Navigation

  • Skip to Content
NTNU Home

ntnu.edu

  • Studies
    • Master's programmes in English
    • For exchange students
    • PhD opportunities
    • All programmes of study
    • Courses
    • Financing
    • Language requirements
    • Application process
    • Academic calendar
    • FAQ
  • Research and innovation
    • NTNU research
    • Research excellence
    • Strategic research areas
    • Innovation resources
    • PhD opportunities
  • Life and housing
    • Student in Trondheim
    • Student in Gjøvik
    • Student in Ålesund
    • For researchers
    • Life and housing
  • About NTNU
    • Contact us
    • Faculties and departments
    • Libraries
    • International researcher support
    • Vacancies
    • About NTNU
    • Maps
  1. Employees

Språkvelger

Norsk

Colin Alexander Boyd

Colin Alexander Boyd

Professor
Department of Information Security and Communication Technology

colin.boyd@ntnu.no
+4773551758 +4798065197 Elektro B, 225, Gløshaugen
About Publications Teaching Media

About

I joined NTNU in 2013 as Professor in information security. I have previously been a faculty member at QUT, Australia and University of Manchester, UK.

For my publications please see my Google Scholar page.

Publications

  • Chronological
  • By category
  • See all publications in Cristin

2022

  • Boyd, Colin Alexander. (2022) Key Exchange (Chapter 9). Asymmetric Cryptography: Primitives and Protocols.
    Academic chapter/article/Conference paper

2021

  • Boyd, Colin Alexander. (2021) Introduction to the Special Issue on TLS 1.3. Journal of Cryptology. volum 34 (3).
    Editorial
  • Boyd, Colin Alexander; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise. (2021) Symmetric Key Exchange with Full Forward Security and Robust Synchronization. Lecture Notes in Computer Science (LNCS). volum 13093.
    Academic article
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2021) SafeLib: a practical library for outsourcing stateful network functions securely. 7th IEEE International Conference on Network Softwarization, NetSoft 2021.
    Academic chapter/article/Conference paper

2020

  • Au, Man Ho; Han, Jinguang; Wu, Qianhong; Boyd, Colin Alexander. (2020) Special Issue on Cryptographic Currency and Blockchain Technology. Future generations computer systems. volum 107.
    Editorial
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS). volum 12170 LNCS.
    Academic article
  • Boyd, Colin Alexander; Gellert, Kai. (2020) A Modern View on Forward Security. Computer journal.
    Academic article
  • Boyd, Colin Alexander; Haines, Thomas Edmund; Rønne, Peter. (2020) Vote Selling Resistant Voting. Lecture Notes in Computer Science (LNCS).
    Academic article
  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Preface. Information Security and Cryptography (IS&C).
    Editorial
  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Protocols for Authentication and Key Establishment. Springer. 2020. ISBN 978-3-662-58145-2.
    Academic monograph
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2020) Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Communications Magazine. volum 58 (7).
    Academic article

2019

  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS). volum 11898.
    Academic article
  • Boyd, Colin Alexander; Hale, Britta. (2019) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS). volum 11368.
    Academic article
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2019) Towards protected VNFs for multi-operator service delivery. Network Softwarization (NetSoft), IEEE Conference on.
    Academic chapter/article/Conference paper

2018

  • Boyd, Colin Alexander; Carr, Christopher. (2018) Valuable Puzzles for Proofs-of-Work. Lecture Notes in Computer Science (LNCS). volum 11025.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS). volum 11060 LNCS.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage. ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018.
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS). volum 11192 LNCS.
    Academic article
  • Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander. (2018) OWASP Top 10 - Do Startups Care?. 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Glasgow, Scotland, United Kingdom, 11-12 June 2018.
    Academic chapter/article/Conference paper

2017

  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security.
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. (2017) Key recovery: Inert and public. Lecture Notes in Computer Science (LNCS). volum 10311 LNCS.
    Academic article
  • Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas. (2017) Bitcoin Unchained. ERCIM News. volum 110.
    Academic article
  • Boyd, Colin Alexander; Hale, Britta. (2017) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS).
    Academic article

