan M., & Boyd, Colin (2012) Improving the efficiency of RFID authentication with pre-computation. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012),, Australian Computer Society Inc, Melbourne, Vic., pp. 91-100.

Lee, Kaleb, Nieto, Juan Gonzalez, & Boyd, Colin (2012) Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking. In 17th Australasian Conference on Information Security and Privacy (ACISP 2012), July 9-11, 2012, Wollongong, NSW. (In Press)
Number of full-text downloads 62

Nyeem, Hussain, Boles, Wageeh, & Boyd, Colin (2012) On the robustness and security of digital image watermarking. In Proceedings of International Conference on Informatics, Electronics & Vision, Dhaka, Bangladesh. (In Press)
Number of full-text downloads 630

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2012) Towards a secure human-and-computer mutual authentication protocol. In Pieprzyk, Josef & Thomborson, Clark (Eds.) Proceedings of the Tenth Australasian Information Security Conference (AISC 2012), Australian Computer Society Inc, Melbourne, Vic., pp. 39-46.
Number of full-text downloads 78

Albeshri, Aiiad Ahmad, Boyd, Colin, & Gonzalez Nieto, Juan M. (2012) A security architecture for cloud storage combining proofs of retrievability and fairness. In Zimmermann, Wolf, Lee, Yong Woo, & Demchenko, Yuri (Eds.) Proceedings of Cloud Computing 2012 : The Third International Conference on Cloud Computing, GRIDS and Virtualization, IARIA, Hotel Novotel Cap, Nice, pp. 30-35.

Kuppusamy, Lakshmi, Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Nieto, Juan Gonzalez (2011) Towards a provably secure DoS-Resilient key exchange protocol with perfect forward secrecy. In Bernstein, Daniel J. & Chatterjee, Sanjit (Eds.) Indocrypt 2011, Springer, Chennai, India, pp. 379-398.
Number of full-text downloads 99
Number of citations in Scopus 1

Nyeem, Hussain, Boles, Wageeh, & Boyd, Colin (2011) Developing a digital image watermarking model. In DICTA '11 Proceedings of the 2011 International Conference on Digital Image Computing: Techniques and Applications, IEEE, Noosa, QLD, pp. 468-473.
Number of full-text downloads 230
Number of citations in Scopus 6

Boyd, Colin & Gonzalez Nieto, Juan M. (2011) On forward secrecy in one-round key exchange. In Lecture Notes in Computer Science: Cryptography and Coding, Springer Berlin / Heidelberg, Oxford, UK, pp. 451-468.
Number of full-text downloads 168
Number of citations in Scopus 4

Radke, Kenneth, Brereton, Margot, Mirisaee, Seyed Hadi, Ghelawat, Sunil, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Tensions in developing a secure collective information practice : the case of Agile Ridesharing. In 13th IFIP TC13 Conference on Human-Computer Interaction (INTERACT 2011), 5-9 September 2011, Lisbon.
Number of full-text downloads 302

Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Automated proofs for Diffie–Hellman–based key exchanges. In Backes, Michael & Zdancewic, Steve (Eds.) 2011 IEEE 24th Computer Security Foundations Symposium (CSF 2011), IEEE, Abbaye des Vaux-de-Cernay, Cernay-la-Ville, pp. 51-65.
Number of full-text downloads 145
Number of citations in Scopus 4
Number of citations in Web of Science® 2

Radke, Kenneth, Boyd, Colin, Gonzalez Nieto, Juan M., & Brereton, Margot (2011) Ceremony analysis : strengths and weaknesses. In Future Challenges in Security and Privacy for Academia and Industry : 26th IFIP TC 11 International Information Security Conference (SEC 2011) Proceedings, Springer, Lucerne University of Applied Sciences and Arts, Luzern, pp. 104-115.
Number of full-text downloads 114

Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan (2011) Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In Kiayias, Aggelos (Ed.) Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Number of full-text downloads 222
Number of citations in Scopus 7
Number of citations in Web of Science® 1

Alsolami, Eesa, Boyd, Colin, Clark, Andrew J., & Ahmed, Irfan (2011) User-representative feature selection for keystroke dynamics. In De Capitani di Vimercati , Sabrina & Samarati , Pierangela (Eds.) International Conference on Network and System Security, 6-8 September 2011, Università degli Studi di Milano, Milan.
Number of full-text downloads 138

Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) An integrated approach to cryptographic mitigation of denial-of-service attacks. In Sandhu, Ravi & Wong, Duncan S. (Eds.) Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Number of full-text downloads 201
Number of citations in Scopus 5

Radke, Kenneth, Boyd, Colin, Margot, Brereton, & Gonzalez Nieto, Juan M. (2010) How HCI design influences web security decisions. In Proceedings of OZCHI 2010 : Design – Interaction – Participation, CHISIG, Queensland University of Technology, Brisbane, Queensland.
Number of full-text downloads 37
Number of citations in Scopus 1

Ngo, Long, Boyd, Colin, & Nieto, Juan Gonzalez (2010) Automating computational proofs for public-key-based key exchange. In Heng, Swee-Huay & Kurosawa, Kaoru (Eds.) Provable Security : Proceedings of the 4th International Conference on Provable Security, Springer, Hotel Equatorial Melaka, Malacca, Malaysia, pp. 53-69.
Number of full-text downloads 103
Number of citations in Scopus 2
Number of citations in Web of Science® 1

Sun, Dongdong, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2010) Delegation in predicate encryption supporting disjunctive queries. In Rannenberg, Kai & Varadharajan, Vijay (Eds.) IFIP Advances in Information and Communication Technology : Proceedings of 25th IFIP TC-11 International Information Security Conference, SEC 2010, Springer, Brisbane, pp. 229-240.
Number of full-text downloads 211
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Al solami, Eesa, Boyd, Colin, Clark, Andrew, & Khandoker, Asadul Islam (2010) Continuous biometric authentication : can it be more practical? In 12th IEEE International Conference on High Performance Computing and Communications, 1-3 September 2010, Melbourne.
Number of full-text downloads 361
Number of citations in Scopus 1

Gorantla, M. Choudary, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Attribute-based authenticated key exchange. In Information Security and Privacy : Proceedings of the 15th Australasian Conference, ACISP 2010, Springer, Macquarie Graduate School of Management, Sydney.
Number of full-text downloads 325
Number of citations in Scopus 7
Number of citations in Web of Science® 4

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Delaying mismatched field multiplications in pairing computations. In Arithmetic of Finite Fields : Third International Workshop, WAIFI 2010, Proceedings, Springer Verlag, Istanbul, Turkey, pp. 196-214.
Number of full-text downloads 73

Costello, Craig, Boyd, Colin, Gonzalez Nieto, Juan M., & Wong, Kenneth Koon-Ho (2010) Avoiding full extension field arithmetic in pairing computations. In Progress in Cryptology - AFRICACRYPT 2010, Springer Verlag, Stellenbosch, South Africa, pp. 203-224.
Number of full-text downloads 63
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Lippold, Georg, Boyd, Colin, & Gonzalez Nieto, Juan M. (2010) Efficient certificateless KEM in the standard model. In Hong, Seokhie & Lee, Donghoon (Eds.) Lecture Notes in Computer Science : Information, Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korea University, Seoul, pp. 34-46.
Number of full-text downloads 156
Number of citations in Scopus 1

Gorantla, Choudary, Boyd, Colin, Gonzalez Nieto, Juan M., & Manulis, Mark (2010) Generic one round group key exchange in the standard model. In Lee, Donghoon & Hong, Seokhie (Eds.) Lecture Notes in Computer Science : Information Security and Cryptology (ICISC 2009), Springer Berlin / Heidelberg, Korean Institute of Information Security and Cryptology, Korea, pp. 1-15.
Number of full-text downloads 617
Number of citations in Scopus 5

Alzaid, Hani, Park, Dong-Gook, Gonzalez Nieto, Juan M., Boyd, Colin, & Foo, Ernest (2009) A forward and backward secure key management in wireless sensor networks for PCS/SCADA. In Proceedings of the 1st International ICST Conference on Sensor Systems and Software, 7-9 September 2009, Grand Hotel Duomo of Pisa, Pisa. (In Press)
Number of full-text downloads 491
Number of citations in Scopus 1

Cliff, Yvonne, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) How to extract and expand randomness : a summary and explanation of existing results. In Applied Cryptography and Network Security, 2-5 June 2009, Place de l'Etoile , Paris.
Number of full-text downloads 167

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Modeling key compromise impersonation attacks on group key exchange protocols. In Public Key Cryptography 2009, March 18-20, 2009, Irvine, CA, USA.
Number of citations in Scopus 10

