Navigation

  • Skip to Content
NTNU Home NTNU Home

ntnu.edu

  • Studies
    • Master's programmes in English
    • For exchange students
    • PhD opportunities
    • All programmes of study
    • Courses
    • Financing
    • Language requirements
    • Application process
    • Academic calendar
    • FAQ
  • Research and innovation
    • NTNU research
    • Research excellence
    • Strategic research areas
    • Innovation resources
    • PhD opportunities
  • Life and housing
    • Student in Trondheim
    • Student in Gjøvik
    • Student in Ålesund
    • For researchers
    • Life and housing
  • About NTNU
    • Contact us
    • Faculties and departments
    • Libraries
    • International researcher support
    • Vacancies
    • About NTNU
    • Maps
  1. Employees

Språkvelger

Norsk

Colin Alexander Boyd

Download press photo
Download press photo
Foto:

Colin Alexander Boyd

Researcher
Department of Information Security and Communication Technology

colin.boyd@ntnu.no
+4773551758 +4798065197 Elektro B, 225, Gløshaugen
About Publications Teaching Outreach

About

I joined NTNU in 2013 as Professor in information security. I have previously been a faculty member at QUT, Australia and University of Manchester, UK.

For my publications please see my Google Scholar page.

Publications

  • Chronological
  • By category
  • See all publications in Cristin

2024

  • Marku, Enio; Boyd, Colin Alexander; Biczok, Gergely. (2024) SafeLib: A Comprehensive Framework for Secure Outsourcing of Network Functions. IEEE Transactions on Network and Service Management
    Academic article

2023

  • Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise. (2023) Hybrid Group Key Exchange with Application to Constrained Networks. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Millerjord, Lise; de Kock, Bor. (2023) Modular Design of KEM-Based Authenticated Key Exchange. Lecture Notes in Computer Science (LNCS)
    Academic article

2022

  • Boyd, Colin Alexander. (2022) Key Exchange (Chapter 9). ISTE
    Academic chapter/article/Conference paper

2021

  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2021) SafeLib: a practical library for outsourcing stateful network functions securely. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander. (2021) Introduction to the Special Issue on TLS 1.3. Journal of Cryptology
    Editorial
  • Boyd, Colin Alexander; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise. (2021) Symmetric Key Exchange with Full Forward Security and Robust Synchronization. Lecture Notes in Computer Science (LNCS)
    Academic article

2020

  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Preface. Information Security and Cryptography (IS&C)
    Editorial
  • Au, Man Ho; Han, Jinguang; Wu, Qianhong; Boyd, Colin Alexander. (2020) Special Issue on Cryptographic Currency and Blockchain Technology. Future Generation Computer Systems
    Editorial
  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Protocols for Authentication and Key Establishment. Springer Springer
    Academic monograph
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2020) Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Communications Magazine
    Academic article
  • Boyd, Colin Alexander; Gellert, Kai. (2020) A Modern View on Forward Security. Computer journal
    Academic article
  • Boyd, Colin Alexander; Haines, Thomas Edmund; Rønne, Peter. (2020) Vote Selling Resistant Voting. Lecture Notes in Computer Science (LNCS)
    Academic article

2019

  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2019) Towards protected VNFs for multi-operator service delivery. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Hale, Britta. (2019) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS)
    Academic article

2018

  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander. (2018) OWASP Top 10 - Do Startups Care?. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage. Association for Computing Machinery (ACM)
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Carr, Christopher. (2018) Valuable Puzzles for Proofs-of-Work. Lecture Notes in Computer Science (LNCS)
    Academic article

2017

  • Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. (2017) Key recovery: Inert and public. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas. (2017) Bitcoin Unchained. ERCIM News
    Academic article
  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Association for Computing Machinery (ACM)
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Hale, Britta. (2017) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS)
    Academic article

2016

  • Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. Springer
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance . ERCIM News
    Academic article
  • Radke, Kenneth; Boyd, Colin Alexander. (2016) Security Proofs for Protocols Involving Humans. Computer journal
    Academic article
  • Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Carr, Christopher. (2016) Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Cremers, Cas; Feltz, Michele; Paterson, K; Poettering, Bertram; Stebila, Douglas. (2016) ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security
    Academic article

2015

  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Modelling attacks on self-authentication watermarking. Multimedia Tools and Applications
    Academic article
  • Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. (2015) PassCue: The Shared Cues System in Practice. Springer Publishing Company
    Academic chapter/article/Conference paper
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Springer
    Academic chapter/article/Conference paper
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing
    Academic article
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science (LNCS)
    Academic article

