<?xml version="1.0"?>
<dblpperson name="Colin Boyd" pid="b/ColinBoyd" n="276">
<person key="homepages/b/ColinBoyd" mdate="2024-09-08">
<author pid="b/ColinBoyd">Colin Boyd</author>
<note type="affiliation">Queensland University of Technology, Brisbane, Australia</note>
<url>http://sky.fit.qut.edu.au/~boydc/</url>
<url>https://scholar.google.com/citations?user=CIfBKmMAAAAJ</url>
<url>https://www.wikidata.org/entity/Q21767541</url>
<url>https://id.loc.gov/authorities/names/n95110836</url>
<url>https://d-nb.info/gnd/1036721086</url>
<url>https://dl.acm.org/profile/81100112037</url>
<url>https://mathgenealogy.org/id.php?id=18983</url>
<url>https://zbmath.org/authors/?q=ai:boyd.colin-a</url>
</person>
<r><article key="journals/tnsm/MarkuBB25" mdate="2025-05-09">
<author pid="247/7699">Enio Marku</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-3891-3855" pid="83/2180">Gergely Bicz&#243;k</author>
<title>SafeLib: A Comprehensive Framework for Secure Outsourcing of Network Functions.</title>
<pages>2181-2198</pages>
<year>2025</year>
<month>April</month>
<volume>22</volume>
<journal>IEEE Trans. Netw. Serv. Manag.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TNSM.2024.3520817</ee>
<url>db/journals/tnsm/tnsm22.html#MarkuBB25</url>
<stream>streams/journals/tnsm</stream>
</article>
</r>
<r><inproceedings key="conf/acisp/LiMB25" mdate="2025-07-17">
<author pid="117/8987">Qinyi Li</author>
<author pid="294/0785">Lise Millerjord</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>TEAKEX: TESLA-Authenticated Group Key Exchange.</title>
<pages>289-309</pages>
<year>2025</year>
<booktitle>ACISP (1)</booktitle>
<ee>https://doi.org/10.1007/978-981-96-9095-4_15</ee>
<crossref>conf/acisp/2025</crossref>
<url>db/conf/acisp/acisp2025-1.html#LiMB25</url>
<stream>streams/conf/acisp</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/birthday/BoydSS25" mdate="2025-06-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="s/ReihanehSafaviNaini">Reihaneh Safavi-Naini</author>
<author pid="18/382">Leonie Simpson</author>
<title>Remembering Ed Dawson.</title>
<pages>3-22</pages>
<year>2025</year>
<booktitle>Information Security in a Connected World</booktitle>
<ee>https://doi.org/10.1007/978-3-031-83490-5_1</ee>
<crossref>conf/birthday/dawson2025</crossref>
<url>db/conf/birthday/dawson2025.html#BoydSS25</url>
</inproceedings>
</r>
<r><proceedings key="conf/birthday/dawson2025" mdate="2025-06-11">
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<editor orcid="0000-0002-1697-3590" pid="s/ReihanehSafaviNaini">Reihaneh Safavi-Naini</editor>
<editor orcid="0000-0001-8434-9741" pid="18/382">Leonie Simpson</editor>
<title>Information Security in a Connected World - Celebrating the Life and Work of Ed Dawson</title>
<booktitle>Information Security in a Connected World</booktitle>
<publisher>Springer</publisher>
<year>2025</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>15600</volume>
<isbn>978-3-031-83489-9</isbn>
<isbn>978-3-031-83490-5</isbn>
<ee>https://doi.org/10.1007/978-3-031-83490-5</ee>
<url>db/conf/birthday/dawson2025.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/LiMB25" mdate="2025-06-27">
<author pid="117/8987">Qinyi Li</author>
<author pid="294/0785">Lise Millerjord</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>TEAKEX: TESLA-Authenticated Group Key Exchange.</title>
<pages>1005</pages>
<year>2025</year>
<volume>2025</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2025/1005</ee>
<url>db/journals/iacr/iacr2025.html#LiMB25</url>
<stream>streams/journals/iacr</stream>
</article>
</r>
<r><inproceedings key="conf/acisp/BoydKM23" mdate="2023-06-21">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="275/3369">Bor de Kock</author>
<author pid="294/0785">Lise Millerjord</author>
<title>Modular Design of KEM-Based Authenticated Key Exchange.</title>
<pages>553-579</pages>
<year>2023</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-031-35486-1_24</ee>
<crossref>conf/acisp/2023</crossref>
<url>db/conf/acisp/acisp2023.html#BoydKM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/BoydFGM23" mdate="2023-12-09">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="360/1121">Elsie Mestl Fondevik</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author pid="294/0785">Lise Millerjord</author>
<title>Hybrid Group Key Exchange with Application to Constrained Networks.</title>
<pages>455-472</pages>
<year>2023</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-031-49187-0_23</ee>
<crossref>conf/isw/2023</crossref>
<url>db/conf/isw/isc2023.html#BoydFGM23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BoydKM23" mdate="2023-02-28">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="275/3369">Bor de Kock</author>
<author pid="294/0785">Lise Millerjord</author>
<title>Modular Design of KEM-Based Authenticated Key Exchange.</title>
<pages>167</pages>
<year>2023</year>
<volume>2023</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2023/167</ee>
<url>db/journals/iacr/iacr2023.html#BoydKM23</url>
</article>
</r>
<r><article key="journals/cj/BoydG21" mdate="2023-08-28">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0003-0985-7265" pid="237/1554">Kai Gellert</author>
<title>A Modern View on Forward Security.</title>
<pages>639-652</pages>
<year>2021</year>
<volume>64</volume>
<journal>Comput. J.</journal>
<number>4</number>
<ee>https://doi.org/10.1093/comjnl/bxaa104</ee>
<ee>https://www.wikidata.org/entity/Q115000217</ee>
<url>db/journals/cj/cj64.html#BoydG21</url>
</article>
</r>
<r><article key="journals/joc/Boyd21" mdate="2021-07-23">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Introduction to the Special Issue on TLS 1.3.</title>
<pages>24</pages>
<year>2021</year>
<volume>34</volume>
<journal>J. Cryptol.</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.1007/s00145-021-09386-z</ee>
<url>db/journals/joc/joc34.html#Boyd21</url>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/BoydDKGJM21" mdate="2022-10-02">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-5935-5725" pid="134/7582">Gareth T. Davies</author>
<author orcid="0000-0003-3143-4381" pid="275/3369">Bor de Kock</author>
<author orcid="0000-0003-0985-7265" pid="237/1554">Kai Gellert</author>
<author pid="53/1548">Tibor Jager</author>
<author orcid="0000-0002-4839-0568" pid="294/0785">Lise Millerjord</author>
<title>Symmetric Key Exchange with Full Forward Security and Robust Synchronization.</title>
<pages>681-710</pages>
<year>2021</year>
<booktitle>ASIACRYPT (4)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-92068-5_23</ee>
<crossref>conf/asiacrypt/2021-4</crossref>
<url>db/conf/asiacrypt/asiacrypt2021-4.html#BoydDKGJM21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/netsoft/MarkuBB21" mdate="2022-04-09">
<author pid="247/7699">Enio Marku</author>
<author orcid="0000-0002-3891-3855" pid="83/2180">Gergely Bicz&#243;k</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>SafeLib: a practical library for outsourcing stateful network functions securely.</title>
<pages>244-252</pages>
<year>2021</year>
<booktitle>NetSoft</booktitle>
<ee>https://doi.org/10.1109/NetSoft51509.2021.9492579</ee>
<crossref>conf/netsoft/2021</crossref>
<url>db/conf/netsoft/netsoft2021.html#MarkuBB21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BoydDKGJM21" mdate="2021-06-07">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="134/7582">Gareth T. Davies</author>
<author pid="275/3369">Bor de Kock</author>
<author pid="237/1554">Kai Gellert</author>
<author pid="53/1548">Tibor Jager</author>
<author pid="294/0785">Lise Millerjord</author>
<title>Symmetric Key Exchange with Full Forward Security and Robust Synchronization.</title>
<pages>702</pages>
<year>2021</year>
<volume>2021</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2021/702</ee>
<url>db/journals/iacr/iacr2021.html#BoydDKGJM21</url>
</article>
</r>
<r><book key="series/isc/BoydMS20" mdate="2024-05-07">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="54/5482">Anish Mathuria</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<title>Protocols for Authentication and Key Establishment, Second Edition</title>
<publisher>Springer</publisher>
<year>2020</year>
<pages>1-440</pages>
<series href="db/series/isc/index.html">Information Security and Cryptography</series>
<isbn>978-3-662-58145-2</isbn>
<ee>https://doi.org/10.1007/978-3-662-58146-9</ee>
</book>
</r>
<r><article key="journals/cm/MarkuBB20" mdate="2022-04-09">
<author pid="247/7699">Enio Marku</author>
<author orcid="0000-0002-3891-3855" pid="83/2180">Gergely Bicz&#243;k</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions.</title>
<pages>72-77</pages>
<year>2020</year>
<volume>58</volume>
<journal>IEEE Commun. Mag.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/MCOM.001.1900724</ee>
<url>db/journals/cm/cm58.html#MarkuBB20</url>
</article>
</r>
<r><article key="journals/fgcs/AuHWB20" mdate="2023-08-28">
<author pid="55/24">Man Ho Au</author>
<author pid="77/9673">Jinguang Han</author>
<author pid="54/7015">Qianhong Wu</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Special Issue on Cryptographic Currency and Blockchain Technology.</title>
<pages>758-759</pages>
<year>2020</year>
<volume>107</volume>
<journal>Future Gener. Comput. Syst.</journal>
<ee>https://doi.org/10.1016/j.future.2019.06.001</ee>
<ee>https://www.wikidata.org/entity/Q114848502</ee>
<url>db/journals/fgcs/fgcs107.html#AuHWB20</url>
</article>
</r>
<r><inproceedings key="conf/cav/BoydGW20" mdate="2020-12-15">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author pid="85/3231">Shuang Wu</author>
<title>A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract.</title>
<pages>5:1-5:13</pages>
<year>2020</year>
