| 2009 |
| 137 | EE | M. Choudary Gorantla,
Colin Boyd,
Juan Manuel González Nieto:
Universally composable contributory group key exchange.
ASIACCS 2009: 146-156 |
| 136 | EE | M. Choudary Gorantla,
Colin Boyd,
Juan Manuel González Nieto:
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.
Public Key Cryptography 2009: 105-123 |
| 135 | EE | Baoyuan Kang,
Colin Boyd,
Ed Dawson:
A novel identity-based strong designated verifier signature scheme.
Journal of Systems and Software 82(2): 270-273 (2009) |
| 2008 |
| 134 | EE | Colin Boyd,
Yvonne Cliff,
Juan Gonzalez Nieto,
Kenneth G. Paterson:
Efficient One-Round Key Exchange in the Standard Model.
ACISP 2008: 69-83 |
| 133 | EE | Marianne Hirschbichler,
Colin Boyd,
Wageeh Boles:
A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault.
DICTA 2008: 540-547 |
| 132 | EE | Marianne Hirschbichler,
Colin Boyd,
Wageeh Boles:
A Multiple-Control Fuzzy Vault.
PST 2008: 36-47 |
| 131 | EE | Rong Du,
Ernest Foo,
Colin Boyd:
Designing a secure e-tender submission protocol.
Electronic Commerce Research 8(3): 115-142 (2008) |
| 2007 |
| 130 | EE | Suratose Tritilanunt,
Colin Boyd,
Ernest Foo,
Juan Manuel González Nieto:
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.
ACSC 2007: 191-200 |
| 129 | EE | Suratose Tritilanunt,
Colin Boyd,
Ernest Foo,
Juan Manuel González Nieto:
Toward Non-parallelizable Client Puzzles.
CANS 2007: 247-264 |
| 128 | EE | JaeCheol Ha,
Hwankoo Kim,
JeaHoon Park,
Sang-Jae Moon,
Juan Manuel González Nieto,
Colin Boyd:
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.
EUC Workshops 2007: 557-567 |
| 127 | EE | JaeCheol Ha,
Sang-Jae Moon,
Juan Manuel González Nieto,
Colin Boyd:
Low-Cost and Strong-Security RFID Authentication Protocol.
EUC Workshops 2007: 795-807 |
| 126 | EE | M. Choudary Gorantla,
Colin Boyd,
Juan Manuel González Nieto:
On the Connection Between Signcryption and One-Pass Key Establishment.
IMA Int. Conf. 2007: 277-301 |
| 125 | EE | Raylin Tso,
Juan Manuel González Nieto,
Takeshi Okamoto,
Colin Boyd,
Eiji Okamoto:
Verifier-Key-Flexible Universal Designated-Verifier Signatures.
IMA Int. Conf. 2007: 403-421 |
| 124 | EE | Jason Dowling,
Birgit M. Planitz,
Anthony J. Maeder,
Jiang Du,
Binh Pham,
Colin Boyd,
Shaokang Chen,
Andrew P. Bradley,
Stuart Crozier:
A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality.
IWDW 2007: 454-466 |
| 123 | EE | JaeCheol Ha,
Sang-Jae Moon,
Juan Manuel González Nieto,
Colin Boyd:
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP).
PAKDD Workshops 2007: 574-583 |
| 122 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Batch zero-knowledge proof and verification and its applications.
ACM Trans. Inf. Syst. Secur. 10(2): (2007) |
| 121 | EE | Audun Jøsang,
Roslan Ismail,
Colin Boyd:
A survey of trust and reputation systems for online service provision.
Decision Support Systems 43(2): 618-644 (2007) |
| 120 | EE | Jason Smith,
Suratose Tritilanunt,
Colin Boyd,
Juan Manuel González Nieto,
Ernest Foo:
Denial-of-service resistance in key establishment.
IJWMC 2(1): 59-71 (2007) |
| 2006 |
| 119 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Eiji Okamoto:
A Novel Range Test.
ACISP 2006: 247-258 |
| 118 | EE | Colin Boyd,
Kim-Kwang Raymond Choo,
Anish Mathuria:
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
ACISP 2006: 371-382 |
| 117 | EE | Yvonne Cliff,
Yiu Shing Terry Tin,
Colin Boyd:
Password Based Server Aided Key Exchange .
ACNS 2006: 146-161 |
| 116 | EE | Jason Smith,
Juan Manuel González Nieto,
Colin Boyd:
Modelling denial of service attacks on JFK with Meadows's cost-based framework.