2016

  • Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case. Proceedings of NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Carr, Christopher. (2016) Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science (LNCS). volum 9722.
    Academic article
  • Boyd, Colin Alexander; Cremers, Cas; Feltz, Michele; Paterson, K; Poettering, Bertram; Stebila, Douglas. (2016) ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. volum 106.
    Academic article
  • Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings.
    Academic chapter/article/Conference paper
  • Radke, Kenneth; Boyd, Colin Alexander. (2016) Security Proofs for Protocols Involving Humans. Computer journal.
    Academic article

2015

  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings.
    Academic chapter/article/Conference paper
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science (LNCS). volum 9496.
    Academic article
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science (LNCS). volum 8975.
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online. volum 14 (1).
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Modelling attacks on self-authentication watermarking. Multimedia Tools and Applications.
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing. volum 361.
    Academic article
  • Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. (2015) PassCue: The Shared Cues System in Practice. Technology and Practice of Passwords.
    Academic chapter/article/Conference paper

2014

  • Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. (2014) Continuous After-the-Fact Leakage-Resilient Key Exchange. Information Security and Privacy, 19th Australasian Conference, ACISP 2014.
    Academic chapter/article/Conference paper
  • Albeshri, Aiiad; Boyd, Colin Alexander; Gonzalez Nieto, Juan. (2014) Enhanced GeoProof: improved geographic assurance for data in the cloud. International Journal of Information Security. volum 13 (2).
    Academic article
  • Hale, Britta J.; Boyd, Colin Alexander. (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings.
    Academic chapter/article/Conference paper
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing. volum 2014:135.
    Academic article
  • Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Bartlett, Harry. (2014) CHURNs: Freshness Assurance for Humans. Computer journal. volum 58 (10).
    Academic article
  • Seifi, Y; Suriadi, Suriadi; Foo, Ernest; Boyd, Colin Alexander. (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks (IJSN). volum 9 (2).
    Academic article

2013

  • Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh. (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes. Proceedings of the 6th International Conference on Security of Information and Networks.
    Academic chapter/article/Conference paper
  • Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Buys, Laurie. (2013) "Who decides?" Security and Privacy in the Wild. Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration.
    Academic chapter/article/Conference paper

Journal publications

  • Boyd, Colin Alexander. (2021) Introduction to the Special Issue on TLS 1.3. Journal of Cryptology. volum 34 (3).
    Editorial
  • Boyd, Colin Alexander; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise. (2021) Symmetric Key Exchange with Full Forward Security and Robust Synchronization. Lecture Notes in Computer Science (LNCS). volum 13093.
    Academic article
  • Au, Man Ho; Han, Jinguang; Wu, Qianhong; Boyd, Colin Alexander. (2020) Special Issue on Cryptographic Currency and Blockchain Technology. Future generations computer systems. volum 107.
    Editorial
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS). volum 12170 LNCS.
    Academic article
  • Boyd, Colin Alexander; Gellert, Kai. (2020) A Modern View on Forward Security. Computer journal.
    Academic article
  • Boyd, Colin Alexander; Haines, Thomas Edmund; Rønne, Peter. (2020) Vote Selling Resistant Voting. Lecture Notes in Computer Science (LNCS).
    Academic article
  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Preface. Information Security and Cryptography (IS&C).
    Editorial
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2020) Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Communications Magazine. volum 58 (7).
    Academic article
  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS). volum 11898.
    Academic article
  • Boyd, Colin Alexander; Hale, Britta. (2019) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS). volum 11368.
    Academic article
  • Boyd, Colin Alexander; Carr, Christopher. (2018) Valuable Puzzles for Proofs-of-Work. Lecture Notes in Computer Science (LNCS). volum 11025.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS). volum 11060 LNCS.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS). volum 11192 LNCS.
    Academic article
  • Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. (2017) Key recovery: Inert and public. Lecture Notes in Computer Science (LNCS). volum 10311 LNCS.
    Academic article
  • Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas. (2017) Bitcoin Unchained. ERCIM News. volum 110.
    Academic article
  • Boyd, Colin Alexander; Hale, Britta. (2017) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS).
    Academic article
  • Boyd, Colin Alexander; Carr, Christopher. (2016) Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science (LNCS). volum 9722.
    Academic article
  • Boyd, Colin Alexander; Cremers, Cas; Feltz, Michele; Paterson, K; Poettering, Bertram; Stebila, Douglas. (2016) ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. volum 106.
    Academic article
  • Radke, Kenneth; Boyd, Colin Alexander. (2016) Security Proofs for Protocols Involving Humans. Computer journal.
    Academic article
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science (LNCS). volum 9496.
    Academic article
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science (LNCS). volum 8975.
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online. volum 14 (1).
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Modelling attacks on self-authentication watermarking. Multimedia Tools and Applications.
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing. volum 361.
    Academic article
  • Albeshri, Aiiad; Boyd, Colin Alexander; Gonzalez Nieto, Juan. (2014) Enhanced GeoProof: improved geographic assurance for data in the cloud. International Journal of Information Security. volum 13 (2).
    Academic article
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing. volum 2014:135.
    Academic article
  • Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Bartlett, Harry. (2014) CHURNs: Freshness Assurance for Humans. Computer journal. volum 58 (10).
    Academic article
  • Seifi, Y; Suriadi, Suriadi; Foo, Ernest; Boyd, Colin Alexander. (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks (IJSN). volum 9 (2).
    Academic article