<booktitle>FMBC@CAV</booktitle>
<ee type="oa">https://doi.org/10.4230/OASIcs.FMBC.2020.5</ee>
<crossref>conf/cav/2020fmbc</crossref>
<url>db/conf/cav/fmbc2020.html#BoydGW20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/BoydDGJ20" mdate="2023-06-26">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-5935-5725" pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author orcid="0000-0002-3083-5055" pid="305/9012">Yao Jiang 0001</author>
<title>Fast and Secure Updatable Encryption.</title>
<pages>464-493</pages>
<year>2020</year>
<booktitle>CRYPTO (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-030-56784-2_16</ee>
<crossref>conf/crypto/2020-1</crossref>
<url>db/conf/crypto/crypto2020-1.html#BoydDGJ20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fc/BoydHR20" mdate="2022-01-03">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="175/6283">Thomas Haines</author>
<author orcid="0000-0002-2785-8301" pid="172/4084">Peter B. R&#248;nne</author>
<title>Vote Selling Resistant Voting.</title>
<pages>345-359</pages>
<year>2020</year>
<booktitle>Financial Cryptography Workshops</booktitle>
<ee>https://doi.org/10.1007/978-3-030-54455-3_25</ee>
<crossref>conf/fc/2020w</crossref>
<url>db/conf/fc/fc2020w.html#BoydHR20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/BoydGGH19" mdate="2019-12-12">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author pid="136/9900">Cl&#233;mentine Gritti</author>
<author pid="175/6283">Thomas Haines</author>
<title>A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks.</title>
<pages>250-270</pages>
<year>2019</year>
<booktitle>INDOCRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-030-35423-7_13</ee>
<crossref>conf/indocrypt/2019</crossref>
<url>db/conf/indocrypt/indocrypt2019.html#BoydGGH19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/netsoft/MarkuBB19" mdate="2022-04-09">
<author pid="247/7699">Enio Marku</author>
<author orcid="0000-0002-3891-3855" pid="83/2180">Gergely Bicz&#243;k</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Towards protected VNFs for multi-operator service delivery.</title>
<pages>19-23</pages>
<year>2019</year>
<booktitle>NetSoft</booktitle>
<ee>https://doi.org/10.1109/NETSOFT.2019.8806681</ee>
<crossref>conf/netsoft/2019</crossref>
<url>db/conf/netsoft/netsoft2019.html#MarkuBB19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BoydG19" mdate="2020-05-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="237/1554">Kai Gellert</author>
<title>A Modern View on Forward Security.</title>
<pages>1362</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/1362</ee>
<url>db/journals/iacr/iacr2019.html#BoydG19</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BoydDGJ19" mdate="2023-06-26">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author pid="305/9012">Yao Jiang 0001</author>
<title>RISE and SHINE: Fast and Secure Updatable Encryption.</title>
<pages>1457</pages>
<year>2019</year>
<volume>2019</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2019/1457</ee>
<url>db/journals/iacr/iacr2019.html#BoydDGJ19</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/BoydDGRT18" mdate="2020-06-15">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-5935-5725" pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author orcid="0000-0001-9779-5986" pid="03/5363">H&#229;vard Raddum</author>
<author orcid="0000-0002-3769-5307" pid="71/4184">Mohsen Toorani</author>
<title>Definitions for Plaintext-Existence Hiding in Cloud Storage.</title>
<pages>41:1-41:7</pages>
<year>2018</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1145/3230833.3234515</ee>
<crossref>conf/IEEEares/2018</crossref>
<url>db/conf/IEEEares/ares2018.html#BoydDGRT18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cybersecpods/SohoelJB18" mdate="2018-12-11">
<author pid="231/4668">Halldis Sohoel</author>
<author pid="66/3035">Martin Gilje Jaatun</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>OWASP Top 10 - Do Startups Care?</title>
<pages>1-8</pages>
<year>2018</year>
<booktitle>Cyber Security</booktitle>
<ee>https://doi.org/10.1109/CyberSecPODS.2018.8560666</ee>
<crossref>conf/cybersecpods/2018</crossref>
<url>db/conf/cybersecpods/cybersecpods2018.html#SohoelJB18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BoydC18" mdate="2018-09-07">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="170/3527">Christopher Carr</author>
<title>Valuable Puzzles for Proofs-of-Work.</title>
<pages>130-139</pages>
<year>2018</year>
<booktitle>DPM/CBT@ESORICS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-00305-0_10</ee>
<crossref>conf/esorics/2018dpm</crossref>
<url>db/conf/esorics/dpm2018.html#BoydC18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/BoydDGJ18" mdate="2023-06-26">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-5935-5725" pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author orcid="0000-0002-3083-5055" pid="305/9012">Yao Jiang 0001</author>
<title>Offline Assisted Group Key Exchange.</title>
<pages>268-285</pages>
<year>2018</year>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-99136-8_15</ee>
<crossref>conf/isw/2018</crossref>
<url>db/conf/isw/isc2018.html#BoydDGJ18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/provsec/BoydDGRT18" mdate="2020-09-05">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-5935-5725" pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author orcid="0000-0001-9779-5986" pid="03/5363">H&#229;vard Raddum</author>
<author orcid="0000-0002-3769-5307" pid="71/4184">Mohsen Toorani</author>
<title>Security Notions for Cloud Storage and Deduplication.</title>
<pages>347-365</pages>
<year>2018</year>
<booktitle>ProvSec</booktitle>
<ee>https://doi.org/10.1007/978-3-030-01446-9_20</ee>
<crossref>conf/provsec/2018</crossref>
<url>db/conf/provsec/provsec2018.html#BoydDGRT18</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BoydDGJ18" mdate="2023-06-26">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author pid="305/9012">Yao Jiang 0001</author>
<title>Offline Assisted Group Key Exchange.</title>
<pages>114</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2018/114</ee>
<url>db/journals/iacr/iacr2018.html#BoydDGJ18</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BoydDGRT18" mdate="2020-05-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author pid="03/5363">H&#229;vard Raddum</author>
<author pid="71/4184">Mohsen Toorani</author>
<title>Definitions for Plaintext-Existence Hiding in Cloud Storage.</title>
<pages>748</pages>
<year>2018</year>
<volume>2018</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">https://eprint.iacr.org/2018/748</ee>
<url>db/journals/iacr/iacr2018.html#BoydDGRT18</url>
</article>
</r>
<r><article key="journals/cj/RadkeB17" mdate="2023-08-28">
<author pid="85/9240">Kenneth Radke</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Security Proofs for Protocols Involving Humans.</title>
<pages>527-540</pages>
<year>2017</year>
<volume>60</volume>
<journal>Comput. J.</journal>
<number>4</number>
<ee>https://doi.org/10.1093/comjnl/bxw066</ee>
<ee>https://www.wikidata.org/entity/Q113820452</ee>
<url>db/journals/cj/cj60.html#RadkeB17</url>
</article>
</r>
<r><article key="journals/ijisec/BoydCFPPS17" mdate="2024-05-07">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="17/2282">Cas Cremers</author>
<author pid="59/10309">Mich&#232;le Feltz</author>
<author pid="39/780">Kenneth G. Paterson</author>
<author pid="48/8243">Bertram Poettering</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<title>ASICS: authenticated key exchange security incorporating certification systems.</title>
<pages>151-171</pages>
<year>2017</year>
<volume>16</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10207-015-0312-y</ee>
<url>db/journals/ijisec/ijisec16.html#BoydCFPPS17</url>
</article>
</r>
<r><inproceedings key="conf/ccs/ArmknechtBDGT17" mdate="2024-10-06">
<author orcid="0009-0003-9935-8095" pid="65/6856">Frederik Armknecht</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-5935-5725" pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author orcid="0000-0002-3769-5307" pid="71/4184">Mohsen Toorani</author>
<title>Side Channels in Deduplication: Trade-offs between Leakage and Efficiency.</title>
<pages>266-274</pages>
<year>2017</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/3052973.3053019</ee>
<crossref>conf/ccs/2017asia</crossref>
<url>db/conf/ccs/asiaccs2017.html#ArmknechtBDGT17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/latincrypt/BoydH17" mdate="2020-10-25">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0003-1131-2109" pid="167/7329">Britta Hale</author>
<title>Secure Channels and Termination: The Last Word on TLS.</title>
<pages>44-65</pages>
<year>2017</year>
<booktitle>LATINCRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-030-25283-0_3</ee>
<crossref>conf/latincrypt/2017</crossref>
<url>db/conf/latincrypt/latincrypt2017.html#BoydH17</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/ercim/CarrBBH17" mdate="2019-05-22">
<author pid="170/3527">Christopher Carr</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="53/4957">Xavier Boyen</author>
<author pid="175/6283">Thomas Haines</author>
<title>Bitcoin Unchained.</title>
<year>2017</year>
<volume>2017</volume>
<journal>ERCIM News</journal>
<number>110</number>
<ee type="oa">https://ercim-news.ercim.eu/en110/special/bitcoin-unchained</ee>
<url>db/journals/ercim/ercim2017.html#CarrBBH17</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BoydBCH17" mdate="2020-05-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="53/4957">Xavier Boyen</author>
<author pid="170/3527">Christopher Carr</author>
<author pid="175/6283">Thomas Haines</author>
<title>Key Recovery: Inert and Public.</title>
