Colin Alexander Boyd
Background and activities
I joined NTNU in 2013 as Professor in information security. I have previously been a faculty member at QUT, Australia and University of Manchester, UK.
For my publications please see my Google Scholar page.
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
Journal publications
- (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS). vol. 12170 LNCS.
- (2020) A Modern View on Forward Security. Computer journal.
- (2020) Vote Selling Resistant Voting. Lecture Notes in Computer Science (LNCS).
- (2020) Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Communications Magazine. vol. 58 (7).
- (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS). vol. 11898.
- (2019) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS). vol. 11368.
- (2018) Valuable Puzzles for Proofs-of-Work. Lecture Notes in Computer Science (LNCS). vol. 11025.
- (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS). vol. 11060 LNCS.
- (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS). vol. 11192 LNCS.
- (2017) Key recovery: Inert and public. Lecture Notes in Computer Science (LNCS). vol. 10311 LNCS.
- (2017) Bitcoin Unchained. ERCIM News. vol. 110.
- (2017) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS).
- (2016) Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science (LNCS). vol. 9722.
- (2016) ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security.
- (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. vol. 106.
- (2016) Security Proofs for Protocols Involving Humans. Computer journal.
- (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science (LNCS). vol. 9496.
- (2015) Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science (LNCS). vol. 8975.
- (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online. vol. 14 (1).
- (2015) Modelling attacks on self-authentication watermarking. Multimedia tools and applications.