Colin Alexander Boyd
+4773551758
+4798065197
Elektro B, 225, Gløshaugen
About
I joined NTNU in 2013 as Professor in information security. I have previously been a faculty member at QUT, Australia and University of Manchester, UK.
For my publications please see my Google Scholar page.
Publications
2023
-
Boyd, Colin Alexander;
Fondevik, Elsie Margrethe Staff Mestl;
Gjøsteen, Kristian;
Millerjord, Lise.
(2023)
Hybrid Group Key Exchange with Application to Constrained Networks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Millerjord, Lise;
de Kock, Bor.
(2023)
Modular Design of KEM-Based Authenticated Key Exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
2022
-
Boyd, Colin Alexander.
(2022)
Key Exchange (Chapter 9).
ISTE
Academic chapter/article/Conference paper
2021
-
Marku, Enio;
Biczok, Gergely;
Boyd, Colin Alexander.
(2021)
SafeLib: a practical library for outsourcing stateful network functions securely.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Boyd, Colin Alexander.
(2021)
Introduction to the Special Issue on TLS 1.3.
Journal of Cryptology
Editorial
-
Boyd, Colin Alexander;
Davies, Gareth T.;
de Kock, Bor;
Gellert, Kai;
Jager, Tibor;
Millerjord, Lise.
(2021)
Symmetric Key Exchange with Full Forward Security and Robust Synchronization.
Lecture Notes in Computer Science (LNCS)
Academic article
2020
-
Boyd, Colin Alexander;
Mathuria, Anish;
Stebila, Douglas.
(2020)
Protocols for Authentication and Key Establishment.
Springer
Springer
Academic monograph
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Jiang, Yao.
(2020)
Fast and Secure Updatable Encryption.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Marku, Enio;
Biczok, Gergely;
Boyd, Colin Alexander.
(2020)
Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions.
IEEE Communications Magazine
Academic article
-
Boyd, Colin Alexander;
Gellert, Kai.
(2020)
A Modern View on Forward Security.
Computer journal
Academic article
-
Boyd, Colin Alexander;
Haines, Thomas Edmund;
Rønne, Peter.
(2020)
Vote Selling Resistant Voting.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Mathuria, Anish;
Stebila, Douglas.
(2020)
Preface.
Information Security and Cryptography (IS&C)
Editorial
-
Au, Man Ho;
Han, Jinguang;
Wu, Qianhong;
Boyd, Colin Alexander.
(2020)
Special Issue on Cryptographic Currency and Blockchain Technology.
Future Generation Computer Systems
Editorial
2019
-
Boyd, Colin Alexander;
Gjøsteen, Kristian;
Gritti, Clementine Jeanne Pierrette;
Haines, Thomas Edmund.
(2019)
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Marku, Enio;
Biczok, Gergely;
Boyd, Colin Alexander.
(2019)
Towards protected VNFs for multi-operator service delivery.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Boyd, Colin Alexander;
Hale, Britta.
(2019)
Secure Channels and Termination: The Last Word on TLS.
Lecture Notes in Computer Science (LNCS)
Academic article
2018
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Jiang, Yao.
(2018)
Offline Assisted Group Key Exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2018)
Security notions for cloud storage and deduplication.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Søhoel, Halldis M;
Jaatun, Martin Gilje;
Boyd, Colin Alexander.
(2018)
OWASP Top 10 - Do Startups Care?.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2018)
Definitions for plaintext-existence hiding in cloud storage.
Association for Computing Machinery (ACM)
Academic chapter/article/Conference paper
-
Boyd, Colin Alexander;
Carr, Christopher.
(2018)
Valuable Puzzles for Proofs-of-Work.
Lecture Notes in Computer Science (LNCS)
Academic article
2017
-
Boyd, Colin Alexander;
Boyen, Xavier;
Carr, Christopher;
Haines, Thomas.
(2017)
Key recovery: Inert and public.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Carr, Christopher;
Boyen, Xavier;
Haines, Thomas.
(2017)
Bitcoin Unchained.
ERCIM News
Academic article
-
Armknecht, Frederik;
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Toorani, Mohsen.
