|
 |
English
version
For å registrere i Cristin må du være vitenskapelig eller administrativt ansatt.
|
|
|
|
|
 |
|
|
|
Viser treff 1-50 av 56
|
<< Forrige
1
2
Neste >>
|
2020
|
1. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12170 LNCS. s. 464-493 NTNU
Untitled
|
|
2. |
Boyd, Colin Alexander; Gellert, Kai. A Modern View on Forward Security. Computer journal 2020 s. - NTNU
Untitled
|
|
3. |
Boyd, Colin Alexander; Haines, Thomas Edmund; Rønne, Peter. Vote Selling Resistant Voting. Lecture Notes in Computer Science (LNCS) 2020 NTNU
Untitled
|
|
4. |
Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. Protocols for Authentication and Key Establishment. Springer 2020 (ISBN 978-3-662-58145-2) 521 s. NTNU
Untitled
|
|
5. |
Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Communications Magazine 2020 ;Volum 58.(7) s. 72-77 NTNU
Untitled
|
|
6. |
wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains; 2020-07-20 - 2020-07-21 NTNU
Untitled
|
2019
|
7. |
Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11898. s. 250-270 NTNU
Untitled
|
|
8. |
Boyd, Colin Alexander; Hale, Britta. Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11368. s. 44-65 NTNU
Untitled
|
|
9. |
Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. Towards protected VNFs for multi-operator service delivery. I: Network Softwarization (NetSoft), IEEE Conference on. IEEE conference proceedings 2019 ISBN 978-1-5386-9377-3. s. 19-23 NTNU
Untitled
|
2018
|
10. |
Boyd, Colin Alexander; Carr, Christopher. Valuable Puzzles for Proofs-of-Work. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11025. s. 130-139 NTNU
Untitled
|
|
11. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11060 LNCS. s. 268-285 NTNU
Untitled
|
|
12. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Definitions for Plaintext-Existence Hiding in Cloud Storage. I: ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018. Association for Computing Machinery (ACM) 2018 ISBN 978-1-4503-6448-5. NTNU UiB
Untitled
|
|
13. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11192 LNCS. s. 347-365 NTNU UiB
Untitled
|
|
14. |
Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander. OWASP Top 10 - Do Startups Care?. I: 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Glasgow, Scotland, United Kingdom, 11-12 June 2018. IEEE 2018 ISBN 978-1-5386-4683-0. s. - NTNU SINTEF
Untitled
|
2017
|
15. |
Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17); 2017-04-02 - 2017-04-06 NTNU UiB
Untitled
|
|
16. |
Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. Side channels in deduplication: trade-offs between leakage and efficiency. I: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-4944-4. s. 266-274 NTNU UiB
Untitled
|
|
17. |
Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity; 2017-11-16 NTNU UiB
Untitled
|
|
18. |
Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. Key recovery: Inert and public. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10311 LNCS. s. 111-126 NTNU
Untitled
|
|
19. |
Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas. Bitcoin Unchained. ERCIM News 2017 ;Volum 110. s. 15-16 NTNU
Untitled
|
|
20. |
Boyd, Colin Alexander; Hale, Britta. Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS) 2017 NTNU
Untitled
|
2016
|
21. |
Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. Private VNFs for collaborative multi-operator service delivery: An architectural case. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium; 2016-04-25 - 2016-04-29 NTNU
Untitled
|
|
22. |
Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. Private VNFs for collaborative multi-operator service delivery: An architectural case. I: Proceedings of NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. IEEE conference proceedings 2016 ISBN 978-1-5090-0223-8. s. - NTNU
Untitled
|
|
23. |
Boyd, Colin Alexander. Modelling the Security of Key Exchange. Tenth International Conference on Provable Security (ProvSec 2016); 2016-11-10 - 2016-11-12 NTNU
Untitled
|
|
24. |
Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. Key Recovery: Inert, Public, Transparent (KRIPT). Mycrypt 2016: Paradigm-shifting Crypto; 2016-12-01 - 2016-12-02 NTNU
Untitled
|
|
25. |
Boyd, Colin Alexander; Carr, Christopher. Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science (LNCS) 2016 ;Volum 9722. s. 161-177 NTNU
Untitled
|
|
26. |
