Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-50 av 64 << Forrige 1 2    Neste >>

2023
1 Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise.
Hybrid Group Key Exchange with Application to Constrained Networks. Lecture Notes in Computer Science (LNCS) 2023 ;Volum 14411. s. 455-472
NTNU Untitled
 
2 Boyd, Colin Alexander; Millerjord, Lise; de Kock, Bor.
Modular Design of KEM-Based Authenticated Key Exchange. Lecture Notes in Computer Science (LNCS) 2023 ;Volum 13915. s. 553-579
NTNU Untitled
 
2022
3 Boyd, Colin Alexander.
Key Exchange (Chapter 9). I: Asymmetric Cryptography: Primitives and Protocols. ISTE 2022 ISBN 9781789450965. s. 187-211
NTNU Untitled
 
2021
4 Boyd, Colin Alexander.
Introduction to the Special Issue on TLS 1.3. Journal of Cryptology 2021 ;Volum 34.(3) s. -
NTNU Untitled
 
5 Boyd, Colin Alexander; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise.
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. Lecture Notes in Computer Science (LNCS) 2021 ;Volum 13093. s. 681-710
NTNU Untitled
 
6 Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander.
SafeLib: a practical library for outsourcing stateful network functions securely. I: 7th IEEE International Conference on Network Softwarization, NetSoft 2021. IEEE 2021 ISBN 978-1-6654-0522-5. s. 244-252
NTNU Untitled
 
2020
7 Au, Man Ho; Han, Jinguang; Wu, Qianhong; Boyd, Colin Alexander.
Special Issue on Cryptographic Currency and Blockchain Technology. Future Generation Computer Systems 2020 ;Volum 107. s. 758-759
NTNU Untitled
 
8 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao.
Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12170 LNCS. s. 464-493
NTNU Untitled
 
9 Boyd, Colin Alexander; Gellert, Kai.
A Modern View on Forward Security. Computer journal 2020 s. -
NTNU Untitled
 
10 Boyd, Colin Alexander; Haines, Thomas Edmund; Rønne, Peter.
Vote Selling Resistant Voting. Lecture Notes in Computer Science (LNCS) 2020 s. 345-359
NTNU Untitled
 
11 Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas.
Preface. Information Security and Cryptography (IS&C) 2020 s. VII-IX
NTNU Untitled
 
12 Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas.
Protocols for Authentication and Key Establishment. Springer 2020 (ISBN 978-3-662-58145-2) 521 s.
NTNU Untitled
 
13 Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander.
Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Communications Magazine 2020 ;Volum 58.(7) s. 72-77
NTNU Untitled
 
14 wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander.
A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains; 2020-07-20 - 2020-07-21
NTNU Untitled
 
2019
15 Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund.
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11898. s. 250-270
NTNU Untitled
 
16 Boyd, Colin Alexander; Hale, Britta.
Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11368. s. 44-65
NTNU Untitled
 
17 Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander.
Towards protected VNFs for multi-operator service delivery. I: Network Softwarization (NetSoft), IEEE Conference on. IEEE conference proceedings 2019 ISBN 978-1-5386-9377-3. s. 19-23
NTNU Untitled
 
2018
18 Boyd, Colin Alexander; Carr, Christopher.
Valuable Puzzles for Proofs-of-Work. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11025. s. 130-139
NTNU Untitled
 
19 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao.
Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11060 LNCS. s. 268-285
NTNU Untitled
 
20 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Definitions for plaintext-existence hiding in cloud storage. I: ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018. Association for Computing Machinery (ACM) 2018 ISBN 978-1-4503-6448-5.
UiB NTNU Untitled
 
21 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11192 LNCS. s. 347-365
UiB NTNU Untitled
 
22 Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander.
OWASP Top 10 - Do Startups Care?. I: 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Glasgow, Scotland, United Kingdom, 11-12 June 2018. IEEE (Institute of Electrical and Electronics Engineers) 2018 ISBN 978-1-5386-4683-0. s. -
NTNU SINTEF Untitled
 