(2017)
Side channels in deduplication: trade-offs between leakage and efficiency.
Association for Computing Machinery (ACM)
Academic chapter/article/Conference paper
-
Boyd, Colin Alexander;
Hale, Britta.
(2017)
Secure Channels and Termination: The Last Word on TLS.
Lecture Notes in Computer Science (LNCS)
Academic article
2016
-
Boyd, Colin Alexander;
Hale, Britta;
Mjølsnes, Stig Frode;
Stebila, Douglas.
(2016)
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
Springer
Academic chapter/article/Conference paper
-
Boyd, Colin Alexander;
Davies, Gareth T.;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2016)
Using Cryptography to Control Your Data at a Distance
.
ERCIM News
Academic article
-
Radke, Kenneth;
Boyd, Colin Alexander.
(2016)
Security Proofs for Protocols Involving Humans.
Computer journal
Academic article
-
Biczok, Gergely;
Sonkoly, Balázs;
Bereczky, Nikolett;
Boyd, Colin Alexander.
(2016)
Private VNFs for collaborative multi-operator service delivery: An architectural case.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Boyd, Colin Alexander;
Carr, Christopher.
(2016)
Fair client puzzles from the Bitcoin blockchain.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Cremers, Cas;
Feltz, Michele;
Paterson, K;
Poettering, Bertram;
Stebila, Douglas.
(2016)
ASICS: authenticated key exchange security incorporating certification systems.
International Journal of Information Security
Academic article
2015
-
Nyeem, Hussain;
Boles, Wageeh;
Boyd, Colin Alexander.
(2015)
Modelling attacks on self-authentication watermarking.
Multimedia Tools and Applications
Academic article
-
Sandvoll, Mats;
Boyd, Colin Alexander;
Larsen, Bjørn B..
(2015)
PassCue: The Shared Cues System in Practice.
Springer Publishing Company
Academic chapter/article/Conference paper
-
Alawatugoda, Janaka;
Stebila, Douglas;
Boyd, Colin Alexander.
(2015)
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange.
Springer
Academic chapter/article/Conference paper
-
Alawatugoda, Janaka;
Stebila, Douglas;
Boyd, Colin Alexander.
(2015)
Protecting encrypted cookies from compression Side-Channel attacks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Nyeem, Hussain;
Boles, Wageeh;
Boyd, Colin Alexander.
(2015)
Content-independent embedding scheme for multi-modal medical image watermarking.
Biomedical engineering online
Academic article
-
Nyeem, Hussain;
Boles, Wageeh;
Boyd, Colin Alexander.
(2015)
Watermarking capacity control for dynamic payload embedding.
Advances in Intelligent Systems and Computing
Academic article
-
Alawatugoda, Janaka;
Stebila, Douglas;
Boyd, Colin Alexander.
(2015)
Continuous after-the-fact leakage-resilient eCK-secure key exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
2014
-
Nyeem, Hussain;
Boles, Wageeh;
Boyd, Colin Alexander.
(2014)
Digital image watermarking: its formal model, fundamental properties and possible attacks.
EURASIP Journal on Advances in Signal Processing
Academic article
-
Radke, Kenneth;
Boyd, Colin Alexander;
Gonzalez Nieto, Juan;
Bartlett, Harry.
(2014)
CHURNs: Freshness Assurance for Humans.
Computer journal
Academic article
-
Albeshri, Aiiad;
Boyd, Colin Alexander;
Gonzalez Nieto, Juan.
(2014)
Enhanced GeoProof: improved geographic assurance for data in the cloud.
International Journal of Information Security
Academic article
-
Seifi, Y;
Suriadi, Suriadi;
Foo, Ernest;
Boyd, Colin Alexander.
(2014)
Security properties analysis in a TPM-based protocol.
International Journal of Security and Networks (IJSN)
Academic article
-
Hale, Britta J.;
Boyd, Colin Alexander.
(2014)
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.
Springer Publishing Company
Academic chapter/article/Conference paper
-
Alawatugoda, Janaka;
Boyd, Colin Alexander;
Stebila, Douglas.
