2009 | ||
---|---|---|
137 | EE | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: Universally composable contributory group key exchange. ASIACCS 2009: 146-156 |
136 | EE | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Public Key Cryptography 2009: 105-123 |
135 | EE | Baoyuan Kang, Colin Boyd, Ed Dawson: A novel identity-based strong designated verifier signature scheme. Journal of Systems and Software 82(2): 270-273 (2009) |
2008 | ||
134 | EE | Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson: Efficient One-Round Key Exchange in the Standard Model. ACISP 2008: 69-83 |
133 | EE | Marianne Hirschbichler, Colin Boyd, Wageeh Boles: A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault. DICTA 2008: 540-547 |
132 | EE | Marianne Hirschbichler, Colin Boyd, Wageeh Boles: A Multiple-Control Fuzzy Vault. PST 2008: 36-47 |
131 | EE | Rong Du, Ernest Foo, Colin Boyd: Designing a secure e-tender submission protocol. Electronic Commerce Research 8(3): 115-142 (2008) |
2007 | ||
130 | EE | Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. ACSC 2007: 191-200 |
129 | EE | Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Toward Non-parallelizable Client Puzzles. CANS 2007: 247-264 |
128 | EE | JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. EUC Workshops 2007: 557-567 |
127 | EE | JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: Low-Cost and Strong-Security RFID Authentication Protocol. EUC Workshops 2007: 795-807 |
126 | EE | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto: On the Connection Between Signcryption and One-Pass Key Establishment. IMA Int. Conf. 2007: 277-301 |
125 | EE | Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto: Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMA Int. Conf. 2007: 403-421 |
124 | EE | Jason Dowling, Birgit M. Planitz, Anthony J. Maeder, Jiang Du, Binh Pham, Colin Boyd, Shaokang Chen, Andrew P. Bradley, Stuart Crozier: A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality. IWDW 2007: 454-466 |
123 | EE | JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd: Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). PAKDD Workshops 2007: 574-583 |
122 | EE | Kun Peng, Colin Boyd, Ed Dawson: Batch zero-knowledge proof and verification and its applications. ACM Trans. Inf. Syst. Secur. 10(2): (2007) |
121 | EE | Audun Jøsang, Roslan Ismail, Colin Boyd: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2): 618-644 (2007) |
120 | EE | Jason Smith, Suratose Tritilanunt, Colin Boyd, Juan Manuel González Nieto, Ernest Foo: Denial-of-service resistance in key establishment. IJWMC 2(1): 59-71 (2007) |
2006 | ||
119 | EE | Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto: A Novel Range Test. ACISP 2006: 247-258 |
118 | EE | Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria: An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. ACISP 2006: 371-382 |
117 | EE | Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd: Password Based Server Aided Key Exchange . ACNS 2006: 146-161 |
116 | EE | Jason Smith, Juan Manuel González Nieto, Colin Boyd: Modelling denial of service attacks on JFK with Meadows's cost-based framework. ACSW Frontiers 2006: 125-134 |
115 | EE | Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo: Formal analysis of secure contracting protocol for e-tendering. ACSW Frontiers 2006: 155-164 |
114 | EE | Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto: SKMA: a key management architecture for SCADA systems. ACSW Frontiers 2006: 183-192 |
113 | EE | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd: Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. CANS 2006: 1-18 |
112 | EE | JaeCheol Ha, JungHoon Ha, Sang-Jae Moon, Colin Boyd: LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. ICUCT 2006: 80-89 |
111 | EE | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd: Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. INDOCRYPT 2006: 176-190 |
110 | EE | Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Examining the DoS Resistance of HIP. OTM Workshops (1) 2006: 616-625 |
109 | EE | Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto: Security-Mediated Certificateless Cryptography. Public Key Cryptography 2006: 508-524 |
108 | EE | Kun Peng, Colin Boyd, Ed Dawson: Sealed-Bid Micro Auctions. SEC 2006: 246-257 |
107 | EE | Rong Du, Colin Boyd, Ernest Foo: A Secure E-Tender Submission Protocol. TrustBus 2006: 213-222 |
106 | EE | Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Appl. Algebra Eng. Commun. Comput. 16(6): 405-438 (2006) |