Books

  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Protocols for Authentication and Key Establishment. Springer. 2020. ISBN 978-3-662-58145-2.
    Academic monograph

Part of book/report

  • Boyd, Colin Alexander. (2022) Key Exchange (Chapter 9). Asymmetric Cryptography: Primitives and Protocols.
    Academic chapter/article/Conference paper
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2021) SafeLib: a practical library for outsourcing stateful network functions securely. 7th IEEE International Conference on Network Softwarization, NetSoft 2021.
    Academic chapter/article/Conference paper
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2019) Towards protected VNFs for multi-operator service delivery. Network Softwarization (NetSoft), IEEE Conference on.
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage. ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018.
    Academic chapter/article/Conference paper
  • Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander. (2018) OWASP Top 10 - Do Startups Care?. 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Glasgow, Scotland, United Kingdom, 11-12 June 2018.
    Academic chapter/article/Conference paper
  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security.
    Academic chapter/article/Conference paper
  • Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case. Proceedings of NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings.
    Academic chapter/article/Conference paper
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings.
    Academic chapter/article/Conference paper
  • Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. (2015) PassCue: The Shared Cues System in Practice. Technology and Practice of Passwords.
    Academic chapter/article/Conference paper
  • Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. (2014) Continuous After-the-Fact Leakage-Resilient Key Exchange. Information Security and Privacy, 19th Australasian Conference, ACISP 2014.
    Academic chapter/article/Conference paper
  • Hale, Britta J.; Boyd, Colin Alexander. (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings.
    Academic chapter/article/Conference paper
  • Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh. (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes. Proceedings of the 6th International Conference on Security of Information and Networks.
    Academic chapter/article/Conference paper
  • Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Buys, Laurie. (2013) "Who decides?" Security and Privacy in the Wild. Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration.
    Academic chapter/article/Conference paper

Teaching

Courses

  • TTM4195 - Blockchain Technologies and Cryptocurrencies
  • TTM4502 - Communication Technology, Specialization Project
  • TTM4135 - Applied Cryptography and Network Security
  • TM8110 - PhD Topics in Information Security and Communication Technology
  • TTM4905 - Communication Technology, Master's Thesis

Media

2020

  • Academic lecture
    wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. (2020) A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains ; 2020-07-20 - 2020-07-21.

2017

  • Lecture
    Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17) . ACM; 2017-04-02 - 2017-04-06.
  • Academic lecture
    Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2017) Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity . CRISP – Center for Research in Security and Privacy; Darmstadt. 2017-11-16.

