Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-37 av 37

2017
1 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17); 2017-04-02 - 2017-04-06
NTNU UiB Untitled
 
2016
2 Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander.
Private VNFs for collaborative multi-operator service delivery: An architectural case. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium; 2016-04-25 - 2016-04-29
NTNU Untitled
 
3 Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander.
Private VNFs for collaborative multi-operator service delivery: An architectural case. I: Proceedings of NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. IEEE conference proceedings 2016 ISBN 978-1-5090-0223-8. s. -
NTNU Untitled
 
4 Boyd, Colin Alexander.
Modelling the Security of Key Exchange. Tenth International Conference on Provable Security (ProvSec 2016); 2016-11-10 - 2016-11-12
NTNU Untitled
 
5 Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas.
Key Recovery: Inert, Public, Transparent (KRIPT). Mycrypt 2016: Paradigm-shifting Crypto; 2016-12-01 - 2016-12-02
NTNU Untitled
 
6 Boyd, Colin Alexander; Carr, Christopher.
Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science 2016 ;Volum 9722. s. 161-177
NTNU Untitled
 
7 Boyd, Colin Alexander; Cremers, Cas; Feltz, Michele; Paterson, K; Poettering, Bertram; Stebila, Douglas.
ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security 2016
NTNU Untitled
 
8 Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016 ;Volum 106. s. 17-18
NTNU UiB Untitled
 
9 Boyd, Colin Alexander; Hale, Britta.
Secure Channels and Termination: The Last Word on TLS. Secure Key Exchange and Channel Protocols (SKECH) Workshop 2016; 2016-07-01 - 2016-07-04
NTNU Untitled
 
10 Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas.
A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS. TU-Darmstadt Invited Talk; 2016-04-21 - 2016-04-21
NTNU Untitled
 
11 Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas.
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. I: Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings. Springer 2016 ISBN 978-3-319-29485-8. s. 55-71
NTNU Untitled
 
12 Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas.
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016; 2016-02-29 - 2016-03-04
NTNU Untitled
 
13 Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas.
Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS. COINS Finse Winter School 2016; 2016-04-24 - 2016-04-29
NTNU Untitled
 
14 Radke, Kenneth; Boyd, Colin Alexander.
Security Proofs for Protocols Involving Humans. Computer journal 2016 s. -
NTNU Untitled
 
2015
15 Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander.
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. I: Cryptography and Coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Springer 2015 ISBN 978-3-319-27238-2. s. 277-294
NTNU Untitled
 
16 Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander.
Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science 2015 ;Volum 9496. s. 277-294
NTNU Untitled
 
17 Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander.
Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography and Data Security; 2015-01-26 - 2015-01-30
NTNU Untitled
 
18 Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander.
Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science 2015 ;Volum 8975. s. 86-106
NTNU Untitled
 
19 Boyd, Colin Alexander; Stebila, Douglas; Alawatugoda, Janaka.
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Fifteenth IMA International Conference on Cryptography and Coding; 2015-12-15 - 2015-12-17
NTNU Untitled
 
20 Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander.
Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online 2015 ;Volum 14.(1)
NTNU Untitled
 
21 Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander.
Modelling attacks on self-authentication watermarking. Multimedia tools and applications 2015 s. -
NTNU Untitled
 
22 Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander.
Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing 2015 ;Volum 361. s. 143-152
NTNU Untitled
 
23 Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B..
PassCue: The Shared Cues System in Practice. I: Technology and Practice of Passwords. Springer Publishing Company 2015 ISBN 978-3-319-24192-0. s. 119-137
NTNU Untitled
 
2014
24 Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas.
Continuous After-the-Fact Leakage-Resilient Key Exchange. I: Information Security and Privacy, 19th Australasian Conference, ACISP 2014. Springer 2014 ISBN 978-3-319-08343-8. s. 258-273
NTNU Untitled
 
25 Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas.
Continuous after-the-fact leakage-resilient key exchange. Information Security and Privacy 19th Australasian Conference, ACISP 2014; 2014-07-07 - 2014-07-09
NTNU Untitled
 
26 Albeshri, Aiiad; Boyd, Colin Alexander; Gonzalez Nieto, Juan.
Enhanced GeoProof: improved geographic assurance for data in the cloud. International Journal of Information Security 2014 ;Volum 13.(2) s. 191-198
NTNU Untitled
 
27 Hale, Britta J.; Boyd, Colin Alexander.
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. SSR'14; 2014-12-16 - 2014-12-17
NTNU Untitled
 
28 Hale, Britta J.; Boyd, Colin Alexander.
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. I: Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings. Springer Publishing Company 2014 ISBN 978-3-319-14054-4. s. 236-255
NTNU Untitled
 
29 Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander.
Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing 2014 ;Volum 2014:135. s. -
NTNU Untitled
 
30 Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Bartlett, Harry.
CHURNs: Freshness Assurance for Humans. Computer journal 2014 ;Volum 58.(10) s. 2404-2425
NTNU Untitled
 
31 Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Manulis, Mark; Stebila, Douglas.
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. Australasian Information Security Conference (ACSW-AISC) 2014; 2014-01-20 - 2014-01-23
NTNU Untitled
 
32 Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B..
PassCue: the Shared Cues System in Practice. The 7 th International Conference on Passwords; 2014-12-08 - 2014-12-10
NTNU Untitled
 
33 Seifi, Y; Suriadi, Suriadi; Foo, Ernest; Boyd, Colin Alexander.
Security properties analysis in a TPM-based protocol. International Journal of Security and Networks (IJSN) 2014 ;Volum 9.(2) s. 85-103
NTNU Untitled
 
2013
34 Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh.
Counterfeiting attacks on block-wise dependent fragile watermarking schemes. 6th International Conference on Security of Information and Networks; 2013-11-26 - 2013-11-28
NTNU Untitled
 
35 Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh.
Counterfeiting attacks on block-wise dependent fragile watermarking schemes. I: Proceedings of the 6th International Conference on Security of Information and Networks. Association for Computing Machinery (ACM) 2013 ISBN 978-1-4503-2498-4. s. 86-93
NTNU Untitled
 
36 Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Buys, Laurie.
"Who decides?" Security and Privacy in the Wild. OzCHI 2013; 2013-11-25 - 2013-11-29
NTNU Untitled
 
37 Radke, Kenneth; Boyd, Colin Alexander; Gonzalez Nieto, Juan; Buys, Laurie.
"Who decides?" Security and Privacy in the Wild. I: Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration. ACM Publications 2013 ISBN 978-1-4503-2525-7. s. 27-36
NTNU Untitled