Colin Boyd
Title
Cited by
Cited by
Year
A survey of trust and reputation systems for online service provision
A Jøsang, R Ismail, C Boyd
Decision support systems 43 (2), 618-644, 2007
41792007
Protocols for authentication and key establishment
C Boyd, A Mathuria
Springer Verlag, 2003
866*2003
Digital multisignatures
C Boyd
Cryptography and coding, 241-246, 1986
3281986
Round-optimal contributory conference key agreement
C Boyd, JMG Nieto
International Workshop on Public Key Cryptography, 161-174, 2003
2162003
Examining indistinguishability-based proof models for key establishment protocols
KKR Choo, C Boyd, Y Hitchcock
International Conference on the Theory and Application of Cryptology and …, 2005
1922005
Integrating error detection into arithmetic coding
C Boyd, JG Cleary, SA Irvine, I Rinsma-Melchert, IH Witten
IEEE Transactions on Communications 45 (1), 1-3, 1997
1731997
Towards formal analysis of security protocols
W Mao, C Boyd
[1993] Proceedings Computer Security Foundations Workshop VI, 147-158, 1993
1731993
Providing receipt-freeness in mixnet-based voting protocols
B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo
International conference on information security and cryptology, 245-258, 2003
1672003
Secure key issuing in ID-based cryptography
B Lee, C Boyd, E Dawson, K Kim, J Yang, S Yoo
Proceedings of the second workshop on Australasian information security …, 2004
1662004
Off-line fair payment protocols using convertible signatures
C Boyd, E Foo
International Conference on the Theory and Application of Cryptology and …, 1998
1661998
On a limitation of BAN logic
C Boyd, W Mao
Advances in Cryptology—EUROCRYPT’93, 240-247, 1994
1501994
On key agreement and conference key agreement
C Boyd
Australasian Conference on Information Security and Privacy, 294-302, 1997
1361997
A Guide to Fully Homomorphic Encryption.
F Armknecht, C Boyd, C Carr, K Gjøsteen, A Jäschke, CA Reuter, ...
IACR Cryptol. ePrint Arch. 2015, 1192, 2015
1322015
A review of medical image watermarking requirements for teleradiology
H Nyeem, W Boles, C Boyd
Journal of digital imaging 26 (2), 326-343, 2013
1242013
SKMA-A key management architecture for SCADA systems
R Dawson, C Boyd, E Dawson, J Gonzalez Nieto
ACSW Frontiers 2006: Proceedings of the 4th Australasian Symposium on Grid …, 2006
1222006
A novel identity-based strong designated verifier signature scheme
B Kang, C Boyd, ED Dawson
Journal of Systems and Software 82 (2), 270-273, 2009
1202009
Bach
M Boyd
Oxford University Press, 2006
1182006
Strongly secure certificateless key agreement
G Lippold, C Boyd, JG Nieto
International Conference on Pairing-Based Cryptography, 206-230, 2009
1112009
Efficient one-round key exchange in the standard model
C Boyd, Y Cliff, JG Nieto, KG Paterson
Australasian Conference on Information Security and Privacy, 69-83, 2008
1112008
Key establishment protocols for secure mobile communications: A selective survey
C Boyd, A Mathuria
Australasian Conference on Information Security and Privacy, 344-355, 1998
1111998
The system can't perform the operation now. Try again later.
Articles 1–20