<pages>243</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/243</ee>
<url>db/journals/iacr/iacr2017.html#BoydBCH17</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BoydH17" mdate="2020-05-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="167/7329">Britta Hale</author>
<title>Secure Channels and Termination: The Last Word on TLS.</title>
<pages>784</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/784</ee>
<url>db/journals/iacr/iacr2017.html#BoydH17</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BoydDGTR17" mdate="2020-05-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author pid="71/4184">Mohsen Toorani</author>
<author pid="03/5363">H&#229;vard Raddum</author>
<title>Security notions for cloud storage and deduplication.</title>
<pages>1208</pages>
<year>2017</year>
<volume>2017</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2017/1208</ee>
<url>db/journals/iacr/iacr2017.html#BoydDGTR17</url>
</article>
</r>
<r><article key="journals/mta/NyeemBB16" mdate="2020-05-11">
<author orcid="0000-0003-4839-5059" pid="04/10772">Hussain Nyeem</author>
<author orcid="0000-0002-5093-2952" pid="58/1014">Wageeh W. Boles</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Modelling attacks on self-authentication watermarking.</title>
<pages>15849-15880</pages>
<year>2016</year>
<volume>75</volume>
<journal>Multim. Tools Appl.</journal>
<number>23</number>
<ee>https://doi.org/10.1007/s11042-015-2893-x</ee>
<url>db/journals/mta/mta75.html#NyeemBB16</url>
</article>
</r>
<r><inproceedings key="conf/acisp/BoydC16" mdate="2022-08-16">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="170/3527">Christopher Carr</author>
<title>Fair Client Puzzles from the Bitcoin Blockchain.</title>
<pages>161-177</pages>
<year>2016</year>
<booktitle>ACISP (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-40253-6_10</ee>
<ee>https://www.wikidata.org/entity/Q111689753</ee>
<crossref>conf/acisp/2016-1</crossref>
<url>db/conf/acisp/acisp2016-1.html#BoydC16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ctrsa/BoydHMS16" mdate="2024-05-07">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0003-1131-2109" pid="167/7329">Britta Hale</author>
<author orcid="0000-0002-9940-6080" pid="67/4994">Stig Frode Mj&#248;lsnes</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<title>From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.</title>
<pages>55-71</pages>
<year>2016</year>
<booktitle>CT-RSA</booktitle>
<ee>https://doi.org/10.1007/978-3-319-29485-8_4</ee>
<crossref>conf/ctrsa/2016</crossref>
<url>db/conf/ctrsa/ctrsa2016.html#BoydHMS16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mycrypt/BoydBCH16" mdate="2017-07-14">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="53/4957">Xavier Boyen</author>
<author pid="170/3527">Christopher Carr</author>
<author pid="175/6283">Thomas Haines</author>
<title>Key Recovery: Inert and Public.</title>
<pages>111-126</pages>
<year>2016</year>
<booktitle>Mycrypt</booktitle>
<ee>https://doi.org/10.1007/978-3-319-61273-7_6</ee>
<crossref>conf/mycrypt/2016</crossref>
<url>db/conf/mycrypt/mycrypt2016.html#BoydBCH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/noms/BiczokSBB16" mdate="2022-04-09">
<author orcid="0000-0002-3891-3855" pid="83/2180">Gergely Bicz&#243;k</author>
<author orcid="0000-0002-4640-388X" pid="23/1820">Bal&#225;zs Sonkoly</author>
<author pid="143/3657">Nikolett Bereczky</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Private VNFs for collaborative multi-operator service delivery: An architectural case.</title>
<pages>1249-1252</pages>
<year>2016</year>
<booktitle>NOMS</booktitle>
<ee>https://doi.org/10.1109/NOMS.2016.7502996</ee>
<crossref>conf/noms/2016</crossref>
<url>db/conf/noms/noms2016.html#BiczokSBB16</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/ercim/BoydDGRT16" mdate="2019-05-22">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author pid="03/5363">H&#229;vard Raddum</author>
<author pid="71/4184">Mohsen Toorani</author>
<title>Using Cryptography to Control Your Data at a Distance.</title>
<year>2016</year>
<volume>2016</volume>
<journal>ERCIM News</journal>
<number>106</number>
<ee type="oa">http://ercim-news.ercim.eu/en106/special/using-cryptography-to-control-your-data-at-a-distance</ee>
<url>db/journals/ercim/ercim2016.html#BoydDGRT16</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BoydC16" mdate="2020-05-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="170/3527">Christopher Carr</author>
<title>Fair Client Puzzles from the Bitcoin Blockchain.</title>
<pages>680</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/680</ee>
<url>db/journals/iacr/iacr2016.html#BoydC16</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ArmknechtBDGT16" mdate="2020-05-11">
<author pid="65/6856">Frederik Armknecht</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="134/7582">Gareth T. Davies</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author pid="71/4184">Mohsen Toorani</author>
<title>Side channels in deduplication: trade-offs between leakage and efficiency.</title>
<pages>977</pages>
<year>2016</year>
<volume>2016</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2016/977</ee>
<url>db/journals/iacr/iacr2016.html#ArmknechtBDGT16</url>
</article>
</r>
<r><article key="journals/cj/RadkeBNB15" mdate="2020-03-27">
<author pid="85/9240">Kenneth Radke</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0003-4347-0144" pid="30/9862">Harry Bartlett</author>
<title>CHURNs: Freshness Assurance for Humans.</title>
<pages>2404-2425</pages>
<year>2015</year>
<volume>58</volume>
<journal>Comput. J.</journal>
<number>10</number>
<ee>https://doi.org/10.1093/comjnl/bxu073</ee>
<url>db/journals/cj/cj58.html#RadkeBNB15</url>
</article>
</r>
<r><article key="journals/ijisec/SeifiSFB15" mdate="2022-06-23">
<author pid="146/1947">Younes Seifi</author>
<author pid="73/3463">Suriadi Suriadi</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Analysis of two authorization protocols using Colored Petri Nets.</title>
<pages>221-247</pages>
<year>2015</year>
<volume>14</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10207-014-0243-z</ee>
<url>db/journals/ijisec/ijisec14.html#SeifiSFB15</url>
</article>
</r>
<r><article key="journals/scn/AsaarSB15" mdate="2020-09-10">
<author pid="86/6866">Maryam Rajabzadeh Asaar</author>
<author pid="72/252">Mahmoud Salmasizadeh</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Identity-based proxy signatures: a generic construction and a concrete scheme from RSA.</title>
<pages>3602-3614</pages>
<year>2015</year>
<volume>8</volume>
<journal>Secur. Commun. Networks</journal>
<number>18</number>
<ee>https://doi.org/10.1002/sec.1284</ee>
<url>db/journals/scn/scn8.html#AsaarSB15</url>
</article>
</r>
<r><inproceedings key="conf/fc/AlawatugodaSB15" mdate="2024-05-07">
<author orcid="0000-0001-9431-5836" pid="142/1668-1">Janaka Alawatugoda 0001</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Protecting Encrypted Cookies from Compression Side-Channel Attacks.</title>
<pages>86-106</pages>
<year>2015</year>
<booktitle>Financial Cryptography</booktitle>
<ee>https://doi.org/10.1007/978-3-662-47854-7_6</ee>
<crossref>conf/fc/2015</crossref>
<url>db/conf/fc/fc2015.html#AlawatugodaSB15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ima/AlawatugodaSB15" mdate="2024-05-07">
<author orcid="0000-0001-9431-5836" pid="142/1668-1">Janaka Alawatugoda 0001</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange.</title>
<pages>277-294</pages>
<year>2015</year>
<booktitle>IMACC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-27239-9_17</ee>
<crossref>conf/ima/2015</crossref>
<url>db/conf/ima/ima2015.html#AlawatugodaSB15</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/AlawatugodaBS15" mdate="2023-01-25">
<author pid="142/1668-1">Janaka Alawatugoda 0001</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="67/675">Douglas Stebila</author>
<title>Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange.</title>
<pages>335</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/335</ee>
<url>db/journals/iacr/iacr2015.html#AlawatugodaBS15</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/PavlovskiB15" mdate="2020-05-11">
<author pid="89/2732">Chris Pavlovski</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Microcash: Efficient Off-Line Small Payments.</title>
<pages>635</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/635</ee>
<url>db/journals/iacr/iacr2015.html#PavlovskiB15</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/BoydHMS15" mdate="2020-05-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="167/7329">Britta Hale</author>
<author pid="67/4994">Stig Frode Mj&#248;lsnes</author>
<author pid="67/675">Douglas Stebila</author>
<title>From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.</title>
<pages>1150</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/1150</ee>
<url>db/journals/iacr/iacr2015.html#BoydHMS15</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ArmknechtBCGJRS15" mdate="2020-05-11">
<author pid="65/6856">Frederik Armknecht</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="170/3527">Christopher Carr</author>
<author pid="90/4628">Kristian Gj&#248;steen</author>
<author pid="174/0742">Angela J&#228;schke</author>
<author pid="119/1064">Christian A. Reuter</author>
<author pid="130/8671-1">Martin Strand 0001</author>
<title>A Guide to Fully Homomorphic Encryption.</title>
<pages>1192</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/1192</ee>
<url>db/journals/iacr/iacr2015.html#ArmknechtBCGJRS15</url>
</article>
</r>
<r><article key="journals/cj/NgoBN14" mdate="2017-05-20">