ACSW Frontiers 2006: 125-134 |
| 115 | EE | Rong Du,
Ernest Foo,
Colin Boyd,
Kim-Kwang Raymond Choo:
Formal analysis of secure contracting protocol for e-tendering.
ACSW Frontiers 2006: 155-164 |
| 114 | EE | Robert Dawson,
Colin Boyd,
Ed Dawson,
Juan Manuel González Nieto:
SKMA: a key management architecture for SCADA systems.
ACSW Frontiers 2006: 183-192 |
| 113 | EE | Jaimee Brown,
Juan Manuel González Nieto,
Colin Boyd:
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.
CANS 2006: 1-18 |
| 112 | EE | JaeCheol Ha,
JungHoon Ha,
Sang-Jae Moon,
Colin Boyd:
LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System.
ICUCT 2006: 80-89 |
| 111 | EE | Jaimee Brown,
Juan Manuel González Nieto,
Colin Boyd:
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions.
INDOCRYPT 2006: 176-190 |
| 110 | EE | Suratose Tritilanunt,
Colin Boyd,
Ernest Foo,
Juan Manuel González Nieto:
Examining the DoS Resistance of HIP.
OTM Workshops (1) 2006: 616-625 |
| 109 | EE | Sherman S. M. Chow,
Colin Boyd,
Juan Manuel González Nieto:
Security-Mediated Certificateless Cryptography.
Public Key Cryptography 2006: 508-524 |
| 108 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Sealed-Bid Micro Auctions.
SEC 2006: 246-257 |
| 107 | EE | Rong Du,
Colin Boyd,
Ernest Foo:
A Secure E-Tender Submission Protocol.
TrustBus 2006: 213-222 |
| 106 | EE | Yvonne Hitchcock,
Colin Boyd,
Juan Manuel González Nieto:
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model.
Appl. Algebra Eng. Commun. Comput. 16(6): 405-438 (2006) |
| 105 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Computer Communications 29(15): 2788-2797 (2006) |
| 104 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Batch verification of validity of bids in homomorphic e-auction.
Computer Communications 29(15): 2798-2805 (2006) |
| 2005 |
| 103 | | Colin Boyd,
Juan Manuel González Nieto:
Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings
Springer 2005 |
| 102 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.
ASIACRYPT 2005: 585-604 |
| 101 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
Errors in Computational Complexity Proofs for Protocols.
ASIACRYPT 2005: 624-643 |
| 100 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy.
CRYPTO 2005: 188-204 |
| 99 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
Ciphertext Comparison, a New Solution to the Millionaire Problem.
ICICS 2005: 84-96 |
| 98 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.
ISC 2005: 374-388 |
| 97 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock:
On Session Key Construction in Provably-Secure Key Establishment Protocols.
Mycrypt 2005: 116-131 |
| 96 | EE | Colin Boyd,
Kim-Kwang Raymond Choo:
Security of Two-Party Identity-Based Key Agreement.
Mycrypt 2005: 229-243 |
| 95 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.
Mycrypt 2005: 84-98 |
| 94 | EE | Rong Du,
Ernest Foo,
Juan Manuel González Nieto,
Colin Boyd:
Designing Secure E-Tendering Systems.
TrustBus 2005: 70-79 |
| 93 | | Riza Aditya,
Byoungcheon Lee,
Colin Boyd,
Ed Dawson:
Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption.
Comput. Syst. Sci. Eng. 20(6): (2005) |
| 92 | EE | Juan Manuel González Nieto,
Colin Boyd,
Ed Dawson:
A Public Key Cryptosystem Based On A Subgroup Membership Problem.
Des. Codes Cryptography 36(3): 301-316 (2005) |
| 91 | EE | Colin Boyd,
Wenbo Mao:
Preface to the special issue on ISC 2003.
Int. J. Inf. Sec. 4(4): 227-227 (2005) |
| 2004 |
| 90 | EE | Yiu Shing Terry Tin,
Harikrishna Vasanta,
Colin Boyd,
Juan Manuel González Nieto:
Protocols with Security Proofs for Mobile Applications.
ACISP 2004: 358-369 |
| 89 | EE | Colin Boyd,
Wenbo Mao,
Kenneth G. Paterson:
Key Agreement Using Statically Keyed Authenticators.
ACNS 2004: 248-262 |
| 88 | EE | Riza Aditya,
Kun Peng,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
ACNS 2004: 494-508 |
| 87 | EE | Rong Du,
Ernest Foo,
Colin Boyd,
Brian Fitzgerald:
Defining Security Services for Electronic Tendering.