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Universally composable contributory group key exchange. In Asian ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), 10 - 12 March 2009, Sydney.
Number of citations in Scopus 6

Gorantla, Choudary, Boyd, Colin, & Gonzalez Nieto, Juan Manuel (2009) Strong designated verifier signature in a multi-user setting. In Seventh Australasian Information Security Conference (AISC 2009), Jan 20-23, 2009, Wellington, New Zealand.
Number of full-text downloads 89

Boyd, Colin (2008) Applications of elliptic curve pairings in cryptography. In Dorfer, G, Eigenthaler, G, & Kautschitsch, H (Eds.) Contributions to General Algebra 18, 1-4 February 2007, Klagenfurt, Austria.
Number of full-text downloads 126

Boyd, Colin, Cliff, Yvonne, Gonzalez Nieto, Juan M., & Paterson, Kenneth (2008) Efficient one-round key exchange in the standard model. In Information Security and Privacy : 13th Australasian Conference (ACISP 2008), 7-9 July 2008, Wollongong, NSW.
Number of full-text downloads 42
Number of citations in Scopus 33
Number of citations in Web of Science® 22

Boyd, Colin, Bradley, Andrew, Chen, Shaokang, Crozier, Stuart, Dowling, Jason, Du, Jiang, et al. (2008) A comparison of DCT and DWT block based watermarking on medical image quality. In Shi, Yun, Kim, Hyoung, & Katzenbeisser, Stefan (Eds.) Digital Watermarking 6th International Workshop (LNCS 5041), 3-5 December, 2007, Guangzhou, China.
Number of citations in Scopus 1

Boles, Wageeh, Boyd, Colin, & Hirschbichler, Marianne (2008) A multiple-control fuzzy vault. In Korba, L, Marsh, S, & Safavi-Naini, R (Eds.) Proceedings of Sixth Annual Conference on Privacy, Security and Trust, 2008, 1-3 October, 2008, New Brunswick, Canada.
Number of citations in Scopus 6
Number of citations in Web of Science® 1

Boles, Wageeh, Boyd, Colin, & Hirschbichler, Marianne (2008) A scheme for enhancing security using multiple fingerprints and the fuzzy vault. In Ceballos, S (Ed.) Proceedings of Digital Image Computing: Techniques and Applications, 2008, 1-3 December 2008, Australia, Australian Capital Territory, Canberra.
Number of citations in Scopus 2

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan M. (2007) Cost-based and time-based analysis of DoS-resistance in HIP. In Dobbie, Gillian (Ed.) Thirtieth Australasian Computer Science Conference (ACSC2007), January 30 to February 2, 2007, Ballarat, Victoria.
Number of full-text downloads 127

Brown, Jaimee, Gonzalez Nieto, Juan M., & Boyd, Colin (2007) Efficient and secure self-escrowed public-key infrastructures. In Deng, Robert & Samarati, Pierangela (Eds.) ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security, ACM (The Association for Computing Machinery), pp. 284-294.
Number of citations in Scopus 3

Gorantla, M. Choudary, Boyd, Colin A., & Gonzalez Nieto, Juan M. (2007) ID-based One-pass Authenticated Key Establishment. In Proceedings of the Sixth Australasian Information Security Conference (AISC 2008), Australian Computer Society, Wollongong, Australia.
Number of full-text downloads 298

Dowling, Jason A., Planitz, Birgit M., Maeder, Anthony J., Du, Jiang, Pham, Binh L., Boyd, Colin A., et al. (2007) Visual quality assessment of watermarked medical images. In Jiang, Yulei & Sahiner, Berkman (Eds.) Medical Imaging 2007: Image Perception, Observer Performance, and Technology Assessment: SPIE (Vol. 6515): Progress in Biomedical Optics and Imaging, 21-22 February 2007, San Diego, CA, USA.
Number of full-text downloads 356

Boyd, Colin, Brown, Jaimee, & Gonzalez Nieto, Juan (2006) Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. In Pointcheval, D, Mu, Y, & Chen, K (Eds.) Cryptology and Network Security (LNCS 4301), 8-10 December 2006, China, Jiangsu, Suzhou.
Number of citations in Scopus 1
Number of citations in Web of Science® 1

Boyd, Colin, Brown, Jaimee, & Gonzalez Nieto, Juan (2006) Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. In Barua, R & Lange, T (Eds.) Progress in Cryptology - INDOCRYPT 2006, 11 - 13 December 2006, India, Kolkata.