2014

  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing
    Academic article
  • Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Bartlett, Harry. (2014) CHURNs: Freshness Assurance for Humans. Computer journal
    Academic article
  • Albeshri, Aiiad; Boyd, Colin Alexander; Gonzalez Nieto, Juan. (2014) Enhanced GeoProof: improved geographic assurance for data in the cloud. International Journal of Information Security
    Academic article
  • Seifi, Y; Suriadi, Suriadi; Foo, Ernest; Boyd, Colin Alexander. (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks (IJSN)
    Academic article
  • Hale, Britta J.; Boyd, Colin Alexander. (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. Springer Publishing Company
    Academic chapter/article/Conference paper
  • Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. (2014) Continuous After-the-Fact Leakage-Resilient Key Exchange. Springer
    Academic chapter/article/Conference paper

2013

  • Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Buys, Laurie. (2013) "Who decides?" Security and Privacy in the Wild. ACM Publications
    Academic chapter/article/Conference paper
  • Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh. (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes. Association for Computing Machinery (ACM)
    Academic chapter/article/Conference paper

Journal publications

  • Marku, Enio; Boyd, Colin Alexander; Biczok, Gergely. (2024) SafeLib: A Comprehensive Framework for Secure Outsourcing of Network Functions. IEEE Transactions on Network and Service Management
    Academic article
  • Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise. (2023) Hybrid Group Key Exchange with Application to Constrained Networks. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Millerjord, Lise; de Kock, Bor. (2023) Modular Design of KEM-Based Authenticated Key Exchange. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander. (2021) Introduction to the Special Issue on TLS 1.3. Journal of Cryptology
    Editorial
  • Boyd, Colin Alexander; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise. (2021) Symmetric Key Exchange with Full Forward Security and Robust Synchronization. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Preface. Information Security and Cryptography (IS&C)
    Editorial
  • Au, Man Ho; Han, Jinguang; Wu, Qianhong; Boyd, Colin Alexander. (2020) Special Issue on Cryptographic Currency and Blockchain Technology. Future Generation Computer Systems
    Editorial
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2020) Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Communications Magazine
    Academic article
  • Boyd, Colin Alexander; Gellert, Kai. (2020) A Modern View on Forward Security. Computer journal
    Academic article
  • Boyd, Colin Alexander; Haines, Thomas Edmund; Rønne, Peter. (2020) Vote Selling Resistant Voting. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Hale, Britta. (2019) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Carr, Christopher. (2018) Valuable Puzzles for Proofs-of-Work. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. (2017) Key recovery: Inert and public. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas. (2017) Bitcoin Unchained. ERCIM News
    Academic article
  • Boyd, Colin Alexander; Hale, Britta. (2017) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance . ERCIM News
    Academic article
  • Radke, Kenneth; Boyd, Colin Alexander. (2016) Security Proofs for Protocols Involving Humans. Computer journal
    Academic article
  • Boyd, Colin Alexander; Carr, Christopher. (2016) Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Boyd, Colin Alexander; Cremers, Cas; Feltz, Michele; Paterson, K; Poettering, Bertram; Stebila, Douglas. (2016) ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Modelling attacks on self-authentication watermarking. Multimedia Tools and Applications
    Academic article
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing
    Academic article
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science (LNCS)
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing
    Academic article
  • Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Bartlett, Harry. (2014) CHURNs: Freshness Assurance for Humans. Computer journal
    Academic article
  • Albeshri, Aiiad; Boyd, Colin Alexander; Gonzalez Nieto, Juan. (2014) Enhanced GeoProof: improved geographic assurance for data in the cloud. International Journal of Information Security
    Academic article
  • Seifi, Y; Suriadi, Suriadi; Foo, Ernest; Boyd, Colin Alexander. (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks (IJSN)
    Academic article

Books

  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Protocols for Authentication and Key Establishment. Springer Springer
    Academic monograph

Part of book/report

  • Boyd, Colin Alexander. (2022) Key Exchange (Chapter 9). ISTE
    Academic chapter/article/Conference paper
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2021) SafeLib: a practical library for outsourcing stateful network functions securely. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2019) Towards protected VNFs for multi-operator service delivery. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander. (2018) OWASP Top 10 - Do Startups Care?. IEEE (Institute of Electrical and Electronics Engineers)
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage. Association for Computing Machinery (ACM)
    Academic chapter/article/Conference paper
  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Association for Computing Machinery (ACM)
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. Springer
    Academic chapter/article/Conference paper
  • Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case. IEEE conference proceedings
    Academic chapter/article/Conference paper
  • Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. (2015) PassCue: The Shared Cues System in Practice. Springer Publishing Company
    Academic chapter/article/Conference paper
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Springer
    Academic chapter/article/Conference paper
  • Hale, Britta J.; Boyd, Colin Alexander. (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. Springer Publishing Company
    Academic chapter/article/Conference paper
  • Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. (2014) Continuous After-the-Fact Leakage-Resilient Key Exchange. Springer
    Academic chapter/article/Conference paper
  • Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Buys, Laurie. (2013) "Who decides?" Security and Privacy in the Wild. ACM Publications
    Academic chapter/article/Conference paper
  • Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh. (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes. Association for Computing Machinery (ACM)
    Academic chapter/article/Conference paper