ACSW Frontiers 2004: 43-52 |
| 86 | EE | Byoungcheon Lee,
Colin Boyd,
Ed Dawson,
Kwangjo Kim,
Jeongmo Yang,
Seungjae Yoo:
Secure Key Issuing in ID-based Cryptography.
ACSW Frontiers 2004: 69-74 |
| 85 | | Kun Peng,
Riza Aditya,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.
Cryptographic Algorithms and their Uses 2004: 57-71 |
| 84 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock,
Greg Maitland:
Complementing Computational Protocol Analysis with Formal Specifications.
Formal Aspects in Security and Trust 2004: 129-144 |
| 83 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
An Efficient and Verifiable Solution to the Millionaire Problem.
ICISC 2004: 51-66 |
| 82 | EE | Colin Boyd:
Design of Secure Key Establishment Protocols: Successes, Failures and Prospects.
INDOCRYPT 2004: 1-13 |
| 81 | EE | Yvonne Hitchcock,
Colin Boyd,
Juan Manuel González Nieto:
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.
INDOCRYPT 2004: 17-32 |
| 80 | EE | Kun Peng,
Riza Aditya,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
Multiplicative Homomorphic E-Voting.
INDOCRYPT 2004: 61-72 |
| 79 | EE | Harikrishna Vasanta,
Yiu Shing Terry Tin,
Colin Boyd,
Mark Looi,
Juan Manuel González Nieto:
A Secure Framework for User Privacy in Heterogeneous Location Networks.
MATA 2004: 264-274 |
| 78 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapalee Viswanathan:
A Correct, Private, and Efficient Mix Network.
Public Key Cryptography 2004: 439-454 |
| 77 | EE | Kim-Kwang Raymond Choo,
Colin Boyd,
Yvonne Hitchcock,
Greg Maitland:
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.
SCN 2004: 351-366 |
| 76 | EE | Riza Aditya,
Byoungcheon Lee,
Colin Boyd,
Ed Dawson:
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness.
TrustBus 2004: 152-161 |
| 75 | | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
Private Reputation Schemes for P2P systems.
WOSIS 2004: 196-206 |
| 74 | | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
An Efficient Off-Line Reputation Scheme Using Articulated Certificates.
WOSIS 2004: 53-62 |
| 2003 |
| 73 | | Colin Boyd,
Wenbo Mao:
Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings
Springer 2003 |
| 72 | EE | Yiu Shing Terry Tin,
Colin Boyd,
Juan Manuel González Nieto:
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach.
ACISP 2003: 166-179 |
| 71 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Five Sealed-bid Auction Models.
ACSW Frontiers 2003: 77-86 |
| 70 | EE | Yiu Shing Terry Tin,
Colin Boyd,
Juanma González Nieto:
Provably Secure Key Exchange: An Engineering Approach.
ACSW Frontiers 2003: 97-104 |
| 69 | EE | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
A Security Architecture for Reputation Systems.
EC-Web 2003: 176-185 |
| 68 | EE | Riza Aditya,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Secure e-Voting for Preferential Elections.
EGOV 2003: 246-249 |
| 67 | EE | Byoungcheon Lee,
Colin Boyd,
Ed Dawson,
Kwangjo Kim,
Jeongmo Yang,
Seungjae Yoo:
Providing Receipt-Freeness in Mixnet-Based Voting Protocols.
ICISC 2003: 245-258 |
| 66 | EE | Yvonne Hitchcock,
Yiu Shing Terry Tin,
Juan Manuel González Nieto,
Colin Boyd,
Paul Montague:
A Password-Based Authenticator: Security Proof and Applications.
INDOCRYPT 2003: 388-401 |
| 65 | EE | Colin Boyd,
Juan Manuel González Nieto:
Round-Optimal Contributory Conference Key Agreement.
Public Key Cryptography 2003: 161-174 |
| 64 | EE | Colin Boyd,
Wenbo Mao,
Kenneth G. Paterson:
Deniable Authenticated Key Establishment for Internet Protocols.
Security Protocols Workshop 2003: 255-271 |
| 63 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapalee Viswanathan:
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.
WISA 2003: 244-256 |
| 2002 |
| 62 | EE | Greg Maitland,
Colin Boyd:
Co-operatively Formed Group Signatures.
CT-RSA 2002: 218-235 |
| 61 | EE | Colin Boyd,
Kapali Viswanathan:
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis.
FASec 2002: 49-61 |
| 60 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.
ICICS 2002: 147-159 |
| 59 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Non-interactive Auction Schemewith Strong Privacy.
ICISC 2002: 407-420 |
| 58 | EE | Greg Maitland,
Colin Boyd:
A Provably Secure Restrictive Partially Blind Signature Scheme.
