dblp.uni-trier.dewww.uni-trier.de

Colin Boyd

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
137EEM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: Universally composable contributory group key exchange. ASIACCS 2009: 146-156
136EEM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Public Key Cryptography 2009: 105-123
135EEBaoyuan Kang, Colin Boyd, Ed Dawson: A novel identity-based strong designated verifier signature scheme. Journal of Systems and Software 82(2): 270-273 (2009)
2008
134EEColin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson: Efficient One-Round Key Exchange in the Standard Model. ACISP 2008: 69-83
133EEMarianne Hirschbichler, Colin Boyd, Wageeh Boles: A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault. DICTA 2008: 540-547
132EEMarianne Hirschbichler, Colin Boyd, Wageeh Boles: A Multiple-Control Fuzzy Vault. PST 2008: 36-47
131EERong Du, Ernest Foo, Colin Boyd: Designing a secure e-tender submission protocol. Electronic Commerce Research 8(3): 115-142 (2008)
2007
130EESuratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. ACSC 2007: 191-200
129EESuratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Toward Non-parallelizable Client Puzzles. CANS 2007: 247-264
128EEJaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. EUC Workshops 2007: 557-567
127EEJaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: Low-Cost and Strong-Security RFID Authentication Protocol. EUC Workshops 2007: 795-807
126EEM. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: On the Connection Between Signcryption and One-Pass Key Establishment. IMA Int. Conf. 2007: 277-301
125EERaylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto: Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMA Int. Conf. 2007: 403-421
124EEJason Dowling, Birgit M. Planitz, Anthony J. Maeder, Jiang Du, Binh Pham, Colin Boyd, Shaokang Chen, Andrew P. Bradley, Stuart Crozier: A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality. IWDW 2007: 454-466
123EEJaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). PAKDD Workshops 2007: 574-583
122EEKun Peng, Colin Boyd, Ed Dawson: Batch zero-knowledge proof and verification and its applications. ACM Trans. Inf. Syst. Secur. 10(2): (2007)
121EEAudun Jøsang, Roslan Ismail, Colin Boyd: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2): 618-644 (2007)
120EEJason Smith, Suratose Tritilanunt, Colin Boyd, Juan Manuel González Nieto, Ernest Foo: Denial-of-service resistance in key establishment. IJWMC 2(1): 59-71 (2007)
2006
119EEKun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto: A Novel Range Test. ACISP 2006: 247-258
118EEColin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria: An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. ACISP 2006: 371-382
117EEYvonne Cliff, Yiu Shing Terry Tin, Colin Boyd: Password Based Server Aided Key Exchange . ACNS 2006: 146-161
116EEJason Smith, Juan Manuel González Nieto, Colin Boyd: Modelling denial of service attacks on JFK with Meadows's cost-based framework. ACSW Frontiers 2006: 125-134
115EERong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo: Formal analysis of secure contracting protocol for e-tendering. ACSW Frontiers 2006: 155-164
114EERobert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto: SKMA: a key management architecture for SCADA systems. ACSW Frontiers 2006: 183-192
113EEJaimee Brown, Juan Manuel González Nieto, Colin Boyd: Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. CANS 2006: 1-18
112EEJaeCheol Ha, JungHoon Ha, Sang-Jae Moon, Colin Boyd: LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. ICUCT 2006: 80-89
111EEJaimee Brown, Juan Manuel González Nieto, Colin Boyd: Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. INDOCRYPT 2006: 176-190
110EESuratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Examining the DoS Resistance of HIP. OTM Workshops (1) 2006: 616-625
109EESherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto: Security-Mediated Certificateless Cryptography. Public Key Cryptography 2006: 508-524
108EEKun Peng, Colin Boyd, Ed Dawson: Sealed-Bid Micro Auctions. SEC 2006: 246-257
107EERong Du, Colin Boyd, Ernest Foo: A Secure E-Tender Submission Protocol. TrustBus 2006: 213-222
106EEYvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Appl. Algebra Eng. Commun. Comput. 16(6): 405-438 (2006)
105EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Computer Communications 29(15): 2788-2797 (2006)
104EEKun Peng, Colin Boyd, Ed Dawson: Batch verification of validity of bids in homomorphic e-auction. Computer Communications 29(15): 2798-2805 (2006)
2005
103 Colin Boyd, Juan Manuel González Nieto: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings Springer 2005
102EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. ASIACRYPT 2005: 585-604
101EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: Errors in Computational Complexity Proofs for Protocols. ASIACRYPT 2005: 624-643
100EEKun Peng, Colin Boyd, Ed Dawson: Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. CRYPTO 2005: 188-204
99EEKun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: Ciphertext Comparison, a New Solution to the Millionaire Problem. ICICS 2005: 84-96
98EEKun Peng, Colin Boyd, Ed Dawson: A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. ISC 2005: 374-388
97EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: On Session Key Construction in Provably-Secure Key Establishment Protocols. Mycrypt 2005: 116-131
96EEColin Boyd, Kim-Kwang Raymond Choo: Security of Two-Party Identity-Based Key Agreement. Mycrypt 2005: 229-243
95EEKun Peng, Colin Boyd, Ed Dawson: Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. Mycrypt 2005: 84-98
94EERong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd: Designing Secure E-Tendering Systems. TrustBus 2005: 70-79
93 Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson: Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. Comput. Syst. Sci. Eng. 20(6): (2005)
92EEJuan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptography 36(3): 301-316 (2005)
91EEColin Boyd, Wenbo Mao: Preface to the special issue on ISC 2003. Int. J. Inf. Sec. 4(4): 227-227 (2005)
2004
90EEYiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto: Protocols with Security Proofs for Mobile Applications. ACISP 2004: 358-369
89EEColin Boyd, Wenbo Mao, Kenneth G. Paterson: Key Agreement Using Statically Keyed Authenticators. ACNS 2004: 248-262
88EERiza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ACNS 2004: 494-508
87EERong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald: Defining Security Services for Electronic Tendering. ACSW Frontiers 2004: 43-52
86EEByoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo: Secure Key Issuing in ID-based Cryptography. ACSW Frontiers 2004: 69-74
85 Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee: A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71
84EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland: Complementing Computational Protocol Analysis with Formal Specifications. Formal Aspects in Security and Trust 2004: 129-144
83EEKun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: An Efficient and Verifiable Solution to the Millionaire Problem. ICISC 2004: 51-66
82EEColin Boyd: Design of Secure Key Establishment Protocols: Successes, Failures and Prospects. INDOCRYPT 2004: 1-13
81EEYvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. INDOCRYPT 2004: 17-32
80EEKun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee: Multiplicative Homomorphic E-Voting. INDOCRYPT 2004: 61-72
79EEHarikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto: A Secure Framework for User Privacy in Heterogeneous Location Networks. MATA 2004: 264-274
78EEKun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan: A Correct, Private, and Efficient Mix Network. Public Key Cryptography 2004: 439-454