Teaching

Courses

  • TTM4502 - Specialization Project
  • TTM4905 - Master's Thesis

Outreach

2020

  • Academic lecture
    wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. (2020) A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains 2020-07-20 - 2020-07-21

2017

  • Lecture
    Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. ACM ACM Asia Conference on Computer and Communications Security (ASIACCS'17) 2017-04-02 - 2017-04-06
  • Academic lecture
    Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2017) Secure Deduplication - Models and Optimization. CRISP – Center for Research in Security and Privacy Distinguished Lectures Series in Cybersecurity , Darmstadt 2017-11-16 -

2016

  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS. Marc Fischlin TU-Darmstadt Invited Talk , Darmstadt, Germany 2016-04-21 - 2016-04-21
  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta. (2016) Secure Channels and Termination: The Last Word on TLS. Marc Fischlin, Bogdan Warinschi Secure Key Exchange and Channel Protocols (SKECH) Workshop 2016 , Bertinoro, Italy 2016-07-01 - 2016-07-04
  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS. Tor Helleseth, Britta Hale, Hanno Langweg COINS Finse Winter School 2016 , Finse, Norway 2016-04-24 - 2016-04-29
  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016 , San Francisco, USA 2016-02-29 - 2016-03-04
  • Academic lecture
    Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. (2016) Key Recovery: Inert, Public, Transparent (KRIPT) . MMU Mycrypt 2016: Paradigm-shifting Crypto , Pullman Kuala Lumpur City Centre 2016-12-01 - 2016-12-02
  • Academic lecture
    Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case. IEEE NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium 2016-04-25 - 2016-04-29
  • Academic lecture
    Boyd, Colin Alexander. (2016) Modelling the Security of Key Exchange. Nanjing University of Finance and Economics Tenth International Conference on Provable Security (ProvSec 2016) , Nanjing 2016-11-10 - 2016-11-12

2015

  • Academic lecture
    Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography and Data Security 2015-01-26 - 2015-01-30
  • Academic lecture
    Boyd, Colin Alexander; Stebila, Douglas; Alawatugoda, Janaka. (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. The Institute of Mathematics and its Applications (IMA) Fifteenth IMA International Conference on Cryptography and Coding , Oxford 2015-12-15 - 2015-12-17

2014

  • Academic lecture
    Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. (2014) Continuous after-the-fact leakage-resilient key exchange. Information Security and Privacy 19th Australasian Conference, ACISP 2014 2014-07-07 - 2014-07-09
  • Academic lecture
    Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Manulis, Mark; Stebila, Douglas. (2014) Formalising Human Recognition: a Fundamental Building Block for Security Proofs. Australasian Information Security Conference (ACSW-AISC) 2014 2014-01-20 - 2014-01-23
  • Academic lecture
    Hale, Britta J.; Boyd, Colin Alexander. (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. SSR'14 , Royal Holloway University of London, Egham, UK 2014-12-16 - 2014-12-17
  • Academic lecture
    Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. (2014) PassCue: the Shared Cues System in Practice. The 7 th International Conference on Passwords , Trondheim 2014-12-08 - 2014-12-10

2013

  • Academic lecture
    Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Buys, Laurie. (2013) "Who decides?" Security and Privacy in the Wild. Human Factors and Ergonomics Society of Australia Inc. OzCHI 2013 , Adelaide 2013-11-25 - 2013-11-29
  • Academic lecture
    Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh. (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes. ACM 6th International Conference on Security of Information and Networks , Aksaray University 2013-11-26 - 2013-11-28

NTNU – Norwegian University of Science and Technology

  • For employees
  • |
  • For students
  • |
  • Intranet
  • |
  • Blackboard

Studies

  • Master's programmes in English
  • For exchange students
  • PhD opportunities
  • Courses
  • Career development
  • Continuing education
  • Application process

News

  • NTNU News
  • Vacancies

About NTNU

  • About the university
  • Libraries
  • NTNU's strategy
  • Research excellence
  • Strategic research areas
  • Organizational chart

Contact

  • Contact NTNU
  • Employees
  • Find experts
  • Press contacts
  • Researcher support
  • Maps

NTNU in three cities

  • NTNU in Gjøvik
  • NTNU in Trondheim
  • NTNU in Ålesund

About this website

  • Use of cookies
  • Accessibility statement
  • Privacy policy
  • Editorial responsibility
Facebook Instagram Linkedin Snapchat Tiktok Youtube
Sign In
NTNU logo