2017
23 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17); 2017-04-02 - 2017-04-06
NTNU UiB Untitled
 
24 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. I: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-4944-4. s. 266-274
NTNU UiB Untitled
 
25 Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity; 2017-11-16
NTNU UiB Untitled
 
26 Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas.
Key recovery: Inert and public. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10311 LNCS. s. 111-126
NTNU Untitled
 
27 Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas.
Bitcoin Unchained. ERCIM News 2017 ;Volum 110. s. 15-16
NTNU Untitled
 
28 Boyd, Colin Alexander; Hale, Britta.
Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS) 2017
NTNU Untitled
 
2016
29 Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander.
Private VNFs for collaborative multi-operator service delivery: An architectural case. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium; 2016-04-25 - 2016-04-29
NTNU Untitled
 
30 Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander.
Private VNFs for collaborative multi-operator service delivery: An architectural case. I: Proceedings of NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. IEEE conference proceedings 2016 ISBN 978-1-5090-0223-8. s. -
NTNU Untitled
 
31 Boyd, Colin Alexander.
Modelling the Security of Key Exchange. Tenth International Conference on Provable Security (ProvSec 2016); 2016-11-10 - 2016-11-12
NTNU Untitled
 
32 Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas.
Key Recovery: Inert, Public, Transparent (KRIPT). Mycrypt 2016: Paradigm-shifting Crypto; 2016-12-01 - 2016-12-02
NTNU Untitled
 
33 Boyd, Colin Alexander; Carr, Christopher.
Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9722. s. 161-177
NTNU Untitled
 
34 Boyd, Colin Alexander; Cremers, Cas; Feltz, Michele; Paterson, K; Poettering, Bertram; Stebila, Douglas.
ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security 2016
NTNU Untitled
 
35 Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016 ;Volum 106. s. 17-18
UiB NTNU Untitled
 
36 Boyd, Colin Alexander; Hale, Britta.
Secure Channels and Termination: The Last Word on TLS. Secure Key Exchange and Channel Protocols (SKECH) Workshop 2016; 2016-07-01 - 2016-07-04
NTNU Untitled
 
37 Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas.
A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS. TU-Darmstadt Invited Talk; 2016-04-21 - 2016-04-21
NTNU Untitled
 
38 Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas.
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. I: Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings. Springer 2016 ISBN 978-3-319-29485-8. s. 55-71
NTNU Untitled
 
39 Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas.
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016; 2016-02-29 - 2016-03-04
NTNU Untitled
 
40 Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas.
Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS. COINS Finse Winter School 2016; 2016-04-24 - 2016-04-29
NTNU Untitled
 
41 Radke, Kenneth; Boyd, Colin Alexander.
Security Proofs for Protocols Involving Humans. Computer journal 2016 s. -
NTNU Untitled
 
2015
42 Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander.
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. I: Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Springer 2015 ISBN 978-3-319-27238-2. s. 277-294
NTNU Untitled
 
43 Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander.
Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science (LNCS) 2015 ;Volum 9496. s. 277-294
NTNU Untitled
 
44 Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander.
Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography and Data Security; 2015-01-26 - 2015-01-30
NTNU Untitled
 
45 Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander.
Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science (LNCS) 2015 ;Volum 8975. s. 86-106
NTNU Untitled
 
46 Boyd, Colin Alexander; Stebila, Douglas; Alawatugoda, Janaka.
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Fifteenth IMA International Conference on Cryptography and Coding; 2015-12-15 - 2015-12-17
NTNU Untitled
 
47 Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander.
Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online 2015 ;Volum 14.(1)
NTNU Untitled
 
48 Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander.
Modelling attacks on self-authentication watermarking. Multimedia Tools and Applications 2015 s. -
NTNU Untitled
 
49 Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander.
Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing 2015 ;Volum 361. s. 143-152
NTNU Untitled
 
50 Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B..
PassCue: The Shared Cues System in Practice. I: Technology and Practice of Passwords. Springer Publishing Company 2015 ISBN 978-3-319-24192-0. s. 119-137
NTNU Untitled
 
    Vis neste liste