Tritilanunt, Suratose, Boyd, Colin A., Foo, Ernest, & Nieto, Juan Gonzalez (2006) Examining the DOS Resistance to HIP. In Meersman, R. & Tari, Z. (Eds.) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (LNCS 4277), 29 October - 3 November, Montpellier, France.
Number of full-text downloads 80

Du, Rong, Foo, Ernest, Boyd, Colin A., & Choo, Kim-Kwang R. (2006) Formal analysis of secure contracting protocol for E-Tendering. In Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 16 - 19 Jan 2006, Hobart, Australia.
Number of full-text downloads 232
Number of citations in Scopus 2

Boyd, Colin, Gonzalez-Nieto, Juan, & Smith, Jason (2006) Modelling Denial of Service Attacks on JFK with Meadow's Cost-Based Framework. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Australian Computer Society Inc., Australia, Tasmania, Hobart, pp. 125-134.
Number of citations in Scopus 4

Boyd, Colin, Dawson, Edward, Okamoto, Eiji, & Peng, Kun (2006) A Novel Range Test. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 18
Number of citations in Scopus 2
Number of citations in Web of Science® 13

Boyd, Colin, Dawson, Edward, Dawson, Robert, & Gonzalez Nieto, Juan (2006) SKMA - A Key Management Architecture for SCADA Systems. In Buyya, R, Ma, T, Safavi-Naini, R, Steketee, C, & Susilo, W (Eds.) ACSW Frontiers 2006, Australian Computer Society Inc, Australia, Tasmania, Hobart, pp. 183-192.
Number of full-text downloads 214
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Sealed-Bid Micro Auctions. In Fischer-Hubner, S, Rannenberg, K, Yngstrom, L, & Lindskog, S (Eds.) Security and Privacy in Dynamic Environments, 22 - 24 May 2006, Sweden, Karlstad.
Number of full-text downloads 33

Tritilanunt, Suratose, Boyd, Colin, Foo, Ernest, & Gonzalez Nieto, Juan (2006) Using coloured petri nets to simulate DoS-resistant protocols. In Jensen, K (Ed.) CPN'06 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, 24 - 26 October 2006, Denmark, Aarhus.
Number of full-text downloads 69

Du, Rong, Boyd, Colin A., & Foo, Ernest (2006) A secure e-tender submission protocol. In Fischer-Hubner, S., Furnell, S., & Lambrinoudakis, C. (Eds.) Trust, Privacy, and Security in Digital Business, 5-7 September, Krakow, Poland.
Number of full-text downloads 196

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) Ciphertext Comparison, a New Solution to the Millionaire Problem. In Information and Communications Security, 10-13 December, 2005, China, Beijing.
Number of full-text downloads 153
Number of citations in Scopus 3
Number of citations in Web of Science® 5

Choo, Kim-Kwang R., Boyd, Colin A., Hitchcock, Yvonne, & Maitland, Greg M. (2005) Complementing Computational Protocol Analysis with Formal Specifications. In Dimitrakos, Theo & Martinelli, Fabio (Eds.) IFIP TC1 WG1.7 Second International Workshop on Formal Aspects in Security and Trust - FAST 2004, 26 - 27 August, Toulouse, France.
Number of full-text downloads 177

Boyd, Colin, Du, Rong, Foo, Ernest, & Gonzalez-Nieto, Juan (2005) Designing Secure E-Tendering Systems. In Katsikas, S, Lopez, J, & Pernul, G (Eds.) Trust, Privacy, and Security in Digital Business: Proceedings of the Second International Conference, Trustbus 2005, 22 August - 26 August 2005, Denmark, Copenhagen.
Number of citations in Scopus 5
Number of citations in Web of Science® 2

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. In Dawson, E & Vaudenay, S (Eds.) Progress in Cryptology - Mycrypt 2005, 28-30 September 2005, Malaysia, Kuala Lumpur.
Number of full-text downloads 67
Number of citations in Scopus 9
Number of citations in Web of Science® 6

Du, Rong, Foo, Ernest, Boyd, Colin, & Fitzgerald, Brian F. (2004) Secure communication protocol for preserving E-tendering integrity. In Fifth Asia-Pacific Industrial Engineering and Management Systems Conference, 12-15 December 2004, Gold Coast, Australia.
Number of full-text downloads 394