105 | EE | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols. Computer Communications 29(15): 2788-2797 (2006) |
104 | EE | Kun Peng, Colin Boyd, Ed Dawson: Batch verification of validity of bids in homomorphic e-auction. Computer Communications 29(15): 2798-2805 (2006) |
2005 | ||
103 | Colin Boyd, Juan Manuel González Nieto: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings Springer 2005 | |
102 | EE | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. ASIACRYPT 2005: 585-604 |
101 | EE | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: Errors in Computational Complexity Proofs for Protocols. ASIACRYPT 2005: 624-643 |
100 | EE | Kun Peng, Colin Boyd, Ed Dawson: Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. CRYPTO 2005: 188-204 |
99 | EE | Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: Ciphertext Comparison, a New Solution to the Millionaire Problem. ICICS 2005: 84-96 |
98 | EE | Kun Peng, Colin Boyd, Ed Dawson: A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. ISC 2005: 374-388 |
97 | EE | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock: On Session Key Construction in Provably-Secure Key Establishment Protocols. Mycrypt 2005: 116-131 |
96 | EE | Colin Boyd, Kim-Kwang Raymond Choo: Security of Two-Party Identity-Based Key Agreement. Mycrypt 2005: 229-243 |
95 | EE | Kun Peng, Colin Boyd, Ed Dawson: Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. Mycrypt 2005: 84-98 |
94 | EE | Rong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd: Designing Secure E-Tendering Systems. TrustBus 2005: 70-79 |
93 | Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson: Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption. Comput. Syst. Sci. Eng. 20(6): (2005) | |
92 | EE | Juan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptography 36(3): 301-316 (2005) |
91 | EE | Colin Boyd, Wenbo Mao: Preface to the special issue on ISC 2003. Int. J. Inf. Sec. 4(4): 227-227 (2005) |
2004 | ||
90 | EE | Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto: Protocols with Security Proofs for Mobile Applications. ACISP 2004: 358-369 |
89 | EE | Colin Boyd, Wenbo Mao, Kenneth G. Paterson: Key Agreement Using Statically Keyed Authenticators. ACNS 2004: 248-262 |
88 | EE | Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ACNS 2004: 494-508 |
87 | EE | Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald: Defining Security Services for Electronic Tendering. ACSW Frontiers 2004: 43-52 |
86 | EE | Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo: Secure Key Issuing in ID-based Cryptography. ACSW Frontiers 2004: 69-74 |
85 | Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee: A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71 | |
84 | EE | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland: Complementing Computational Protocol Analysis with Formal Specifications. Formal Aspects in Security and Trust 2004: 129-144 |
83 | EE | Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: An Efficient and Verifiable Solution to the Millionaire Problem. ICISC 2004: 51-66 |
82 | EE | Colin Boyd: Design of Secure Key Establishment Protocols: Successes, Failures and Prospects. INDOCRYPT 2004: 1-13 |
81 | EE | Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto: Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. INDOCRYPT 2004: 17-32 |
80 | EE | Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee: Multiplicative Homomorphic E-Voting. INDOCRYPT 2004: 61-72 |
79 | EE | Harikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto: A Secure Framework for User Privacy in Heterogeneous Location Networks. MATA 2004: 264-274 |
78 | EE | Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan: A Correct, Private, and Efficient Mix Network. Public Key Cryptography 2004: 439-454 |
77 | EE | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland: On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. SCN 2004: 351-366 |
76 | EE | Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson: An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. TrustBus 2004: 152-161 |
75 | Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: Private Reputation Schemes for P2P systems. WOSIS 2004: 196-206 | |
74 | Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: An Efficient Off-Line Reputation Scheme Using Articulated Certificates. WOSIS 2004: 53-62 | |
2003 | ||
73 | Colin Boyd, Wenbo Mao: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings Springer 2003 | |