<author pid="60/266">Long Ngo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Automated Proofs for Computational Indistinguishability.</title>
<pages>1513-1536</pages>
<year>2014</year>
<volume>57</volume>
<journal>Comput. J.</journal>
<number>10</number>
<ee>https://doi.org/10.1093/comjnl/bxt078</ee>
<url>db/journals/cj/cj57.html#NgoBN14</url>
</article>
</r>
<r><article key="journals/ejasp/NyeemBB14" mdate="2020-03-12">
<author orcid="0000-0003-4839-5059" pid="04/10772">Hussain Nyeem</author>
<author orcid="0000-0002-5093-2952" pid="58/1014">Wageeh W. Boles</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Digital image watermarking: its formal model, fundamental properties and possible attacks.</title>
<pages>135</pages>
<year>2014</year>
<volume>2014</volume>
<journal>EURASIP J. Adv. Signal Process.</journal>
<ee type="oa">https://doi.org/10.1186/1687-6180-2014-135</ee>
<ee>https://www.wikidata.org/entity/Q59321161</ee>
<url>db/journals/ejasp/ejasp2014.html#NyeemBB14</url>
</article>
</r>
<r><article key="journals/ijisec/AlbeshriBN14" mdate="2023-08-28">
<author orcid="0000-0003-3796-0294" pid="44/8558">Aiiad Albeshri</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Enhanced GeoProof: improved geographic assurance for data in the cloud.</title>
<pages>191-198</pages>
<year>2014</year>
<volume>13</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10207-013-0217-6</ee>
<ee>https://www.wikidata.org/entity/Q115147864</ee>
<url>db/journals/ijisec/ijisec13.html#AlbeshriBN14</url>
</article>
</r>
<r><article key="journals/ijsn/SeifiSFB14" mdate="2022-06-23">
<author pid="146/1947">Younes Seifi</author>
<author pid="73/3463">Suriadi Suriadi</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Security properties analysis in a TPM-based protocol.</title>
<pages>85-103</pages>
<year>2014</year>
<volume>9</volume>
<journal>Int. J. Secur. Networks</journal>
<number>2</number>
<ee>https://doi.org/10.1504/IJSN.2014.060742</ee>
<url>db/journals/ijsn/ijsn9.html#SeifiSFB14</url>
</article>
</r>
<r><inproceedings key="conf/acisp/AlawatugodaBS14" mdate="2024-05-07">
<author orcid="0000-0001-9431-5836" pid="142/1668-1">Janaka Alawatugoda 0001</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<title>Continuous After-the-Fact Leakage-Resilient Key Exchange.</title>
<pages>258-273</pages>
<year>2014</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-319-08344-5_17</ee>
<crossref>conf/acisp/2014</crossref>
<url>db/conf/acisp/acisp2014.html#AlawatugodaBS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/auisc/RadkeBNMS14" mdate="2019-07-25">
<author pid="85/9240">Kenneth Radke</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juanma Gonz&#225;lez Nieto</author>
<author pid="62/484">Mark Manulis</author>
<author pid="67/675">Douglas Stebila</author>
<title>Formalising Human Recognition: a Fundamental Building Block for Security Proofs.</title>
<pages>37-45</pages>
<year>2014</year>
<booktitle>AISC</booktitle>
<ee>http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV149Radke.html</ee>
<crossref>conf/auisc/2014</crossref>
<url>db/conf/auisc/auisc2014.html#RadkeBNMS14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/AlawatugodaSB14" mdate="2025-01-19">
<author orcid="0000-0001-9431-5836" pid="142/1668-1">Janaka Alawatugoda 0001</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Modelling after-the-fact leakage for key exchange.</title>
<pages>207-216</pages>
<year>2014</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/2590296.2590317</ee>
<ee>https://www.wikidata.org/entity/Q130957564</ee>
<crossref>conf/ccs/2014asia</crossref>
<url>db/conf/ccs/asiaccs2014.html#AlawatugodaSB14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/passwords/SandvollBL14" mdate="2017-05-25">
<author pid="169/8023">Mats Sandvoll</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="06/5507">Bj&#248;rn B. Larsen</author>
<title>PassCue: The Shared Cues System in Practice.</title>
<pages>119-137</pages>
<year>2014</year>
<booktitle>PASSWORDS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-24192-0_8</ee>
<crossref>conf/passwords/2014</crossref>
<url>db/conf/passwords/passwords2014.html#SandvollBL14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secsr/HaleB14" mdate="2020-10-25">
<author orcid="0000-0003-1131-2109" pid="167/7329">Britta Hale</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.</title>
<pages>236-255</pages>
<year>2014</year>
<booktitle>SSR</booktitle>
<ee>https://doi.org/10.1007/978-3-319-14054-4_14</ee>
<crossref>conf/secsr/2014</crossref>
<url>db/conf/secsr/ssr2014.html#HaleB14</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/AlawatugodaSB14" mdate="2023-01-25">
<author pid="142/1668-1">Janaka Alawatugoda 0001</author>
<author pid="67/675">Douglas Stebila</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Modelling After-the-fact Leakage for Key Exchange.</title>
<pages>131</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/131</ee>
<url>db/journals/iacr/iacr2014.html#AlawatugodaSB14</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/AlawatugodaBS14" mdate="2023-01-25">
<author pid="142/1668-1">Janaka Alawatugoda 0001</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="67/675">Douglas Stebila</author>
<title>Continuous After-the-fact Leakage-Resilient Key Exchange (full version).</title>
<pages>264</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/264</ee>
<url>db/journals/iacr/iacr2014.html#AlawatugodaBS14</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/AlawatugodaSB14a" mdate="2023-01-25">
<author pid="142/1668-1">Janaka Alawatugoda 0001</author>
<author pid="67/675">Douglas Stebila</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Protecting Encrypted Cookies from Compression Side-Channel Attacks.</title>
<pages>724</pages>
<year>2014</year>
<volume>2014</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2014/724</ee>
<url>db/journals/iacr/iacr2014.html#AlawatugodaSB14a</url>
</article>
</r>
<r><article key="journals/jdi/NyeemBB13" mdate="2020-07-09">
<author orcid="0000-0003-4839-5059" pid="04/10772">Hussain Nyeem</author>
<author orcid="0000-0002-5093-2952" pid="58/1014">Wageeh W. Boles</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>A Review of Medical Image Watermarking Requirements for Teleradiology.</title>
<pages>326-343</pages>
<year>2013</year>
<volume>26</volume>
<journal>J. Digit. Imaging</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10278-012-9527-x</ee>
<ee>https://www.wikidata.org/entity/Q36685642</ee>
<url>db/journals/jdi/jdi26.html#NyeemBB13</url>
</article>
</r>
<r><article key="journals/jicce/Boyd13" mdate="2021-02-16">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Cryptography in the Cloud: Advances and Challenges.</title>
<pages>17-23</pages>
<year>2013</year>
<volume>11</volume>
<journal>J. Inform. and Commun. Convergence Engineering</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.6109/jicce.2013.11.1.017</ee>
<url>db/journals/jicce/jicce11.html#Boyd13</url>
</article>
</r>
<r><article key="journals/scn/SunBN13" mdate="2023-10-21">
<author pid="30/7002">Dongdong Sun</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Predicate encryption for multi-inner-products.</title>
<pages>325-339</pages>
<year>2013</year>
<volume>6</volume>
<journal>Secur. Commun. Networks</journal>
<number>3</number>
<ee>https://doi.org/10.1002/sec.566</ee>
<ee>https://www.wikidata.org/entity/Q121891995</ee>
<url>db/journals/scn/scn6.html#SunBN13</url>
</article>
</r>
<r><inproceedings key="conf/dicta/NyeemBB13" mdate="2018-11-02">
<author orcid="0000-0003-4839-5059" pid="04/10772">Hussain Nyeem</author>
<author orcid="0000-0002-5093-2952" pid="58/1014">Wageeh W. Boles</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Utilizing Least Significant Bit-Planes of RONI Pixels for Medical Image Watermarking.</title>
<pages>1-8</pages>
<year>2013</year>
<booktitle>DICTA</booktitle>
<ee>https://doi.org/10.1109/DICTA.2013.6691538</ee>
<crossref>conf/dicta/2013</crossref>
<url>db/conf/dicta/dicta2013.html#NyeemBB13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BoydCFPPS13" mdate="2024-05-07">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="17/2282">Cas Cremers</author>
<author pid="59/10309">Mich&#232;le Feltz</author>
<author pid="39/780">Kenneth G. Paterson</author>
<author pid="48/8243">Bertram Poettering</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<title>ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.</title>
<pages>381-399</pages>
<year>2013</year>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-40203-6_22</ee>
<crossref>conf/esorics/2013</crossref>
<url>db/conf/esorics/esorics2013.html#BoydCFPPS13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ozchi/RadkeBNB13" mdate="2018-11-06">
<author pid="85/9240">Kenneth Radke</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0001-8917-0863" pid="18/6093">Laurie Buys</author>
<title>&#34;Who decides?&#34;: security and privacy in the wild.</title>
<pages>27-36</pages>
<year>2013</year>
<booktitle>OZCHI</booktitle>
<ee>https://doi.org/10.1145/2541016.2541043</ee>
<crossref>conf/ozchi/2013</crossref>
<url>db/conf/ozchi/ozchi2013.html#RadkeBNB13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sin/NyeemBB13" mdate="2018-11-06">
<author orcid="0000-0003-4839-5059" pid="04/10772">Hussain Nyeem</author>
<author orcid="0000-0002-5093-2952" pid="58/1014">Wageeh W. Boles</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Counterfeiting attacks on block-wise dependent fragile watermarking schemes.</title>
<pages>86-93</pages>
<year>2013</year>
<booktitle>SIN</booktitle>
<ee>https://doi.org/10.1145/2523514.2523530</ee>
<crossref>conf/sin/2013</crossref>
<url>db/conf/sin/sin2013.html#NyeemBB13</url>
</inproceedings>