77EEKim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland: On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. SCN 2004: 351-366
76EERiza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson: An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. TrustBus 2004: 152-161
75 Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: Private Reputation Schemes for P2P systems. WOSIS 2004: 196-206
74 Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: An Efficient Off-Line Reputation Scheme Using Articulated Certificates. WOSIS 2004: 53-62
2003
73 Colin Boyd, Wenbo Mao: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings Springer 2003
72EEYiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto: Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. ACISP 2003: 166-179
71EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Five Sealed-bid Auction Models. ACSW Frontiers 2003: 77-86
70EEYiu Shing Terry Tin, Colin Boyd, Juanma González Nieto: Provably Secure Key Exchange: An Engineering Approach. ACSW Frontiers 2003: 97-104
69EERoslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: A Security Architecture for Reputation Systems. EC-Web 2003: 176-185
68EERiza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan: Secure e-Voting for Preferential Elections. EGOV 2003: 246-249
67EEByoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo: Providing Receipt-Freeness in Mixnet-Based Voting Protocols. ICISC 2003: 245-258
66EEYvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague: A Password-Based Authenticator: Security Proof and Applications. INDOCRYPT 2003: 388-401
65EEColin Boyd, Juan Manuel González Nieto: Round-Optimal Contributory Conference Key Agreement. Public Key Cryptography 2003: 161-174
64EEColin Boyd, Wenbo Mao, Kenneth G. Paterson: Deniable Authenticated Key Establishment for Internet Protocols. Security Protocols Workshop 2003: 255-271
63EEKun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan: Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. WISA 2003: 244-256
2002
62EEGreg Maitland, Colin Boyd: Co-operatively Formed Group Signatures. CT-RSA 2002: 218-235
61EEColin Boyd, Kapali Viswanathan: Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. FASec 2002: 49-61
60EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. ICICS 2002: 147-159
59EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Non-interactive Auction Schemewith Strong Privacy. ICISC 2002: 407-420
58EEGreg Maitland, Colin Boyd: A Provably Secure Restrictive Partially Blind Signature Scheme. Public Key Cryptography 2002: 99-114
57 Kapali Viswanathan, Colin Boyd, Ed Dawson: Hybrid Key Escrow: A New Paradigm. Computers & Security 21(1): 77-92 (2002)
56EEJuan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson: Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002)
55EEEd Dawson, Kapali Viswanathan, Colin Boyd: Compliant cryptologic protocols. Int. J. Inf. Sec. 1(3): 189-202 (2002)
2001
54 Colin Boyd: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings Springer 2001
53EEDongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson: Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. ACISP 2001: 334-343
52EEChris Pavlovski, Colin Boyd: Attacks Based on Small Factors in Various Group Structures. ACISP 2001: 36-50
51EEColin Boyd, Paul Montague, Khanh Quoc Nguyen: Elliptic Curve Based Password Authenticated Key Exchange Protocols. ACISP 2001: 487-501
50EEJuan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based on the Subgroup Membership Problem. ICICS 2001: 352-363
49EEGreg Maitland, Colin Boyd: Fair Electronic Cash Based on a Group Signature Scheme. ICICS 2001: 461-465
48EEKapali Viswanathan, Colin Boyd, Ed Dawson: An Analysis of Integrity Services in Protocols. INDOCRYPT 2001: 175-187
2000
47 Ed Dawson, Andrew Clark, Colin Boyd: Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings Springer 2000