72 | EE | Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto: Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. ACISP 2003: 166-179 |
71 | EE | Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Five Sealed-bid Auction Models. ACSW Frontiers 2003: 77-86 |
70 | EE | Yiu Shing Terry Tin, Colin Boyd, Juanma González Nieto: Provably Secure Key Exchange: An Engineering Approach. ACSW Frontiers 2003: 97-104 |
69 | EE | Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: A Security Architecture for Reputation Systems. EC-Web 2003: 176-185 |
68 | EE | Riza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan: Secure e-Voting for Preferential Elections. EGOV 2003: 246-249 |
67 | EE | Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo: Providing Receipt-Freeness in Mixnet-Based Voting Protocols. ICISC 2003: 245-258 |
66 | EE | Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague: A Password-Based Authenticator: Security Proof and Applications. INDOCRYPT 2003: 388-401 |
65 | EE | Colin Boyd, Juan Manuel González Nieto: Round-Optimal Contributory Conference Key Agreement. Public Key Cryptography 2003: 161-174 |
64 | EE | Colin Boyd, Wenbo Mao, Kenneth G. Paterson: Deniable Authenticated Key Establishment for Internet Protocols. Security Protocols Workshop 2003: 255-271 |
63 | EE | Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan: Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. WISA 2003: 244-256 |
2002 | ||
62 | EE | Greg Maitland, Colin Boyd: Co-operatively Formed Group Signatures. CT-RSA 2002: 218-235 |
61 | EE | Colin Boyd, Kapali Viswanathan: Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis. FASec 2002: 49-61 |
60 | EE | Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. ICICS 2002: 147-159 |
59 | EE | Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Non-interactive Auction Schemewith Strong Privacy. ICISC 2002: 407-420 |
58 | EE | Greg Maitland, Colin Boyd: A Provably Secure Restrictive Partially Blind Signature Scheme. Public Key Cryptography 2002: 99-114 |
57 | Kapali Viswanathan, Colin Boyd, Ed Dawson: Hybrid Key Escrow: A New Paradigm. Computers & Security 21(1): 77-92 (2002) | |
56 | EE | Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew Clark, Ed Dawson: Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002) |
55 | EE | Ed Dawson, Kapali Viswanathan, Colin Boyd: Compliant cryptologic protocols. Int. J. Inf. Sec. 1(3): 189-202 (2002) |
2001 | ||
54 | Colin Boyd: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings Springer 2001 | |
53 | EE | DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson: Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. ACISP 2001: 334-343 |
52 | EE | Chris Pavlovski, Colin Boyd: Attacks Based on Small Factors in Various Group Structures. ACISP 2001: 36-50 |
51 | EE | Colin Boyd, Paul Montague, Khanh Quoc Nguyen: Elliptic Curve Based Password Authenticated Key Exchange Protocols. ACISP 2001: 487-501 |
50 | EE | Juan Manuel González Nieto, Colin Boyd, Ed Dawson: A Public Key Cryptosystem Based on the Subgroup Membership Problem. ICICS 2001: 352-363 |
49 | EE | Greg Maitland, Colin Boyd: Fair Electronic Cash Based on a Group Signature Scheme. ICICS 2001: 461-465 |
48 | EE | Kapali Viswanathan, Colin Boyd, Ed Dawson: An Analysis of Integrity Services in Protocols. INDOCRYPT 2001: 175-187 |
2000 | ||
47 | Ed Dawson, Andrew Clark, Colin Boyd: Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings Springer 2000 | |
46 | Ernest Foo, Colin Boyd: Passive Entities: A Strategy for Electronic Payment Design. ACISP 2000: 134-148 | |
45 | Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson: Key Recovery System for the Commercial Environment. ACISP 2000: 149-162 | |
44 | Kapali Viswanathan, Colin Boyd, Ed Dawson: A Three Phased Schema for Sealed Bid Auction System Design. ACISP 2000: 412-426 | |
43 | EE | Colin Boyd, Chris Pavlovski: Attacking and Repairing Batch Verification Schemes. ASIACRYPT 2000: 58-71 |
42 | EE | DongGook Park, Colin Boyd, Ed Dawson: Micropayments for Wireless Communications. ICISC 2000: 192-205 |
41 | EE | Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson: Linkability in Practical Electronic Cash Design. ISW 2000: 149-163 |
40 | EE | DongGook Park, Colin Boyd, Ed Dawson: Classification of Authentication Protocols: A Practical Approach. ISW 2000: 194-208 |
39 | EE | Colin Boyd, Peter Kearney: Exploring Fair Exchange Protocols Using Specification Animation. ISW 2000: 209-223 |