(2014)
Continuous After-the-Fact Leakage-Resilient Key Exchange.
Springer
Academic chapter/article/Conference paper
2013
-
Radke, Kenneth;
Boyd, Colin Alexander;
Gonzalez Nieto, Juan;
Buys, Laurie.
(2013)
"Who decides?" Security and Privacy in the Wild.
ACM Publications
Academic chapter/article/Conference paper
-
Nyeem, Hussain;
Boyd, Colin Alexander;
Boles, Wageeh.
(2013)
Counterfeiting attacks on block-wise dependent fragile watermarking schemes.
Association for Computing Machinery (ACM)
Academic chapter/article/Conference paper
Journal publications
-
Boyd, Colin Alexander;
Fondevik, Elsie Margrethe Staff Mestl;
Gjøsteen, Kristian;
Millerjord, Lise.
(2023)
Hybrid Group Key Exchange with Application to Constrained Networks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Millerjord, Lise;
de Kock, Bor.
(2023)
Modular Design of KEM-Based Authenticated Key Exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander.
(2021)
Introduction to the Special Issue on TLS 1.3.
Journal of Cryptology
Editorial
-
Boyd, Colin Alexander;
Davies, Gareth T.;
de Kock, Bor;
Gellert, Kai;
Jager, Tibor;
Millerjord, Lise.
(2021)
Symmetric Key Exchange with Full Forward Security and Robust Synchronization.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Jiang, Yao.
(2020)
Fast and Secure Updatable Encryption.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Marku, Enio;
Biczok, Gergely;
Boyd, Colin Alexander.
(2020)
Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions.
IEEE Communications Magazine
Academic article
-
Boyd, Colin Alexander;
Gellert, Kai.
(2020)
A Modern View on Forward Security.
Computer journal
Academic article
-
Boyd, Colin Alexander;
Haines, Thomas Edmund;
Rønne, Peter.
(2020)
Vote Selling Resistant Voting.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Mathuria, Anish;
Stebila, Douglas.
(2020)
Preface.
Information Security and Cryptography (IS&C)
Editorial
-
Au, Man Ho;
Han, Jinguang;
Wu, Qianhong;
Boyd, Colin Alexander.
(2020)
Special Issue on Cryptographic Currency and Blockchain Technology.
Future Generation Computer Systems
Editorial
-
Boyd, Colin Alexander;
Gjøsteen, Kristian;
Gritti, Clementine Jeanne Pierrette;
Haines, Thomas Edmund.
(2019)
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Hale, Britta.
(2019)
Secure Channels and Termination: The Last Word on TLS.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Jiang, Yao.
(2018)
Offline Assisted Group Key Exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2018)
Security notions for cloud storage and deduplication.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Carr, Christopher.
(2018)
Valuable Puzzles for Proofs-of-Work.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Boyen, Xavier;
Carr, Christopher;
Haines, Thomas.
(2017)
Key recovery: Inert and public.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Carr, Christopher;
Boyen, Xavier;
Haines, Thomas.
(2017)
Bitcoin Unchained.
ERCIM News
Academic article
-
Boyd, Colin Alexander;
Hale, Britta.
(2017)
Secure Channels and Termination: The Last Word on TLS.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth T.;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2016)
Using Cryptography to Control Your Data at a Distance
.
ERCIM News
Academic article
-
Radke, Kenneth;
Boyd, Colin Alexander.
(2016)
Security Proofs for Protocols Involving Humans.
Computer journal
Academic article
-
Boyd, Colin Alexander;
Carr, Christopher.
(2016)
Fair client puzzles from the Bitcoin blockchain.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Cremers, Cas;
Feltz, Michele;
Paterson, K;
Poettering, Bertram;
Stebila, Douglas.
(2016)
ASICS: authenticated key exchange security incorporating certification systems.
International Journal of Information Security
Academic article
-
Nyeem, Hussain;
Boles, Wageeh;
Boyd, Colin Alexander.
(2015)
Modelling attacks on self-authentication watermarking.
Multimedia Tools and Applications
Academic article
-
Alawatugoda, Janaka;
Stebila, Douglas;
Boyd, Colin Alexander.