</r>
<r><proceedings key="conf/acisp/2013" mdate="2019-05-14">
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<editor pid="18/382">Leonie Simpson</editor>
<title>Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings</title>
<year>2013</year>
<publisher>Springer</publisher>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>7959</volume>
<ee>https://doi.org/10.1007/978-3-642-39059-3</ee>
<isbn>978-3-642-39058-6</isbn>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp2013.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BoydCFPPS13" mdate="2020-05-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="17/2282">Cas Cremers</author>
<author pid="59/10309">Mich&#232;le Feltz</author>
<author pid="39/780">Kenneth G. Paterson</author>
<author pid="48/8243">Bertram Poettering</author>
<author pid="67/675">Douglas Stebila</author>
<title>ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.</title>
<pages>398</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/398</ee>
<url>db/journals/iacr/iacr2013.html#BoydCFPPS13</url>
</article>
</r>
<r><inproceedings key="conf/acisp/RangasamySBNK12" mdate="2024-05-07">
<author orcid="0000-0001-9830-021X" pid="68/9125">Jothi Rangasamy</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0001-8902-0718" pid="19/9126">Lakshmi Kuppusamy</author>
<title>Effort-Release Public-Key Encryption from Cryptographic Puzzles.</title>
<pages>194-207</pages>
<year>2012</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-642-31448-3_15</ee>
<crossref>conf/acisp/2012</crossref>
<url>db/conf/acisp/acisp2012.html#RangasamySBNK12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/LeeBN12" mdate="2017-05-25">
<author pid="05/10025">Kaleb Lee</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking.</title>
<pages>434-441</pages>
<year>2012</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-642-31448-3_33</ee>
<crossref>conf/acisp/2012</crossref>
<url>db/conf/acisp/acisp2012.html#LeeBN12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/auisc/RadkeBNB12" mdate="2019-07-25">
<author pid="85/9240">Kenneth Radke</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="93/5922">Margot Brereton</author>
<title>Towards a Secure Human-and-Computer Mutual Authentication Protocol.</title>
<pages>39-46</pages>
<year>2012</year>
<booktitle>AISC</booktitle>
<ee>http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Radke.html</ee>
<crossref>conf/auisc/2012</crossref>
<url>db/conf/auisc/auisc2012.html#RadkeBNB12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/auisc/SeifiSFB12" mdate="2019-07-25">
<author pid="146/1947">Younes Seifi</author>
<author pid="73/3463">Suriadi Suriadi</author>
<author pid="42/3445">Ernest Foo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets.</title>
<pages>47-58</pages>
<year>2012</year>
<booktitle>AISC</booktitle>
<ee>http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV125Seifi.html</ee>
<crossref>conf/auisc/2012</crossref>
<url>db/conf/auisc/auisc2012.html#SeifiSFB12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/auisc/LeeNB12" mdate="2017-12-01">
<author pid="05/10025">Kaleb Lee</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Improving the Efficiency of RFID Authentication with Pre-Computation.</title>
<pages>91-100</pages>
<year>2012</year>
<booktitle>AISC</booktitle>
<crossref>conf/auisc/2012</crossref>
<url>db/conf/auisc/auisc2012.html#LeeNB12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/KuppusamyRSBN12" mdate="2024-05-07">
<author orcid="0000-0001-8902-0718" pid="19/9126">Lakshmi Kuppusamy</author>
<author orcid="0000-0001-9830-021X" pid="68/9125">Jothi Rangasamy</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Practical client puzzles in the standard model.</title>
<pages>42-43</pages>
<year>2012</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/2414456.2414480</ee>
<crossref>conf/ccs/2012asia</crossref>
<url>db/conf/ccs/asiaccs2012.html#KuppusamyRSBN12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/css/LeeNB12" mdate="2017-05-26">
<author pid="05/10025">Kaleb Lee</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>A State-Aware RFID Privacy Model with Reader Corruption.</title>
<pages>324-338</pages>
<year>2012</year>
<crossref>conf/css/2012</crossref>
<booktitle>CSS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-35362-8_25</ee>
<url>db/conf/css/css2012.html#LeeNB12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcsw/AlbeshriBN12" mdate="2023-03-24">
<author orcid="0000-0003-3796-0294" pid="44/8558">Aiiad Albeshri</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>GeoProof: Proofs of Geographic Location for Cloud Computing Environment.</title>
<pages>506-514</pages>
<year>2012</year>
<booktitle>ICDCS Workshops</booktitle>
<ee>https://doi.org/10.1109/ICDCSW.2012.50</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCSW.2012.50</ee>
<crossref>conf/icdcsw/2012</crossref>
<url>db/conf/icdcsw/icdcsw2012.html#AlbeshriBN12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigcpr/BoydELS12" mdate="2018-11-06">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="130/4753">Denis Edwards</author>
<author pid="130/4765">Philip Loftus</author>
<author pid="130/4786">Timothy G. Schaefer</author>
<title>Chief information officer (CIO) panel: how to groom IT leadership as change agents.</title>
<pages>1-2</pages>
<year>2012</year>
<booktitle>CPR</booktitle>
<ee>https://doi.org/10.1145/2214091.2214093</ee>
<crossref>conf/sigcpr/2012</crossref>
<url>db/conf/sigcpr/cpr2012.html#BoydELS12</url>
</inproceedings>
</r>
<r><article key="journals/tissec/GorantlaBNM11" mdate="2018-11-06">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Modeling key compromise impersonation attacks on group key exchange protocols.</title>
<pages>28:1-28:24</pages>
<year>2011</year>
<volume>14</volume>
<journal>ACM Trans. Inf. Syst. Secur.</journal>
<number>4</number>
<ee>https://doi.org/10.1145/2043628.2043629</ee>
<url>db/journals/tissec/tissec14.html#GorantlaBNM11</url>
</article>
</r>
<r><inproceedings key="conf/ccs/RangasamySBN11" mdate="2024-05-07">
<author orcid="0000-0001-9830-021X" pid="68/9125">Jothi Rangasamy</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juanma Gonz&#225;lez Nieto</author>
<title>An integrated approach to cryptographic mitigation of denial-of-service attacks.</title>
<pages>114-123</pages>
<year>2011</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/1966913.1966929</ee>
<crossref>conf/ccs/2011asia</crossref>
<url>db/conf/ccs/asiaccs2011.html#RangasamySBN11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/NgoBN11" mdate="2023-03-24">
<author pid="60/266">Long Ngo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juanma Gonz&#225;lez Nieto</author>
<title>Automated Proofs for Diffie-Hellman-Based Key Exchanges.</title>
<pages>51-65</pages>
<year>2011</year>
<booktitle>CSF</booktitle>
<ee>https://doi.org/10.1109/CSF.2011.11</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSF.2011.11</ee>
<crossref>conf/csfw/2011</crossref>
<url>db/conf/csfw/csf2011.html#NgoBN11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ctrsa/StebilaKRBN11" mdate="2024-05-07">
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author orcid="0000-0001-8902-0718" pid="19/9126">Lakshmi Kuppusamy</author>
<author orcid="0000-0001-9830-021X" pid="68/9125">Jothi Rangasamy</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols.</title>
<pages>284-301</pages>
<year>2011</year>
<booktitle>CT-RSA</booktitle>
<ee>https://doi.org/10.1007/978-3-642-19074-2_19</ee>
<crossref>conf/ctrsa/2011</crossref>
<url>db/conf/ctrsa/ctrsa2011.html#StebilaKRBN11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dicta/NyeemBB11" mdate="2023-03-24">
<author orcid="0000-0003-4839-5059" pid="04/10772">Hussain Nyeem</author>
<author orcid="0000-0002-5093-2952" pid="58/1014">Wageeh W. Boles</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Developing a Digital Image Watermarking Model.</title>
<pages>468-473</pages>
<year>2011</year>
<booktitle>DICTA</booktitle>
<ee>https://doi.org/10.1109/DICTA.2011.85</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DICTA.2011.85</ee>
<crossref>conf/dicta/2011</crossref>
<url>db/conf/dicta/dicta2011.html#NyeemBB11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/RangasamySKBN11" mdate="2024-05-07">
<author orcid="0000-0001-9830-021X" pid="68/9125">Jothi Rangasamy</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author orcid="0000-0001-8902-0718" pid="19/9126">Lakshmi Kuppusamy</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection.</title>
<pages>319-331</pages>
<year>2011</year>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-31912-9_21</ee>
<crossref>conf/icisc/2011</crossref>
<url>db/conf/icisc/icisc2011.html#RangasamySKBN11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ima/BoydN11" mdate="2020-03-18">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juanma Gonz&#225;lez Nieto</author>
<title>On Forward Secrecy in One-Round Key Exchange.</title>
<pages>451-468</pages>
<year>2011</year>
<booktitle>IMACC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-25516-8_27</ee>
<crossref>conf/ima/2011</crossref>
<url>db/conf/ima/ima2011.html#BoydN11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/KuppusamyRSBN11" mdate="2024-05-07">
<author orcid="0000-0001-8902-0718" pid="19/9126">Lakshmi Kuppusamy</author>
<author orcid="0000-0001-9830-021X" pid="68/9125">Jothi Rangasamy</author>
<author orcid="0000-0001-9443-3170" pid="67/675">Douglas Stebila</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juanma Gonz&#225;lez Nieto</author>
<title>Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy.</title>
<pages>379-398</pages>
<year>2011</year>