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. In Jakobsson, M, Yung, M, & Zhou, J (Eds.) Applied Cryptography and Network Security Second International Conference on Applied Cryptography and Network Security (LNCS 3089), 8 - 11 June 2004, Yellow Mountain, China.
Number of full-text downloads 124
Number of citations in Scopus 6
Number of citations in Web of Science® 11

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapali (2004) A Correct, Private and Efficient Mix Network. In Boa, F, Deng, R, & Zhou, J (Eds.) Publick Key Cryptography - PKC 2004. Seventh International Workshop on Theory and Practice in Public Key Cryptography., 1-4 March 2004, Singapore.
Number of full-text downloads 63
Number of citations in Scopus 14
Number of citations in Web of Science® 19

Boyd, Colin, Du, Rong, Fitzgerald, Brian, & Foo, Ernest (2004) Defining Security Services for Electronic Tendering. In Hogan, J, Montague, P, Purvis, M, & Steketee, C (Eds.) Proceedings of the ACSW Workshop. The Australian Information Security Workshop (AISW2004)., January, 2004, Dunedin, New Zealand.
Number of full-text downloads 77

Boyd, Colin (2004) Design of Secure Key Establishment Protocols: Successes, Failures and Prospects. In Canteaut, A & Viswanathan, K (Eds.) Progress in Cryptogology - INDOCRYPT 2004. 5th International Conference on Cryptology in India., 20-22 December 2004, Chennai, India.
Number of full-text downloads 136

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapali (2004) Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. In Chae, K & Yung, M (Eds.) Information Security Applications. Fourth International Workshop, WISA 2003., 25-27 August 2003, Jeju Island, Korea.
Number of full-text downloads 51
Number of citations in Scopus 1

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2004) An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. In Trust and Privacy in Digital Business, 30 August - 1 September 2004, Zaragoza, Spain.
Number of citations in Scopus 17
Number of citations in Web of Science® 10

Boyd, Colin, Ismail, Roslan, Josang, Audun, & Russell, Selwyn (2004) An Efficient Off-Line Reputation Scheme Using Articulated Certificates. In Security In Information Systems, April 14-17 2004, Porto, Portugal.
Number of full-text downloads 38

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Lee, Byoungcheon (2004) Implementation Issues in Secure E-Voting Schemes. In Kozan, E (Ed.) Proceedings of Abstracts and Papers (On CD-Rom) of the Fifth Asia-Pacific Industrial Engineering and Management Systems (APIEMS) Conference 2004 and the Seventh Asia-Pacific Division Meeting of the International Foundation of Production Research, 12-15 December 2004, Gold Coast, Australia.
Number of full-text downloads 191

Boyd, Colin A., Mao, Wenbo, & Paterson, Kenneth Graham (2004) Key Agreement Using Statically Keyed Authenticators. In Jakobsson, M., Yung, M., & Zhou, J. (Eds.) Applied Cryptography and Network Security. Second International Conference, ACNS 2004, June 2004, Yellow Mountain, China.
Number of full-text downloads 69
Number of citations in Scopus 24
Number of citations in Web of Science® 32

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) Multiplicative Homomorphic E-Voting. In Canteaut, A & Viswanathan, K (Eds.) Progress in Cryptology - INDOCRYPT 2004. 5th International Conference on Cryptology in India., 20-22 December 2004, Chennai, India.
Number of full-text downloads 436
Number of citations in Scopus 14
Number of citations in Web of Science® 12

Boyd, Colin, Ismail, Roslan, Josang, Audun, & Russell, Selwyn (2004) Private Reputation Schemes for P2P Systems. In Fernandex-Medina,, Castro,, & Villalba, (Eds.) Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, 13-14 April 2004, Porto, Portugal.
Number of full-text downloads 49

Boyd, Colin, Gonzalez-Nieto, Juan, Tin, Yiu, & Vasanta, Hari (2004) Protocols with Security Proofs for Mobile Applications. In Wang, H, Pieprzyk, J, & Varadharajan, V (Eds.) Information Security and Privacy - ACISP 2004 (LNCS 3108), 13-15 July 2004, Sydney, New South Wales.
Number of full-text downloads 57
Number of citations in Scopus 3
Number of citations in Web of Science® 5

Boyd, Colin, Dawson, Edward, Kim, Kwangjo, Lee, Byoungcheon, Yang, Jeongmo, & Yoo, Seungjae (2004) Providing Receipt-Freeness In Mixnet-Based Voting Protocols. In Proceedings of the 6th International Conference on Infomation Security and Cryptology - ICISC 2003, 27-28 November 2003, Seoul, Korea.
Number of citations in Scopus 21
Number of citations in Web of Science® 3

Boyd, Colin, Du, Rong, Fitzgerald, Brian, & Foo, Ernest (2004) Secure Communications Protocol for Preserving E-Tendering Integrity. In Kozan, E (Ed.) Proceedings of The Fifth Asia-Pacific Industrial Engineering and Management Systems (APIEMS) Conference 2004, 12-15 December 2004, Gold Coast, Australia.