Public Key Cryptography 2002: 99-114 |
| 57 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Hybrid Key Escrow: A New Paradigm.
Computers & Security 21(1): 77-92 (2002) |
| 56 | EE | Juan Manuel González Nieto,
Kapali Viswanathan,
Colin Boyd,
Andrew Clark,
Ed Dawson:
Key recovery for the commercial environment.
Int. J. Inf. Sec. 1(3): 161-174 (2002) |
| 55 | EE | Ed Dawson,
Kapali Viswanathan,
Colin Boyd:
Compliant cryptologic protocols.
Int. J. Inf. Sec. 1(3): 189-202 (2002) |
| 2001 |
| 54 | | Colin Boyd:
Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings
Springer 2001 |
| 53 | EE | DongGook Park,
JungJoon Kim,
Colin Boyd,
Ed Dawson:
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks.
ACISP 2001: 334-343 |
| 52 | EE | Chris Pavlovski,
Colin Boyd:
Attacks Based on Small Factors in Various Group Structures.
ACISP 2001: 36-50 |
| 51 | EE | Colin Boyd,
Paul Montague,
Khanh Quoc Nguyen:
Elliptic Curve Based Password Authenticated Key Exchange Protocols.
ACISP 2001: 487-501 |
| 50 | EE | Juan Manuel González Nieto,
Colin Boyd,
Ed Dawson:
A Public Key Cryptosystem Based on the Subgroup Membership Problem.
ICICS 2001: 352-363 |
| 49 | EE | Greg Maitland,
Colin Boyd:
Fair Electronic Cash Based on a Group Signature Scheme.
ICICS 2001: 461-465 |
| 48 | EE | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
An Analysis of Integrity Services in Protocols.
INDOCRYPT 2001: 175-187 |
| 2000 |
| 47 | | Ed Dawson,
Andrew Clark,
Colin Boyd:
Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings
Springer 2000 |
| 46 | | Ernest Foo,
Colin Boyd:
Passive Entities: A Strategy for Electronic Payment Design.
ACISP 2000: 134-148 |
| 45 | | Juanma González Nieto,
Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Key Recovery System for the Commercial Environment.
ACISP 2000: 149-162 |
| 44 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
A Three Phased Schema for Sealed Bid Auction System Design.
ACISP 2000: 412-426 |
| 43 | EE | Colin Boyd,
Chris Pavlovski:
Attacking and Repairing Batch Verification Schemes.
ASIACRYPT 2000: 58-71 |
| 42 | EE | DongGook Park,
Colin Boyd,
Ed Dawson:
Micropayments for Wireless Communications.
ICISC 2000: 192-205 |
| 41 | EE | Greg Maitland,
Jason Reid,
Ernest Foo,
Colin Boyd,
Ed Dawson:
Linkability in Practical Electronic Cash Design.
ISW 2000: 149-163 |
| 40 | EE | DongGook Park,
Colin Boyd,
Ed Dawson:
Classification of Authentication Protocols: A Practical Approach.
ISW 2000: 194-208 |
| 39 | EE | Colin Boyd,
Peter Kearney:
Exploring Fair Exchange Protocols Using Specification Animation.
ISW 2000: 209-223 |
| 38 | | Juanma González Nieto,
DongGook Park,
Colin Boyd,
Ed Dawson:
Key Recovery in Third Generation Wireless Communication Systems.
Public Key Cryptography 2000: 223-237 |
| 37 | | DongGook Park,
Colin Boyd,
Sang-Jae Moon:
Forward Secrecy and Its Application to Future Mobile Communications Security.
Public Key Cryptography 2000: 433-445 |
| 36 | EE | Colin Boyd,
Anish Mathuria:
Key establishment protocols for secure mobile communications: a critical survey.
Computer Communications 23(5-6): 575-587 (2000) |
| 1999 |
| 35 | EE | Colin Boyd,
Ernest Foo,
Chris Pavlovski:
Efficient Electronic Cash Using Batch Signatures.
ACISP 1999: 244-257 |
| 34 | EE | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Publicly Verifiable Key Escrow with Limited Time Span.
ACISP 1999: 36-50 |
| 33 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Signature Scheme for Controlled Environments.
ICICS 1999: 119-134 |
| 32 | | Chris Pavlovski,
Colin Boyd,
Ernest Foo:
Detachable Electronic Coins.
ICICS 1999: 54-70 |
| 31 | | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Secure Selection Protocols.
ICISC 1999: 132-146 |
| 30 | EE | Kapali Viswanathan,
Colin Boyd,
Ed Dawson:
Strong Binding for Software Key Escrow.