<booktitle>INDOCRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-25578-6_27</ee>
<crossref>conf/indocrypt/2011</crossref>
<url>db/conf/indocrypt/indocrypt2011.html#KuppusamyRSBN11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/interact/RadkeBMGBN11" mdate="2018-11-02">
<author pid="85/9240">Kenneth Radke</author>
<author orcid="0000-0002-0982-3404" pid="93/5922">Margot Brereton</author>
<author pid="71/9240">Seyed Hadi Mirisaee</author>
<author pid="28/8855">Sunil Ghelawat</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing.</title>
<pages>524-532</pages>
<year>2011</year>
<booktitle>INTERACT (2)</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-23771-3_39</ee>
<crossref>conf/interact/2011-2</crossref>
<url>db/conf/interact/interact2011-2.html#RadkeBMGBN11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nss/SolamiBCA11" mdate="2021-11-19">
<author pid="266/3773">Eesa A. Alsolami</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="05/4615">Andrew J. Clark</author>
<author orcid="0000-0001-5648-388X" pid="76/5790-1">Irfan Ahmed 0001</author>
<title>User-representative feature selection for keystroke dynamics.</title>
<pages>229-233</pages>
<year>2011</year>
<booktitle>NSS</booktitle>
<ee>https://doi.org/10.1109/ICNSS.2011.6060005</ee>
<crossref>conf/nss/2011</crossref>
<url>db/conf/nss/nss2011.html#SolamiBCA11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/RadkeBNB11" mdate="2018-11-02">
<author pid="85/9240">Kenneth Radke</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0002-0982-3404" pid="93/5922">Margot Brereton</author>
<title>Ceremony Analysis: Strengths and Weaknesses.</title>
<pages>104-115</pages>
<year>2011</year>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-21424-0_9</ee>
<crossref>conf/sec/2011</crossref>
<url>db/conf/sec/sec2011.html#RadkeBNB11</url>
</inproceedings>
</r>
<r><proceedings key="conf/auisc/2011" mdate="2019-07-25">
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<editor pid="p/JosefPieprzyk">Josef Pieprzyk</editor>
<title>Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011</title>
<booktitle>AISC</booktitle>
<year>2011</year>
<publisher>Australian Computer Society</publisher>
<isbn>978-1-920682-96-5</isbn>
<series href="db/series/crpit/index.html">CRPIT</series>
<volume>116</volume>
<ee>http://crpit.scem.westernsydney.edu.au/Vol116.html</ee>
<url>db/conf/auisc/auisc2011.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/RangasamySKBN11" mdate="2020-05-11">
<author pid="68/9125">Jothi Rangasamy</author>
<author pid="67/675">Douglas Stebila</author>
<author pid="19/9126">Lakshmi Kuppusamy</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection.</title>
<pages>665</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/665</ee>
<url>db/journals/iacr/iacr2011.html#RangasamySKBN11</url>
</article>
</r>
<r><inproceedings key="conf/acisp/GorantlaBN10" mdate="2017-05-25">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Attribute-Based Authenticated Key Exchange.</title>
<pages>300-317</pages>
<year>2010</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14081-5_19</ee>
<crossref>conf/acisp/2010</crossref>
<url>db/conf/acisp/acisp2010.html#GorantlaBN10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/africacrypt/CostelloBNW10" mdate="2023-11-12">
<author orcid="0000-0001-5423-7714" pid="98/7227">Craig Costello</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0003-1732-6149" pid="46/1010">Kenneth Koon-Ho Wong</author>
<title>Avoiding Full Extension Field Arithmetic in Pairing Computations.</title>
<pages>203-224</pages>
<year>2010</year>
<booktitle>AFRICACRYPT</booktitle>
<ee>https://doi.org/10.1007/978-3-642-12678-9_13</ee>
<crossref>conf/africacrypt/2010</crossref>
<url>db/conf/africacrypt/africacrypt2010.html#CostelloBNW10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hpcc/SolamiBCI10" mdate="2023-03-24">
<author pid="266/3773">Eesa A. Alsolami</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="05/4615">Andrew J. Clark</author>
<author pid="33/8557">Asadul K. Islam</author>
<title>Continuous Biometric Authentication: Can It Be More Practical?</title>
<pages>647-652</pages>
<year>2010</year>
<booktitle>HPCC</booktitle>
<ee>https://doi.org/10.1109/HPCC.2010.65</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HPCC.2010.65</ee>
<crossref>conf/hpcc/2010</crossref>
<url>db/conf/hpcc/hpcc2010.html#SolamiBCI10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ozchi/RadkeBBN10" mdate="2018-11-06">
<author pid="85/9240">Kenneth Radke</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-0982-3404" pid="93/5922">Margot Brereton</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>How HCI design influences web security decisions.</title>
<pages>252-255</pages>
<year>2010</year>
<booktitle>OZCHI</booktitle>
<ee>https://doi.org/10.1145/1952222.1952276</ee>
<crossref>conf/ozchi/2010</crossref>
<url>db/conf/ozchi/ozchi2010.html#RadkeBBN10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/provsec/NgoBN10" mdate="2017-05-21">
<author pid="60/266">Long Ngo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Automating Computational Proofs for Public-Key-Based Key Exchange.</title>
<pages>53-69</pages>
<year>2010</year>
<booktitle>ProvSec</booktitle>
<ee>https://doi.org/10.1007/978-3-642-16280-0_4</ee>
<crossref>conf/provsec/2010</crossref>
<url>db/conf/provsec/provsec2010.html#NgoBN10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/SunBN10" mdate="2018-06-26">
<author pid="30/7002">Dongdong Sun</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Delegation in Predicate Encryption Supporting Disjunctive Queries.</title>
<pages>229-240</pages>
<year>2010</year>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-15257-3_21</ee>
<crossref>conf/sec/2010</crossref>
<url>db/conf/sec/sec2010.html#SunBN10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/waifi/CostelloBNW10" mdate="2023-11-12">
<author orcid="0000-0001-5423-7714" pid="98/7227">Craig Costello</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0003-1732-6149" pid="46/1010">Kenneth Koon-Ho Wong</author>
<title>Delaying Mismatched Field Multiplications in Pairing Computations.</title>
<pages>196-214</pages>
<year>2010</year>
<booktitle>WAIFI</booktitle>
<ee>https://doi.org/10.1007/978-3-642-13797-6_14</ee>
<crossref>conf/waifi/2010</crossref>
<url>db/conf/waifi/waifi2010.html#CostelloBNW10</url>
</inproceedings>
</r>
<r><proceedings key="conf/auisc/2010" mdate="2019-07-25">
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<editor pid="12/3447">Willy Susilo</editor>
<title>8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010</title>
<booktitle>AISC</booktitle>
<year>2010</year>
<publisher>Australian Computer Society</publisher>
<isbn>978-1-920682-86-6</isbn>
<series href="db/series/crpit/index.html">CRPIT</series>
<volume>105</volume>
<ee>http://crpit.scem.westernsydney.edu.au/Vol105.html</ee>
<url>db/conf/auisc/auisc2010.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/GorantlaBN10" mdate="2020-05-11">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>One Round Group Key Exchange with Forward Security in the Standard Model.</title>
<pages>83</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/083</ee>
<url>db/journals/iacr/iacr2010.html#GorantlaBN10</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GorantlaBN10a" mdate="2020-05-11">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Attribute-based Authenticated Key Exchange.</title>
<pages>84</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/084</ee>
<url>db/journals/iacr/iacr2010.html#GorantlaBN10a</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/CostelloBNW10" mdate="2020-05-11">
<author pid="98/7227">Craig Costello</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="46/1010">Kenneth Koon-Ho Wong</author>
<title>Avoiding Full Extension Field Arithmetic in Pairing Computations.</title>
<pages>104</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/104</ee>
<url>db/journals/iacr/iacr2010.html#CostelloBNW10</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/CostelloBNW10a" mdate="2020-05-11">
<author pid="98/7227">Craig Costello</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="46/1010">Kenneth Koon-Ho Wong</author>
<title>Delaying Mismatched Field Multiplications in Pairing Computations.</title>
<pages>123</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/123</ee>
<url>db/journals/iacr/iacr2010.html#CostelloBNW10a</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/StebilaKRBN10" mdate="2020-05-11">
<author pid="67/675">Douglas Stebila</author>
<author pid="19/9126">Lakshmi Kuppusamy</author>
<author pid="68/9125">Jothi Rangasamy</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols.</title>
<pages>649</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/649</ee>
<url>db/journals/iacr/iacr2010.html#StebilaKRBN10</url>
</article>
</r>
<r><article key="journals/cee/KangBD09" mdate="2020-02-19">
<author orcid="0000-0002-4076-9362" pid="09/85">Baoyuan Kang</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.</title>
<pages>9-17</pages>
<year>2009</year>
<volume>35</volume>
<journal>Comput. Electr. Eng.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.compeleceng.2008.04.001</ee>
<url>db/journals/cee/cee35.html#KangBD09</url>
</article>
</r>
<r><article key="journals/cee/KangBD09a" mdate="2020-02-19">
<author orcid="0000-0002-4076-9362" pid="09/85">Baoyuan Kang</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Identity-based strong designated verifier signature schemes: Attacks and new construction.</title>
<pages>49-53</pages>
<year>2009</year>
<volume>35</volume>
<journal>Comput. Electr. Eng.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.compeleceng.2008.05.004</ee>