Boyd, Colin, Gonzalez-Nieto, Juan, Looi, Mark, Tin, Yiu, & Vasanta, Hari (2004) A Secure Framework for User Privacy in Heterogenous Location Networks. In Karmouch, A, Korba, L, & Madeira, E (Eds.) Mobility Aware Technologies and Applications, 20-22 October 2004, Florianopolis, Brazil.
Number of full-text downloads 44

Boyd, Colin, Dawson, Edward, Kim, Kwangjo, Lee, Byoungcheon, Yang, Jeongmo, & Yoo, Seungjae (2004) Secure Key Issuing in ID-Based Cryptography. In Hogan,, Montague,, Purvis,, & Steketee, (Eds.) ACSW Frontiers 2004, Proceedings of the Australian Information Security Workshop (AISW2004), January 2004, Dunedin, New Zealand.

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) A Secure and Efficient Mix-Network Using Extended Binary Mixing Gate. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses - 2004, 5-6 July 2004, Gold Coast, Australia.
Number of full-text downloads 24

Boyd, Colin, Gonzalez-Nieto, Juan, & Hitchcock, Yvonne (2004) Tripartite Key Exchange in the Cannetti-Krawczyk Proof Model. In Canteaut, A & Viswanathan, K (Eds.) Progress in Cryptology - INDOCRYPT 2004. Fifth International Conference on Cryptology in India., 20-22 December 2004, Chennai, India.
Number of full-text downloads 65

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2003) Five Sealed-Bid Auction Models. In Johnson, C, Montague, P, & Steketee, C (Eds.) ACSW Frontiers 2003, February 2003, Adelaide, South Australia.
Number of full-text downloads 31

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2003) Non-Interactive Auction Scheme with Strong Privacy. In Lee, P & Lim, C (Eds.) Information Security and Cryptology - ICISC 2002, 28-29 November 2002, Seoul, Korea.
Number of full-text downloads 53
Number of citations in Scopus 3

Hitchcock, Yvonne, Tin, Yiu S., Gonzalez Nieto, Juan M., Boyd, Colin A., & Montague, Paul S. (2003) A Password-Based AUthenticator: Security Proof Applications. In Johansson, T. & Maitra, S. (Eds.) Progress in Cryptology - INDOCRYPT 2003, 8-10 December, New Delhi, India.
Number of full-text downloads 110

Boyd, Colin, Gonzalez-Nieto, Juan, & Tin, Yiu (2003) Provably Secure Key Exchange: An Engineering Approach. In Johnson, C, Montague, P, & Steketee, C (Eds.) ACSW Frontiers 2003, February 2003, Adelaide, South Australia.
Number of full-text downloads 44

Boyd, Colin, Gonzalez-Nieto, Juan, & Tin, Yiu (2003) Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. In Safavi-Naini, R & Seberry, J (Eds.) Information Security and Privacy - ACISP 2003 (LNCS:2727), 9-111 July, 2003, Wollongong, New South Wales.
Number of full-text downloads 16
Number of citations in Scopus 6
Number of citations in Web of Science® 3

Boyd, Colin A. & Gonzalez Nieto, Juan M. (2003) Round-Optimal Contributory Conference Key Agreement. In Desmedt, Y. (Ed.) Public Key Cryptography - PKC 2003, January, Miami, FL, USA.
Number of full-text downloads 268
Number of citations in Scopus 54
Number of citations in Web of Science® 74

Aditya, Riza, Boyd, Colin, Dawson, Edward, & Viswanathan, Kapaleeswaran (2003) Secure E-Voting for Preferential Elections. In Traunmuller, R (Ed.) Eectronic Government - EGOV 2003, September, 2003, Prague, Czech Republic.
Number of full-text downloads 104
Number of citations in Scopus 2
Number of citations in Web of Science® 3