(2015)
Protecting encrypted cookies from compression Side-Channel attacks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Nyeem, Hussain;
Boles, Wageeh;
Boyd, Colin Alexander.
(2015)
Content-independent embedding scheme for multi-modal medical image watermarking.
Biomedical engineering online
Academic article
-
Nyeem, Hussain;
Boles, Wageeh;
Boyd, Colin Alexander.
(2015)
Watermarking capacity control for dynamic payload embedding.
Advances in Intelligent Systems and Computing
Academic article
-
Alawatugoda, Janaka;
Stebila, Douglas;
Boyd, Colin Alexander.
(2015)
Continuous after-the-fact leakage-resilient eCK-secure key exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Nyeem, Hussain;
Boles, Wageeh;
Boyd, Colin Alexander.
(2014)
Digital image watermarking: its formal model, fundamental properties and possible attacks.
EURASIP Journal on Advances in Signal Processing
Academic article
-
Radke, Kenneth;
Boyd, Colin Alexander;
Gonzalez Nieto, Juan;
Bartlett, Harry.
(2014)
CHURNs: Freshness Assurance for Humans.
Computer journal
Academic article
-
Albeshri, Aiiad;
Boyd, Colin Alexander;
Gonzalez Nieto, Juan.
(2014)
Enhanced GeoProof: improved geographic assurance for data in the cloud.
International Journal of Information Security
Academic article
-
Seifi, Y;
Suriadi, Suriadi;
Foo, Ernest;
Boyd, Colin Alexander.
(2014)
Security properties analysis in a TPM-based protocol.
International Journal of Security and Networks (IJSN)
Academic article
Books
-
Boyd, Colin Alexander;
Mathuria, Anish;
Stebila, Douglas.
(2020)
Protocols for Authentication and Key Establishment.
Springer
Springer
Academic monograph
Part of book/report
-
Boyd, Colin Alexander.
(2022)
Key Exchange (Chapter 9).
ISTE
Academic chapter/article/Conference paper
-
Marku, Enio;
Biczok, Gergely;
Boyd, Colin Alexander.
(2021)
SafeLib: a practical library for outsourcing stateful network functions securely.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Marku, Enio;
Biczok, Gergely;
Boyd, Colin Alexander.
(2019)
Towards protected VNFs for multi-operator service delivery.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Søhoel, Halldis M;
Jaatun, Martin Gilje;
Boyd, Colin Alexander.
(2018)
OWASP Top 10 - Do Startups Care?.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2018)
Definitions for plaintext-existence hiding in cloud storage.
Association for Computing Machinery (ACM)
Academic chapter/article/Conference paper
-
Armknecht, Frederik;
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Toorani, Mohsen.
(2017)
Side channels in deduplication: trade-offs between leakage and efficiency.
Association for Computing Machinery (ACM)
Academic chapter/article/Conference paper
-
Boyd, Colin Alexander;
Hale, Britta;
Mjølsnes, Stig Frode;
Stebila, Douglas.
(2016)
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
Springer
Academic chapter/article/Conference paper
-
Biczok, Gergely;
Sonkoly, Balázs;
Bereczky, Nikolett;
Boyd, Colin Alexander.
(2016)
Private VNFs for collaborative multi-operator service delivery: An architectural case.
IEEE conference proceedings
Academic chapter/article/Conference paper
-
Sandvoll, Mats;
Boyd, Colin Alexander;
Larsen, Bjørn B..
(2015)
PassCue: The Shared Cues System in Practice.
Springer Publishing Company
Academic chapter/article/Conference paper
-
Alawatugoda, Janaka;
Stebila, Douglas;
Boyd, Colin Alexander.
(2015)
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange.
Springer
Academic chapter/article/Conference paper
-
Hale, Britta J.;
Boyd, Colin Alexander.
(2014)
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.
Springer Publishing Company
Academic chapter/article/Conference paper
-
Alawatugoda, Janaka;
Boyd, Colin Alexander;
Stebila, Douglas.
(2014)
Continuous After-the-Fact Leakage-Resilient Key Exchange.