38 | Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson: Key Recovery in Third Generation Wireless Communication Systems. Public Key Cryptography 2000: 223-237 | |
37 | DongGook Park, Colin Boyd, Sang-Jae Moon: Forward Secrecy and Its Application to Future Mobile Communications Security. Public Key Cryptography 2000: 433-445 | |
36 | EE | Colin Boyd, Anish Mathuria: Key establishment protocols for secure mobile communications: a critical survey. Computer Communications 23(5-6): 575-587 (2000) |
1999 | ||
35 | EE | Colin Boyd, Ernest Foo, Chris Pavlovski: Efficient Electronic Cash Using Batch Signatures. ACISP 1999: 244-257 |
34 | EE | Kapali Viswanathan, Colin Boyd, Ed Dawson: Publicly Verifiable Key Escrow with Limited Time Span. ACISP 1999: 36-50 |
33 | Kapali Viswanathan, Colin Boyd, Ed Dawson: Signature Scheme for Controlled Environments. ICICS 1999: 119-134 | |
32 | Chris Pavlovski, Colin Boyd, Ernest Foo: Detachable Electronic Coins. ICICS 1999: 54-70 | |
31 | Kapali Viswanathan, Colin Boyd, Ed Dawson: Secure Selection Protocols. ICISC 1999: 132-146 | |
30 | EE | Kapali Viswanathan, Colin Boyd, Ed Dawson: Strong Binding for Software Key Escrow. ICPP Workshops 1999: 134-139 |
29 | EE | Xian Liu, Patrick G. Farrell, Colin Boyd: A Unified Code. IMA Int. Conf. 1999: 84-93 |
1998 | ||
28 | Colin Boyd, Ed Dawson: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings Springer 1998 | |
27 | EE | Colin Boyd, Anish Mathuria: Key Establishment Protocols for Secure Mobile Communications: A Selective Survey. ACISP 1998: 344-355 |
26 | EE | Colin Boyd, Ernest Foo: Off-Line Fair Payment Protocols Using Convertible Signatures. ASIACRYPT 1998: 271-285 |
25 | EE | Ernest Foo, Colin Boyd: A Payment Scheme Using Vouchers. Financial Cryptography 1998: 103-121 |
24 | Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell: A security architecture for third generation wireless systems. ICISC 1998: 15-32 | |
23 | Colin Boyd, DongGook Park: Public key protocols for wireless communications. ICISC 1998: 47-57 | |
1997 | ||
22 | Jen Lim, Colin Boyd, Ed Dawson: Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes. ACISP 1997: 216-227 | |
21 | Colin Boyd: On Key Agreement and Conference Key Agreement. ACISP 1997: 294-302 | |
20 | Colin Boyd: Digital signature and public key cryptosystems in a prime order subgroup of Zn*. ICICS 1997: 346-355 | |
19 | Colin Boyd: Enforcing traceability in software. ICICS 1997: 398-408 | |
18 | Xian Liu, Patrick G. Farrell, Colin Boyd: Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding. IMA Int. Conf. 1997: 199-208 | |
17 | Ernest Foo, Colin Boyd, William J. Caelli, Ed Dawson: A taxonomy of electronic cash schemes. SEC 1997: 337-348 | |
1996 | ||
16 | Colin Boyd: A Framework for Design of Key Establishment Protocols. ACISP 1996: 146-157 | |
15 | EE | Colin Boyd: A Class of Flexible and Efficient Key Management Protocols. CSFW 1996: 2-8 |
1995 | ||
14 | Colin Boyd: Cryptography and Coding, 5th IMA Conference, Cirencester, UK, December 18-20, 1995, Proceedings Springer 1995 | |
13 | EE | Colin Boyd: Towards a classification of key agreement protocols. CSFW 1995: 38-43 |
12 | Andrew Smith, Colin Boyd: An Elliptic Curve Analogue of McCurley's Key Agreement Scheme. IMA Conf. 1995: 150-157 | |
1994 | ||
11 | Colin Boyd, Wenbo Mao: Design and Analysis of Key Exchange Protocols via Secure Channel Identification. ASIACRYPT 1994: 171-181 | |
10 | Wenbo Mao, Colin Boyd: Development of Authentication Protocols: Some Misconceptions and a New Approach. CSFW 1994: 178-186 | |
9 | EE | Wenbo Mao, Colin Boyd: On Strengthening Authentication Protocols to Foil Cryptanalysis. ESORICS 1994: 193-204 |
8 | EE | Colin Boyd, Wenbo Mao: Designing Secure Key Exchange Protocols. ESORICS 1994: 93-105 |
1993 | ||
7 | Wenbo Mao, Colin Boyd: Towards Formal Analysis of Security Protocols. CSFW 1993: 147-158 | |
6 | EE | Colin Boyd, Wenbo Mao: On a Limitation of BAN Logic. EUROCRYPT 1993: 240-247 |
5 | Colin Boyd: Security Architectures Using Formal Methods. IEEE Journal on Selected Areas in Communications 11(5): 694-701 (1993) | |
1992 | ||
4 | EE | Colin Boyd: A Formal Framework for Authentication. ESORICS 1992: 273-292 |
1991 | ||
3 | EE | Colin Boyd: Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects. EUROCRYPT 1991: 266-280 |
1989 | ||
2 | EE | Colin Boyd: A New Multiple Key Cipher and an Improved Voting Scheme. EUROCRYPT 1989: 617-625 |
1988 | ||
1 | EE | Colin Boyd: Some Applications of Multiple Key Ciphers. EUROCRYPT 1988: 455-467 |