<url>db/journals/cee/cee35.html#KangBD09a</url>
</article>
</r>
<r><article key="journals/ijact/BoydCNP09" mdate="2020-08-07">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="08/5194">Yvonne Cliff</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="39/780">Kenneth G. Paterson</author>
<title>One-round key exchange in the standard model.</title>
<pages>181-199</pages>
<year>2009</year>
<volume>1</volume>
<journal>Int. J. Appl. Cryptogr.</journal>
<number>3</number>
<ee>https://doi.org/10.1504/IJACT.2009.023466</ee>
<url>db/journals/ijact/ijact1.html#BoydCNP09</url>
</article>
</r>
<r><article key="journals/jss/KangBD09" mdate="2020-02-24">
<author orcid="0000-0002-4076-9362" pid="09/85">Baoyuan Kang</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>A novel identity-based strong designated verifier signature scheme.</title>
<pages>270-273</pages>
<year>2009</year>
<volume>82</volume>
<journal>J. Syst. Softw.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.jss.2008.06.014</ee>
<url>db/journals/jss/jss82.html#KangBD09</url>
</article>
</r>
<r><inproceedings key="conf/acns/CliffBN09" mdate="2019-08-20">
<author pid="08/5194">Yvonne Cliff</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.</title>
<pages>53-70</pages>
<year>2009</year>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-01957-9_4</ee>
<crossref>conf/acns/2009</crossref>
<url>db/conf/acns/acns2009.html#CliffBN09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/auisc/GorantlaBN09" mdate="2019-07-25">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Strong Designated Verifier Signature in a Multi-user Setting.</title>
<pages>21-31</pages>
<year>2009</year>
<booktitle>AISC</booktitle>
<ee>http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV98Gorantla.html</ee>
<crossref>conf/auisc/2009</crossref>
<url>db/conf/auisc/auisc2009.html#GorantlaBN09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/GorantlaBN09" mdate="2018-11-06">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Universally composable contributory group key exchange.</title>
<pages>146-156</pages>
<year>2009</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/1533057.1533079</ee>
<crossref>conf/ccs/2009asia</crossref>
<url>db/conf/ccs/asiaccs2009.html#GorantlaBN09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/GorantlaBNM09" mdate="2018-11-02">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0002-1512-9670" pid="62/484">Mark Manulis</author>
<title>Generic One Round Group Key Exchange in the Standard Model.</title>
<pages>1-15</pages>
<year>2009</year>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14423-3_1</ee>
<crossref>conf/icisc/2009</crossref>
<url>db/conf/icisc/icisc2009.html#GorantlaBNM09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/LippoldBN09" mdate="2017-05-26">
<author pid="04/7224">Georg Lippold</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Efficient Certificateless KEM in the Standard Model.</title>
<pages>34-46</pages>
<year>2009</year>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-14423-3_3</ee>
<crossref>conf/icisc/2009</crossref>
<url>db/conf/icisc/icisc2009.html#LippoldBN09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pairing/CostelloHBNW09" mdate="2025-04-01">
<author orcid="0000-0001-5423-7714" pid="98/7227">Craig Costello</author>
<author orcid="0000-0002-1019-2187" pid="44/5656">H&#252;seyin Hisil</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0003-1732-6149" pid="46/1010">Kenneth Koon-Ho Wong</author>
<title>Faster Pairings on Special Weierstrass Curves.</title>
<pages>89-101</pages>
<year>2009</year>
<booktitle>Pairing</booktitle>
<ee>https://doi.org/10.1007/978-3-642-03298-1_7</ee>
<crossref>conf/pairing/2009</crossref>
<url>db/conf/pairing/pairing2009.html#CostelloHBNW09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pairing/LippoldBN09" mdate="2017-05-22">
<author pid="04/7224">Georg Lippold</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Strongly Secure Certificateless Key Agreement.</title>
<pages>206-230</pages>
<year>2009</year>
<booktitle>Pairing</booktitle>
<ee>https://doi.org/10.1007/978-3-642-03298-1_14</ee>
<crossref>conf/pairing/2009</crossref>
<url>db/conf/pairing/pairing2009.html#LippoldBN09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/GorantlaBN09" mdate="2018-06-26">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.</title>
<pages>105-123</pages>
<year>2009</year>
<booktitle>Public Key Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-00468-1_7</ee>
<crossref>conf/pkc/2009</crossref>
<url>db/conf/pkc/pkc2009.html#GorantlaBN09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/scube/AlzaidPNBF09" mdate="2022-06-23">
<author pid="95/865">Hani Alzaid</author>
<author pid="64/6683">DongGook Park</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<title>A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA.</title>
<pages>66-82</pages>
<year>2009</year>
<booktitle>S-CUBE</booktitle>
<ee>https://doi.org/10.1007/978-3-642-11528-8_6</ee>
<ee>http://eudl.eu/doi/10.1007/978-3-642-11528-8_6</ee>
<crossref>conf/scube/2009</crossref>
<url>db/conf/scube/scube2009.html#AlzaidPNBF09</url>
</inproceedings>
</r>
<r><proceedings key="conf/acisp/2009" mdate="2019-05-14">
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<editor pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</editor>
<title>Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings</title>
<volume>5594</volume>
<year>2009</year>
<ee>https://doi.org/10.1007/978-3-642-02620-1</ee>
<isbn>978-3-642-02619-5</isbn>
<booktitle>ACISP</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<publisher>Springer</publisher>
<url>db/conf/acisp/acisp2009.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/CliffBN09" mdate="2020-05-11">
<author pid="08/5194">Yvonne Cliff</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.</title>
<pages>136</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/136</ee>
<url>db/journals/iacr/iacr2009.html#CliffBN09</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LippoldBN09" mdate="2020-05-11">
<author pid="04/7224">Georg Lippold</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Strongly Secure Certificateless Key Agreement.</title>
<pages>219</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/219</ee>
<url>db/journals/iacr/iacr2009.html#LippoldBN09</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/CostelloHBNW09" mdate="2020-05-11">
<author pid="98/7227">Craig Costello</author>
<author pid="44/5656">H&#252;seyin Hisil</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="46/1010">Kenneth Koon-Ho Wong</author>
<title>Faster Pairings on Special Weierstrass Curves.</title>
<pages>243</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/243</ee>
<url>db/journals/iacr/iacr2009.html#CostelloHBNW09</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GorantlaBN09" mdate="2020-05-11">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols.</title>
<pages>291</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/291</ee>
<url>db/journals/iacr/iacr2009.html#GorantlaBN09</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GorantlaBN09a" mdate="2020-05-11">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Universally Composable Contributory Group Key Exchange.</title>
<pages>300</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/300</ee>
<url>db/journals/iacr/iacr2009.html#GorantlaBN09a</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GorantlaBN09b" mdate="2020-05-11">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>On the Connection between Signcryption and One-pass Key Establishment.</title>
<pages>436</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/436</ee>
<url>db/journals/iacr/iacr2009.html#GorantlaBN09b</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/LippoldBN09a" mdate="2020-05-11">
<author pid="04/7224">Georg Lippold</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Efficient Certificateless KEM in the Standard Model.</title>
<pages>451</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/451</ee>
<url>db/journals/iacr/iacr2009.html#LippoldBN09a</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/GorantlaBNM09" mdate="2020-05-11">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="62/484">Mark Manulis</author>
<title>Generic One Round Group Key Exchange in the Standard Model.</title>
<pages>514</pages>
<year>2009</year>
<volume>2009</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2009/514</ee>
<url>db/journals/iacr/iacr2009.html#GorantlaBNM09</url>
</article>
</r>
<r><article key="journals/ecr/DuFB08" mdate="2022-06-23">
<author pid="85/2037">Rong Du</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Designing a secure e-tender submission protocol.</title>
<pages>115-142</pages>
<year>2008</year>
<volume>8</volume>
<journal>Electron. Commer. Res.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10660-008-9017-x</ee>
<url>db/journals/ecr/ecr8.html#DuFB08</url>
</article>
</r>
<r><inproceedings key="conf/acisp/BoydCNP08" mdate="2017-05-25">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="08/5194">Yvonne Cliff</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="39/780">Kenneth G. Paterson</author>
<title>Efficient One-Round Key Exchange in the Standard Model.</title>
<pages>69-83</pages>
<year>2008</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-540-70500-0_6</ee>
<crossref>conf/acisp/2008</crossref>
<url>db/conf/acisp/acisp2008.html#BoydCNP08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/auisc/GorantlaBN08" mdate="2019-07-25">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>ID-based One-pass Authenticated Key Establishment.</title>
<pages>39-46</pages>