ICPP Workshops 1999: 134-139 |
| 29 | EE | Xian Liu,
Patrick G. Farrell,
Colin Boyd:
A Unified Code.
IMA Int. Conf. 1999: 84-93 |
| 1998 |
| 28 | | Colin Boyd,
Ed Dawson:
Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings
Springer 1998 |
| 27 | EE | Colin Boyd,
Anish Mathuria:
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey.
ACISP 1998: 344-355 |
| 26 | EE | Colin Boyd,
Ernest Foo:
Off-Line Fair Payment Protocols Using Convertible Signatures.
ASIACRYPT 1998: 271-285 |
| 25 | EE | Ernest Foo,
Colin Boyd:
A Payment Scheme Using Vouchers.
Financial Cryptography 1998: 103-121 |
| 24 | | Gary Gaskell,
Mark Looi,
Ed Dawson,
Colin Boyd,
Selwyn Russell:
A security architecture for third generation wireless systems.
ICISC 1998: 15-32 |
| 23 | | Colin Boyd,
DongGook Park:
Public key protocols for wireless communications.
ICISC 1998: 47-57 |
| 1997 |
| 22 | | Jen Lim,
Colin Boyd,
Ed Dawson:
Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes.
ACISP 1997: 216-227 |
| 21 | | Colin Boyd:
On Key Agreement and Conference Key Agreement.
ACISP 1997: 294-302 |
| 20 | | Colin Boyd:
Digital signature and public key cryptosystems in a prime order subgroup of Zn*.
ICICS 1997: 346-355 |
| 19 | | Colin Boyd:
Enforcing traceability in software.
ICICS 1997: 398-408 |
| 18 | | Xian Liu,
Patrick G. Farrell,
Colin Boyd:
Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding.
IMA Int. Conf. 1997: 199-208 |
| 17 | | Ernest Foo,
Colin Boyd,
William J. Caelli,
Ed Dawson:
A taxonomy of electronic cash schemes.
SEC 1997: 337-348 |
| 1996 |
| 16 | | Colin Boyd:
A Framework for Design of Key Establishment Protocols.
ACISP 1996: 146-157 |
| 15 | EE | Colin Boyd:
A Class of Flexible and Efficient Key Management Protocols.
CSFW 1996: 2-8 |
| 1995 |
| 14 | | Colin Boyd:
Cryptography and Coding, 5th IMA Conference, Cirencester, UK, December 18-20, 1995, Proceedings
Springer 1995 |
| 13 | EE | Colin Boyd:
Towards a classification of key agreement protocols.
CSFW 1995: 38-43 |
| 12 | | Andrew Smith,
Colin Boyd:
An Elliptic Curve Analogue of McCurley's Key Agreement Scheme.
IMA Conf. 1995: 150-157 |
| 1994 |
| 11 | | Colin Boyd,
Wenbo Mao:
Design and Analysis of Key Exchange Protocols via Secure Channel Identification.
ASIACRYPT 1994: 171-181 |
| 10 | | Wenbo Mao,
Colin Boyd:
Development of Authentication Protocols: Some Misconceptions and a New Approach.
CSFW 1994: 178-186 |
| 9 | EE | Wenbo Mao,
Colin Boyd:
On Strengthening Authentication Protocols to Foil Cryptanalysis.
ESORICS 1994: 193-204 |
| 8 | EE | Colin Boyd,
Wenbo Mao:
Designing Secure Key Exchange Protocols.
ESORICS 1994: 93-105 |
| 1993 |
| 7 | | Wenbo Mao,
Colin Boyd:
Towards Formal Analysis of Security Protocols.
CSFW 1993: 147-158 |
| 6 | EE | Colin Boyd,
Wenbo Mao:
On a Limitation of BAN Logic.
EUROCRYPT 1993: 240-247 |
| 5 | | Colin Boyd:
Security Architectures Using Formal Methods.
IEEE Journal on Selected Areas in Communications 11(5): 694-701 (1993) |
| 1992 |
| 4 | EE | Colin Boyd:
A Formal Framework for Authentication.
ESORICS 1992: 273-292 |
| 1991 |
| 3 | EE | Colin Boyd:
Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects.
EUROCRYPT 1991: 266-280 |
| 1989 |
| 2 | EE | Colin Boyd:
A New Multiple Key Cipher and an Improved Voting Scheme.
EUROCRYPT 1989: 617-625 |
| 1988 |
| 1 | EE | Colin Boyd:
Some Applications of Multiple Key Ciphers.
EUROCRYPT 1988: 455-467 |