2016

  • Academic lecture
    Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium . IEEE; 2016-04-25 - 2016-04-29.
  • Academic lecture
    Boyd, Colin Alexander. (2016) Modelling the Security of Key Exchange. Tenth International Conference on Provable Security (ProvSec 2016) . Nanjing University of Finance and Economics; Nanjing. 2016-11-10 - 2016-11-12.
  • Academic lecture
    Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. (2016) Key Recovery: Inert, Public, Transparent (KRIPT). Mycrypt 2016: Paradigm-shifting Crypto . MMU; Pullman Kuala Lumpur City Centre. 2016-12-01 - 2016-12-02.
  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta. (2016) Secure Channels and Termination: The Last Word on TLS. Secure Key Exchange and Channel Protocols (SKECH) Workshop 2016 . Marc Fischlin, Bogdan Warinschi; Bertinoro, Italy. 2016-07-01 - 2016-07-04.
  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS. TU-Darmstadt Invited Talk . Marc Fischlin; Darmstadt, Germany. 2016-04-21 - 2016-04-21.
  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016 ; San Francisco, USA. 2016-02-29 - 2016-03-04.
  • Academic lecture
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS. COINS Finse Winter School 2016 . Tor Helleseth, Britta Hale, Hanno Langweg; Finse, Norway. 2016-04-24 - 2016-04-29.

2015

  • Academic lecture
    Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography and Data Security ; 2015-01-26 - 2015-01-30.
  • Academic lecture
    Boyd, Colin Alexander; Stebila, Douglas; Alawatugoda, Janaka. (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Fifteenth IMA International Conference on Cryptography and Coding . The Institute of Mathematics and its Applications (IMA); Oxford. 2015-12-15 - 2015-12-17.

2014

  • Academic lecture
    Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. (2014) Continuous after-the-fact leakage-resilient key exchange. Information Security and Privacy 19th Australasian Conference, ACISP 2014 ; 2014-07-07 - 2014-07-09.
  • Academic lecture
    Hale, Britta J.; Boyd, Colin Alexander. (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. SSR'14 ; Royal Holloway University of London, Egham, UK. 2014-12-16 - 2014-12-17.
  • Academic lecture
    Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Manulis, Mark; Stebila, Douglas. (2014) Formalising Human Recognition: a Fundamental Building Block for Security Proofs. Australasian Information Security Conference (ACSW-AISC) 2014 ; 2014-01-20 - 2014-01-23.
  • Academic lecture
    Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. (2014) PassCue: the Shared Cues System in Practice. The 7 th International Conference on Passwords ; Trondheim. 2014-12-08 - 2014-12-10.

2013

  • Academic lecture
    Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh. (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes. 6th International Conference on Security of Information and Networks . ACM; Aksaray University. 2013-11-26 - 2013-11-28.
  • Academic lecture
    Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Buys, Laurie. (2013) "Who decides?" Security and Privacy in the Wild. OzCHI 2013 . Human Factors and Ergonomics Society of Australia Inc.; Adelaide. 2013-11-25 - 2013-11-29.
NTNU
Studies
  • Master's programmes in English
  • For exchange students
  • PhD opportunities
  • Courses
  • Career development
  • Continuing education
  • Application process
Contact
  • Contact NTNU
  • Employees
  • For alumni
  • Press contacts
  • Researcher support
Discover NTNU
  • Experts
  • Vacancies
  • Pictures from NTNU
  • Innovation resources
  • NTNU in Gjøvik
  • NTNU in Trondheim
  • NTNU in Ålesund
  • Maps
About NTNU
  • NTNU's strategy
  • Research excellence
  • Strategic research areas
  • Organizational chart
  • Libraries
  • About the university
Services
  • For employees
  • For students
  • Blackboard
  • Intranet

Norwegian University of Science and Technology

Use of cookies
Accessibility statement (in Norwegian)
Privacy policy
Editoral responsibility
Sign In