Colin Boyd
Colin Boyd
Adresă de e-mail confirmată pe item.ntnu.no
Citat de
Citat de
A survey of trust and reputation systems for online service provision
A Jøsang, R Ismail, C Boyd
Decision support systems 43 (2), 618-644, 2007
Protocols for authentication and key establishment
C Boyd, A Mathuria
Springer Verlag, 2003
Digital multisignatures
C Boyd
Proc. IMA Conf. Crypto. Coding, 1989, 241-246, 1989
A guide to fully homomorphic encryption
F Armknecht, C Boyd, C Carr, K Gjøsteen, A Jäschke, CA Reuter, ...
Cryptology ePrint Archive, 2015
Round-optimal contributory conference key agreement
C Boyd, JMG Nieto
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
Towards formal analysis of security protocols
W Mao, C Boyd
[1993] Proceedings Computer Security Foundations Workshop VI, 147-158, 1993
Examining indistinguishability-based proof models for key establishment protocols
KKR Choo, C Boyd, Y Hitchcock
ASIACRYPT 5, 585-604, 2005
Secure key issuing in ID-based cryptography
B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo
Proceedings of the second workshop on Australasian information security …, 2004
Providing receipt-freeness in mixnet-based voting protocols
B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo
ICISC 3, 245-258, 2003
Integrating error detection into arithmetic coding
C Boyd, JG Cleary, SA Irvine, I Rinsma-Melchert, IH Witten
IEEE Transactions on Communications 45 (1), 1-3, 1997
On a limitation of BAN logic
C Boyd, W Mao
Advances in Cryptology—EUROCRYPT’93, 240-247, 1994
Off-line fair payment protocols using convertible signatures
C Boyd, E Foo
Advances in Cryptology—ASIACRYPT’98: International Conference on the Theory …, 1998
A review of medical image watermarking requirements for teleradiology
H Nyeem, W Boles, C Boyd
Journal of digital imaging 26, 326-343, 2013
On key agreement and conference key agreement
C Boyd
ACISP 97, 294-302, 1997
A novel identity-based strong designated verifier signature scheme
B Kang, C Boyd, ED Dawson
Journal of Systems and Software 82 (2), 270-273, 2009
Strongly secure certificateless key agreement
G Lippold, C Boyd, J Gonzalez Nieto
Pairing-Based Cryptography–Pairing 2009: Third International Conference Palo …, 2009
SKMA: a key management architecture for SCADA systems
R Dawson, C Boyd, E Dawson, JMG Nieto
Proceedings of the 2006 Australasian workshops on Grid computing and e …, 2006
Security-mediated certificateless cryptography
SSM Chow, C Boyd, JMG Nieto
Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006
Efficient one-round key exchange in the standard model
C Boyd, Y Cliff, J Gonzalez Nieto, KG Paterson
Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008
Key establishment protocols for secure mobile communications: A selective survey
C Boyd, A Mathuria
Information Security and Privacy: Third Australasian Conference, ACISP’98 …, 1998
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20