46 Ernest Foo, Colin Boyd: Passive Entities: A Strategy for Electronic Payment Design. ACISP 2000: 134-148
45 Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson: Key Recovery System for the Commercial Environment. ACISP 2000: 149-162
44 Kapali Viswanathan, Colin Boyd, Ed Dawson: A Three Phased Schema for Sealed Bid Auction System Design. ACISP 2000: 412-426
43EEColin Boyd, Chris Pavlovski: Attacking and Repairing Batch Verification Schemes. ASIACRYPT 2000: 58-71
42EEDongGook Park, Colin Boyd, Ed Dawson: Micropayments for Wireless Communications. ICISC 2000: 192-205
41EEGreg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson: Linkability in Practical Electronic Cash Design. ISW 2000: 149-163
40EEDongGook Park, Colin Boyd, Ed Dawson: Classification of Authentication Protocols: A Practical Approach. ISW 2000: 194-208
39EEColin Boyd, Peter Kearney: Exploring Fair Exchange Protocols Using Specification Animation. ISW 2000: 209-223
38 Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson: Key Recovery in Third Generation Wireless Communication Systems. Public Key Cryptography 2000: 223-237
37 DongGook Park, Colin Boyd, Sang-Jae Moon: Forward Secrecy and Its Application to Future Mobile Communications Security. Public Key Cryptography 2000: 433-445
36EEColin Boyd, Anish Mathuria: Key establishment protocols for secure mobile communications: a critical survey. Computer Communications 23(5-6): 575-587 (2000)
1999
35EEColin Boyd, Ernest Foo, Chris Pavlovski: Efficient Electronic Cash Using Batch Signatures. ACISP 1999: 244-257
34EEKapali Viswanathan, Colin Boyd, Ed Dawson: Publicly Verifiable Key Escrow with Limited Time Span. ACISP 1999: 36-50
33 Kapali Viswanathan, Colin Boyd, Ed Dawson: Signature Scheme for Controlled Environments. ICICS 1999: 119-134
32 Chris Pavlovski, Colin Boyd, Ernest Foo: Detachable Electronic Coins. ICICS 1999: 54-70
31 Kapali Viswanathan, Colin Boyd, Ed Dawson: Secure Selection Protocols. ICISC 1999: 132-146
30EEKapali Viswanathan, Colin Boyd, Ed Dawson: Strong Binding for Software Key Escrow. ICPP Workshops 1999: 134-139
29EEXian Liu, Patrick G. Farrell, Colin Boyd: A Unified Code. IMA Int. Conf. 1999: 84-93
1998
28 Colin Boyd, Ed Dawson: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings Springer 1998
27EEColin Boyd, Anish Mathuria: Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. ACISP 1998: 344-355
26EEColin Boyd, Ernest Foo: Off-Line Fair Payment Protocols Using Convertible Signatures. ASIACRYPT 1998: 271-285
25EEErnest Foo, Colin Boyd: A Payment Scheme Using Vouchers. Financial Cryptography 1998: 103-121
24 Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell: A security architecture for third generation wireless systems. ICISC 1998: 15-32
23 Colin Boyd, DongGook Park: Public key protocols for wireless communications. ICISC 1998: 47-57
1997
22 Jen Lim, Colin Boyd, Ed Dawson: Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. ACISP 1997: 216-227
21 Colin Boyd: On Key Agreement and Conference Key Agreement. ACISP 1997: 294-302
20 Colin Boyd: Digital signature and public key cryptosystems in a prime order subgroup of Zn*. ICICS 1997: 346-355
19 Colin Boyd: Enforcing traceability in software. ICICS 1997: 398-408
18 Xian Liu, Patrick G. Farrell, Colin Boyd: Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding. IMA Int. Conf. 1997: 199-208
17 Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson: A taxonomy of electronic cash schemes. SEC 1997: 337-348
1996
16 Colin Boyd: A Framework for Design of Key Establishment Protocols. ACISP 1996: 146-157
15EEColin Boyd: A Class of Flexible and Efficient Key Management Protocols. CSFW 1996: 2-8
1995
14 Colin Boyd: Cryptography and Coding, 5th IMA Conference, Cirencester, UK, December 18-20, 1995, Proceedings Springer 1995
13EEColin Boyd: Towards a classification of key agreement protocols. CSFW 1995: 38-43
12 Andrew Smith, Colin Boyd: An Elliptic Curve Analogue of McCurley's Key Agreement Scheme. IMA Conf. 1995: 150-157