Boyd, Colin, Ismail, Roslan, Josang, Audun, & Russell, Selwyn (2003) A Security Architecture for Reputation Systems. In Bauknecht, K, Tjoa, M, & Quirchmayr, G (Eds.) E-Commerce and Web Technologies, September, 2003, Prague, Czech Republic.
Number of full-text downloads 68
Number of citations in Web of Science® 4

Boyd, Colin & Viswanathan, Kapaleeswaran (2003) Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. In Abdallah, A, Ryan, P, & Schneider, S (Eds.) Formal Aspects of Security - FASec 2002, December, 2002, London, United Kingdom.
Number of full-text downloads 74

Boyd, Colin & Maitland, Gregory (2002) Co-operatively Formed Group Signatures. In Preneel, Bart (Ed.) Topics in Cryptography (CT-RSA 2002), 18-22 February, 2002, San Jose, USA.

Boyd, Colin & Maitland, Gregory (2002) A Provably Secure Restrictive Partially Blind Signature Scheme. In Nacache, David & Pailler, Pascal (Eds.) LNCS 2274: Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptology (PKC'02), 12-14 February, 2002, Paris, France.

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2002) Robust, Privacy Protecting, and Publicly Verifiable Sealed-bid Auction. In Deng,, Qing,, Boo,, & Zhou, (Eds.) Information and Communications Security (ICICS'02), 9-12 December, 2002, Singapore.
Number of citations in Web of Science® 13

Boyd, Colin, Dawson, Edward, Gonzalez Nieto, Juan, & Viswanathan, Kapaleeswaran (2002) A Self-Escrowed Integer Factorisation Based Public Key Infrastructure. In Gonzalez, & Martinez, (Eds.) VII Spanish Meeting on Cryptology and Information Security (RECSI VII), 5-7 September, 2002, Asturias, Spain.

Boyd, Colin, Dawson, Edward, & Viswanathan, Kapali (2001) An Analysis of Integrity Services in Protocol. In Progress in Cryptology - INDOCRYPT 2001, 16-20 December 2001.

Boyd, Colin & Pavlovski, Christopher (2001) Attacks Based on Small Factors in Various Group Structures. In Information Security and Privacy - ACISP 2001 (LNCS 2119), 11-13 July 2001.
Number of citations in Web of Science® 2

Boyd, Colin, Dawson, Edward, Kim, Jung-Joon, & Park, Dong-Gook (2001) Cryptographic Salt: A Countermeasure Against Denial-Of-Service Attacks. In Information Security and Privacy - ACISP 2001 (LNCS 2119), 11-13 July 2001.

Boyd, Colin, Montague, Paul, & Nguyen, Khanh (2001) Elliptic Curve Based Password Authenticated Key Exchange Protocols. In Information Security and Privacy - ACISP 2001 (LNCS 2119), 11-13 July 2001.
Number of citations in Web of Science® 29

Boyd, Colin & Maitland, Gregory (2001) Fair Electronic Cash Based on a Group Signature Scheme. In Information and Communications Security, 13-16 November 2001.

Boyd, Colin, Dawson, Edward, & Park, Dong-Gook (2001) Micropayments for Wireless Communications. In Information Security and Cryptology - ICISC 2000, 8-9 December 2000.

Boyd, Colin, Dawson, Edward, & Gonzalez-Nieto, Juanma (2001) A Public Key Cryptosystem Based on the Subgroup Membership Problem. In Information and Communications Security, 13-16 November 2001.

Maitland, Gregory M., Reid, Jason F., Foo, Ernest, Boyd, Colin A., & Dawson, Edward P. (2000) Linkability in Practical Electronic Cash Design. In Third Information Security Workshop (ISW 2000), 20-21 December, 2000, Wollongong, Australia.
Number of full-text downloads 259

Conference Item

Ngo, Long, Boyd, Colin, & Gonzalez Nieto, Juan M. (2011) Automated proof for formal indistinguishability and its applications. In The 7th Workshop on Formal and Computational Cryptography (FCC 2011), 30 June 2011, Institut Henri Poincaré, Paris. (Unpublished)
Number of full-text downloads 80

Report

Seifi, Younes, Suiadi, Suriadi, Foo, Ernest, & Boyd, Colin (2011) Analysis of Object-Specific Authorization Protocol (OSAP) using coloured petri nets - Version 1.0. (Unpublished)
Number of full-text downloads 212

This list was generated on Sat Aug 16 07:05:34 2014 EST.