Colin Alexander Boyd
Background and activities
I joined NTNU in 2013 as Professor in information security. I have previously been a faculty member at QUT, Australia and University of Manchester, UK.
For my publications please see my Google Scholar page.
Courses
- TTM4135 - Applied Cryptography and Network Security
- TTM4502 - Communication Technology, Specialization Project
- TTM4905 - Communication Technology, Master's Thesis
- TM8110 - PhD Topics in Information Security and Communication Technology
- TTM4195 - Blockchain Technologies and Cryptocurrencies
Scientific, academic and artistic work
A selection of recent journal publications, artistic productions, books, including book and report excerpts. See all publications in the database
Journal publications
- (2021) Symmetric Key Exchange with Full Forward Security and Robust Synchronization. Lecture Notes in Computer Science (LNCS). vol. 13093.
- (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS). vol. 12170 LNCS.
- (2020) A Modern View on Forward Security. Computer journal.
- (2020) Vote Selling Resistant Voting. Lecture Notes in Computer Science (LNCS).
- (2020) Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Communications Magazine. vol. 58 (7).
- (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS). vol. 11898.
- (2019) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS). vol. 11368.
- (2018) Valuable Puzzles for Proofs-of-Work. Lecture Notes in Computer Science (LNCS). vol. 11025.
- (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS). vol. 11060 LNCS.
- (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS). vol. 11192 LNCS.
- (2017) Key recovery: Inert and public. Lecture Notes in Computer Science (LNCS). vol. 10311 LNCS.
- (2017) Bitcoin Unchained. ERCIM News. vol. 110.
- (2017) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS).
- (2016) Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science (LNCS). vol. 9722.
- (2016) ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security.
- (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. vol. 106.
- (2016) Security Proofs for Protocols Involving Humans. Computer journal.
- (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science (LNCS). vol. 9496.
- (2015) Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science (LNCS). vol. 8975.
- (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online. vol. 14 (1).