Springer
Academic chapter/article/Conference paper
-
Radke, Kenneth;
Boyd, Colin Alexander;
Gonzalez Nieto, Juan;
Buys, Laurie.
(2013)
"Who decides?" Security and Privacy in the Wild.
ACM Publications
Academic chapter/article/Conference paper
-
Nyeem, Hussain;
Boyd, Colin Alexander;
Boles, Wageeh.
(2013)
Counterfeiting attacks on block-wise dependent fragile watermarking schemes.
Association for Computing Machinery (ACM)
Academic chapter/article/Conference paper
Teaching
Courses
Knowledge Transfer
2020
-
Academic lecturewu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. (2020) A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains 2020-07-20 - 2020-07-21
2017
-
LectureArmknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. ACM ACM Asia Conference on Computer and Communications Security (ASIACCS'17) 2017-04-02 - 2017-04-06
-
Academic lectureBoyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2017) Secure Deduplication - Models and Optimization. CRISP – Center for Research in Security and Privacy Distinguished Lectures Series in Cybersecurity , Darmstadt 2017-11-16 -
2016
-
Academic lectureBoyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS. Marc Fischlin TU-Darmstadt Invited Talk , Darmstadt, Germany 2016-04-21 - 2016-04-21
-
Academic lectureBoyd, Colin Alexander; Hale, Britta. (2016) Secure Channels and Termination: The Last Word on TLS. Marc Fischlin, Bogdan Warinschi Secure Key Exchange and Channel Protocols (SKECH) Workshop 2016 , Bertinoro, Italy 2016-07-01 - 2016-07-04
-
Academic lectureBoyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS. Tor Helleseth, Britta Hale, Hanno Langweg COINS Finse Winter School 2016 , Finse, Norway 2016-04-24 - 2016-04-29
-
Academic lectureBoyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016 , San Francisco, USA 2016-02-29 - 2016-03-04
-
Academic lectureBoyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. (2016) Key Recovery: Inert, Public, Transparent (KRIPT) . MMU Mycrypt 2016: Paradigm-shifting Crypto , Pullman Kuala Lumpur City Centre 2016-12-01 - 2016-12-02
-
Academic lectureBiczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case. IEEE NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium 2016-04-25 - 2016-04-29
-
Academic lectureBoyd, Colin Alexander. (2016) Modelling the Security of Key Exchange. Nanjing University of Finance and Economics Tenth International Conference on Provable Security (ProvSec 2016) , Nanjing 2016-11-10 - 2016-11-12
2015
-
Academic lectureAlawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography and Data Security 2015-01-26 - 2015-01-30
-
Academic lectureBoyd, Colin Alexander; Stebila, Douglas; Alawatugoda, Janaka. (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. The Institute of Mathematics and its Applications (IMA) Fifteenth IMA International Conference on Cryptography and Coding , Oxford 2015-12-15 - 2015-12-17
2014
-
Academic lectureAlawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. (2014) Continuous after-the-fact leakage-resilient key exchange. Information Security and Privacy 19th Australasian Conference, ACISP 2014 2014-07-07 - 2014-07-09
-
Academic lectureRadke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Manulis, Mark; Stebila, Douglas. (2014) Formalising Human Recognition: a Fundamental Building Block for Security Proofs. Australasian Information Security Conference (ACSW-AISC) 2014 2014-01-20 - 2014-01-23
-
Academic lectureHale, Britta J.; Boyd, Colin Alexander. (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. SSR'14 , Royal Holloway University of London, Egham, UK 2014-12-16 - 2014-12-17
-
Academic lectureSandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. (2014) PassCue: the Shared Cues System in Practice. The 7 th International Conference on Passwords , Trondheim 2014-12-08 - 2014-12-10
2013
-
Academic lectureRadke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Buys, Laurie. (2013) "Who decides?" Security and Privacy in the Wild. Human Factors and Ergonomics Society of Australia Inc. OzCHI 2013 , Adelaide 2013-11-25 - 2013-11-29
-
Academic lectureNyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh. (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes. ACM 6th International Conference on Security of Information and Networks , Aksaray University 2013-11-26 - 2013-11-28