Boyd, Colin Alexander; Cremers, Cas; Feltz, Michele; Paterson, K; Poettering, Bertram; Stebila, Douglas. ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security 2016 NTNU
Untitled
|
|
27. |
Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Using Cryptography to Control Your Data at a Distance. ERCIM News 2016 ;Volum 106. s. 17-18 NTNU UiB
Untitled
|
|
28. |
Boyd, Colin Alexander; Hale, Britta. Secure Channels and Termination: The Last Word on TLS. Secure Key Exchange and Channel Protocols (SKECH) Workshop 2016; 2016-07-01 - 2016-07-04 NTNU
Untitled
|
|
29. |
Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS. TU-Darmstadt Invited Talk; 2016-04-21 - 2016-04-21 NTNU
Untitled
|
|
30. |
Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. I: Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings. Springer 2016 ISBN 978-3-319-29485-8. s. 55-71 NTNU
Untitled
|
|
31. |
Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016; 2016-02-29 - 2016-03-04 NTNU
Untitled
|
|
32. |
Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS. COINS Finse Winter School 2016; 2016-04-24 - 2016-04-29 NTNU
Untitled
|
|
33. |
Radke, Kenneth; Boyd, Colin Alexander. Security Proofs for Protocols Involving Humans. Computer journal 2016 s. - NTNU
Untitled
|
2015
|
34. |
Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. I: Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Springer 2015 ISBN 978-3-319-27238-2. s. 277-294 NTNU
Untitled
|
|
35. |
Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science (LNCS) 2015 ;Volum 9496. s. 277-294 NTNU
Untitled
|
|
36. |
Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography and Data Security; 2015-01-26 - 2015-01-30 NTNU
Untitled
|
|
37. |
Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science (LNCS) 2015 ;Volum 8975. s. 86-106 NTNU
Untitled
|
|
38. |
Boyd, Colin Alexander; Stebila, Douglas; Alawatugoda, Janaka. Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Fifteenth IMA International Conference on Cryptography and Coding; 2015-12-15 - 2015-12-17 NTNU
Untitled
|
|
39. |
Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online 2015 ;Volum 14.(1) NTNU
Untitled
|
|
40. |
Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. Modelling attacks on self-authentication watermarking. Multimedia tools and applications 2015 s. - NTNU
Untitled
|
|
41. |
Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing 2015 ;Volum 361. s. 143-152 NTNU
Untitled
|
|
42. |
Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. PassCue: The Shared Cues System in Practice. I: Technology and Practice of Passwords. Springer Publishing Company 2015 ISBN 978-3-319-24192-0. s. 119-137 NTNU
Untitled
|
2014
|
43. |
Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. Continuous After-the-Fact Leakage-Resilient Key Exchange. I: Information Security and Privacy, 19th Australasian Conference, ACISP 2014. Springer 2014 ISBN 978-3-319-08343-8. s. 258-273 NTNU
Untitled
|
|
44. |
Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. Continuous after-the-fact leakage-resilient key exchange. Information Security and Privacy 19th Australasian Conference, ACISP 2014; 2014-07-07 - 2014-07-09 NTNU
Untitled
|
|
45. |
Albeshri, Aiiad; Boyd, Colin Alexander; Gonzalez Nieto, Juan. Enhanced GeoProof: improved geographic assurance for data in the cloud. International Journal of Information Security 2014 ;Volum 13.(2) s. 191-198 NTNU
Untitled
|
|
46. |
Hale, Britta J.; Boyd, Colin Alexander. Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. SSR'14; 2014-12-16 - 2014-12-17 NTNU
Untitled
|
|
47. |
Hale, Britta J.; Boyd, Colin Alexander. Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. I: Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings. Springer Publishing Company 2014 ISBN 978-3-319-14054-4. s. 236-255 NTNU
Untitled
|
|
48. |
Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing 2014 ;Volum 2014:135. s. - NTNU
Untitled
|
|
49. |
Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Bartlett, Harry. CHURNs: Freshness Assurance for Humans. Computer journal 2014 ;Volum 58.(10) s. 2404-2425 NTNU
Untitled
|
|
50. |
Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Manulis, Mark; Stebila, Douglas. Formalising Human Recognition: a Fundamental Building Block for Security Proofs. Australasian Information Security Conference (ACSW-AISC) 2014; 2014-01-20 - 2014-01-23 NTNU
Untitled
|
Vis neste liste
|