1994
11 Colin Boyd, Wenbo Mao: Design and Analysis of Key Exchange Protocols via Secure Channel Identification. ASIACRYPT 1994: 171-181
10 Wenbo Mao, Colin Boyd: Development of Authentication Protocols: Some Misconceptions and a New Approach. CSFW 1994: 178-186
9EEWenbo Mao, Colin Boyd: On Strengthening Authentication Protocols to Foil Cryptanalysis. ESORICS 1994: 193-204
8EEColin Boyd, Wenbo Mao: Designing Secure Key Exchange Protocols. ESORICS 1994: 93-105
1993
7 Wenbo Mao, Colin Boyd: Towards Formal Analysis of Security Protocols. CSFW 1993: 147-158
6EEColin Boyd, Wenbo Mao: On a Limitation of BAN Logic. EUROCRYPT 1993: 240-247
5 Colin Boyd: Security Architectures Using Formal Methods. IEEE Journal on Selected Areas in Communications 11(5): 694-701 (1993)
1992
4EEColin Boyd: A Formal Framework for Authentication. ESORICS 1992: 273-292
1991
3EEColin Boyd: Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects. EUROCRYPT 1991: 266-280
1989
2EEColin Boyd: A New Multiple Key Cipher and an Improved Voting Scheme. EUROCRYPT 1989: 617-625
1988
1EEColin Boyd: Some Applications of Multiple Key Ciphers. EUROCRYPT 1988: 455-467

Coauthor Index

1Riza Aditya [68] [76] [80] [85] [88] [93]
2Wageeh Boles [132] [133]
3Andrew P. Bradley [124]
4Jaimee Brown [111] [113]
5William J. Caelli [17]
6Shaokang Chen [124]
7Kim-Kwang Raymond Choo [77] [84] [96] [97] [101] [102] [105] [115] [118]
8Sherman S. M. Chow [109]
9Andrew Clark [47] [56]
10Yvonne Cliff [117] [134]
11Stuart Crozier [124]
12Ed Dawson [17] [22] [24] [28] [30] [31] [33] [34] [38] [40] [41] [42] [44] [45] [47] [48] [50] [53] [55] [56] [57] [59] [60] [63] [67] [68] [71] [76] [78] [80] [83] [85] [86] [88] [92] [93] [95] [98] [99] [100] [104] [108] [114] [119] [122] [135]
13Robert Dawson [114]
14Jason Dowling [124]
15Jiang Du [124]
16Rong Du [87] [94] [107] [115] [131]
17Patrick G. Farrell [18] [29]
18Brian Fitzgerald [87]
19Ernest Foo [17] [25] [26] [32] [35] [41] [46] [87] [94] [107] [110] [115] [120] [129] [130] [131]
20Gary Gaskell [24]
21M. Choudary Gorantla [126] [136] [137]
22JaeCheol Ha (Jae-Cheol Ha) [112] [123] [127] [128]
23JungHoon Ha [112]
24Marianne Hirschbichler [132] [133]
25Yvonne Hitchcock [66] [77] [81] [84] [97] [101] [102] [105] [106]
26Roslan Ismail [69] [74] [75] [121]
27Audun Jøsang [69] [74] [75] [121]
28Baoyuan Kang [135]
29Peter Kearney [39]
30Hwankoo Kim [128]
31JungJoon Kim [53]
32Kwangjo Kim [67] [86]
33Byoungcheon Lee [67] [76] [80] [83] [85] [86] [88] [93] [99]
34Jen Lim [22]
35Xian Liu [18] [29]
36Mark Looi [24] [79]
37Anthony J. Maeder [124]
38Greg Maitland [41] [49] [58] [62] [77] [84]
39Wenbo Mao [6] [7] [8] [9] [10] [11] [64] [73] [89] [91]
40Anish Mathuria [27] [36] [118]
41Paul Montague [51] [66]
42Sang-Jae Moon [37] [112] [123] [127] [128]
43Khanh Quoc Nguyen [51]
44Juan Gonzalez Nieto [134]
45Juan Manuel González Nieto (Juanma González Nieto) [38] [45] [50] [56] [65] [66] [70] [72] [79] [81] [90] [92] [94] [103] [106] [109] [110] [111] [113] [114] [116] [120] [123] [125] [126] [127] [128] [129] [130] [136] [137]
46Eiji Okamoto [119] [125]
47Takeshi Okamoto [125]
48DongGook Park [23] [37] [38] [40] [42] [53]
49JeaHoon Park [128]
50Kenneth G. Paterson [64] [89] [134]
51Chris Pavlovski [32] [35] [43] [52]
52Kun Peng [59] [60] [63] [71] [78] [80] [83] [85] [88] [95] [98] [99] [100] [104] [108] [119] [122]
53Binh Pham (Binh T. Pham) [124]
54Birgit M. Planitz [124]
55Jason Reid [41]
56Selwyn Russell [24] [69] [74] [75]
57Andrew Smith [12]
58Jason Smith [116] [120]
59Yiu Shing Terry Tin [66] [70] [72] [79] [90] [117]
60Suratose Tritilanunt [110] [120] [129] [130]
61Raylin Tso [125]
62Harikrishna Vasanta [79] [90]
63Kapalee Viswanathan [63] [78]
64Kapali Viswanathan [30] [31] [33] [34] [44] [45] [48] [55] [56] [57] [59] [60] [61] [68] [71]
65Jeongmo Yang [67] [86]
66Seungjae Yoo [67] [86]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)