<year>2008</year>
<booktitle>AISC</booktitle>
<ee>http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Gorantla.html</ee>
<crossref>conf/auisc/2008</crossref>
<url>db/conf/auisc/auisc2008.html#GorantlaBN08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dicta/HirschbichlerBB08" mdate="2023-03-24">
<author pid="41/6386">Marianne Hirschbichler</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-5093-2952" pid="58/1014">Wageeh W. Boles</author>
<title>A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault.</title>
<pages>540-547</pages>
<year>2008</year>
<booktitle>DICTA</booktitle>
<ee>https://doi.org/10.1109/DICTA.2008.81</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DICTA.2008.81</ee>
<crossref>conf/dicta/2008</crossref>
<url>db/conf/dicta/dicta2008.html#HirschbichlerBB08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pst/HirschbichlerBB08" mdate="2023-03-23">
<author pid="41/6386">Marianne Hirschbichler</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-5093-2952" pid="58/1014">Wageeh W. Boles</author>
<title>A Multiple-Control Fuzzy Vault.</title>
<pages>36-47</pages>
<year>2008</year>
<booktitle>PST</booktitle>
<ee>https://doi.org/10.1109/PST.2008.23</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PST.2008.23</ee>
<crossref>conf/pst/2008</crossref>
<url>db/conf/pst/pst2008.html#HirschbichlerBB08</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BoydCNP08" mdate="2020-05-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="08/5194">Yvonne Cliff</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="39/780">Kenneth G. Paterson</author>
<title>Efficient One-round Key Exchange in the Standard Model.</title>
<pages>7</pages>
<year>2008</year>
<volume>2008</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2008/007</ee>
<url>db/journals/iacr/iacr2008.html#BoydCNP08</url>
</article>
</r>
<r><article key="journals/dss/JosangIB07" mdate="2020-02-20">
<author orcid="0000-0001-6337-2264" pid="j/AudunJosang">Audun J&#248;sang</author>
<author pid="49/6515">Roslan Ismail</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>A survey of trust and reputation systems for online service provision.</title>
<pages>618-644</pages>
<year>2007</year>
<volume>43</volume>
<journal>Decis. Support Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.dss.2005.05.019</ee>
<url>db/journals/dss/dss43.html#JosangIB07</url>
</article>
</r>
<r><article key="journals/ijwmc/SmithTBNF07" mdate="2022-06-23">
<author pid="02/1964-1">Jason Smith 0001</author>
<author pid="13/4225">Suratose Tritilanunt</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<title>Denial-of-service resistance in key establishment.</title>
<pages>59-71</pages>
<year>2007</year>
<volume>2</volume>
<journal>Int. J. Wirel. Mob. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1504/IJWMC.2007.013796</ee>
<url>db/journals/ijwmc/ijwmc2.html#SmithTBNF07</url>
</article>
</r>
<r><article key="journals/tissec/PengBD07" mdate="2019-10-19">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Batch zero-knowledge proof and verification and its applications.</title>
<year>2007</year>
<volume>10</volume>
<journal>ACM Trans. Inf. Syst. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/1237500.1237502</ee>
<url>db/journals/tissec/tissec10.html#PengBD07</url>
<pages>6</pages>
</article>
</r>
<r><inproceedings key="conf/acsc/TritilanuntBFN07" mdate="2021-02-10">
<author pid="13/4225">Suratose Tritilanunt</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="42/3445">Ernest Foo</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.</title>
<pages>191-200</pages>
<year>2007</year>
<booktitle>ACSC</booktitle>
<ee type="oa">http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV62Tritilanunt.html</ee>
<crossref>conf/acsc/2007</crossref>
<url>db/conf/acsc/acsc2007.html#TritilanuntBFN07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/TritilanuntBFN07" mdate="2025-03-03">
<author pid="13/4225">Suratose Tritilanunt</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Toward Non-parallelizable Client Puzzles.</title>
<pages>247-264</pages>
<year>2007</year>
<crossref>conf/cans/2007</crossref>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/978-3-540-76969-9_16</ee>
<url>db/conf/cans/cans2007.html#TritilanuntBFN07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/euc/HaKPMNB07" mdate="2018-06-26">
<author pid="h/JaeCheolHa">JaeCheol Ha</author>
<author pid="65/1749">Hwankoo Kim</author>
<author pid="00/6114">JeaHoon Park</author>
<author pid="40/6149">Sang-Jae Moon</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.</title>
<pages>557-567</pages>
<year>2007</year>
<crossref>conf/euc/2007w</crossref>
<booktitle>EUC Workshops</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-77090-9_52</ee>
<url>db/conf/euc/eucw2007.html#HaKPMNB07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/euc/HaMNB07" mdate="2018-06-26">
<author pid="h/JaeCheolHa">JaeCheol Ha</author>
<author pid="40/6149">Sang-Jae Moon</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Low-Cost and Strong-Security RFID Authentication Protocol.</title>
<pages>795-807</pages>
<year>2007</year>
<crossref>conf/euc/2007w</crossref>
<booktitle>EUC Workshops</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-77090-9_72</ee>
<url>db/conf/euc/eucw2007.html#HaMNB07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ima/GorantlaBN07" mdate="2020-03-18">
<author pid="28/2550">M. Choudary Gorantla</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>On the Connection Between Signcryption and One-Pass Key Establishment.</title>
<pages>277-301</pages>
<year>2007</year>
<crossref>conf/ima/2007</crossref>
<booktitle>IMACC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-77272-9_17</ee>
<url>db/conf/ima/ima2007.html#GorantlaBN07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ima/TsoNOBO07" mdate="2020-03-18">
<author pid="73/5733">Raylin Tso</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="85/1299">Takeshi Okamoto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="74/2114">Eiji Okamoto</author>
<title>Verifier-Key-Flexible Universal Designated-Verifier Signatures.</title>
<pages>403-421</pages>
<year>2007</year>
<crossref>conf/ima/2007</crossref>
<booktitle>IMACC</booktitle>
<ee>https://doi.org/10.1007/978-3-540-77272-9_24</ee>
<url>db/conf/ima/ima2007.html#TsoNOBO07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iwdw/DowlingPMDPBCBC07" mdate="2020-12-29">
<author orcid="0000-0001-9349-2275" pid="09/3463">Jason Dowling</author>
<author pid="01/6910">Birgit M. Planitz</author>
<author orcid="0000-0002-7398-2581" pid="21/3309">Anthony J. Maeder</author>
<author pid="32/724-2">Jiang Du 0002</author>
<author pid="181/2751-1">Binh Pham 0001</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="43/5931">Shaokang Chen</author>
<author orcid="0000-0003-0109-6844" pid="00/1197">Andrew P. Bradley</author>
<author orcid="0000-0003-4036-2930" pid="73/5039">Stuart Crozier</author>
<title>A Comparison of DCT and DWT Block Based Watermarking on Medical Image Quality.</title>
<pages>454-466</pages>
<year>2007</year>
<booktitle>IWDW</booktitle>
<ee>https://doi.org/10.1007/978-3-540-92238-4_35</ee>
<ee>https://www.wikidata.org/entity/Q63457793</ee>
<crossref>conf/iwdw/2007</crossref>
<url>db/conf/iwdw/iwdw2007.html#DowlingPMDPBCBC07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pakdd/HaMNB07" mdate="2017-05-25">
<author pid="h/JaeCheolHa">JaeCheol Ha</author>
<author pid="40/6149">Sang-Jae Moon</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP).</title>
<pages>574-583</pages>
<year>2007</year>
<crossref>conf/pakdd/2007w</crossref>
<booktitle>PAKDD Workshops</booktitle>
<ee>https://doi.org/10.1007/978-3-540-77018-3_57</ee>
<url>db/conf/pakdd/pakdd2007w.html#HaMNB07</url>
</inproceedings>
</r>
<r><article key="journals/aaecc/HitchcockBN06" mdate="2017-05-18">
<author pid="52/5948">Yvonne Hitchcock</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model.</title>
<pages>405-438</pages>
<year>2006</year>
<volume>16</volume>
<journal>Appl. Algebra Eng. Commun. Comput.</journal>
<number>6</number>
<ee>https://doi.org/10.1007/s00200-005-0185-9</ee>
<url>db/journals/aaecc/aaecc16.html#HitchcockBN06</url>
</article>
</r>
<r><article key="journals/comcom/ChooBH06" mdate="2023-08-28">
<author orcid="0000-0001-9208-5336" pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/5948">Yvonne Hitchcock</author>
<title>The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.</title>
<pages>2788-2797</pages>
<year>2006</year>
<volume>29</volume>
<journal>Comput. Commun.</journal>
<number>15</number>
<ee>https://doi.org/10.1016/j.comcom.2005.10.030</ee>
<ee>https://www.wikidata.org/entity/Q115063335</ee>
<url>db/journals/comcom/comcom29.html#ChooBH06</url>
</article>
</r>
<r><article key="journals/comcom/PengBD06" mdate="2025-01-19">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Batch verification of validity of bids in homomorphic e-auction.</title>
<pages>2798-2805</pages>
<year>2006</year>
<volume>29</volume>
<journal>Comput. Commun.</journal>
<number>15</number>
<ee>https://doi.org/10.1016/j.comcom.2005.10.031</ee>
<ee>https://www.wikidata.org/entity/Q123252649</ee>
<url>db/journals/comcom/comcom29.html#PengBD06</url>
</article>
</r>
<r><inproceedings key="conf/acisp/PengBDO06" mdate="2019-10-19">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<author pid="74/2114">Eiji Okamoto</author>
<title>A Novel Range Test.</title>
<pages>247-258</pages>
<year>2006</year>
<crossref>conf/acisp/2006</crossref>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/11780656_21</ee>
<url>db/conf/acisp/acisp2006.html#PengBDO06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/BoydCM06" mdate="2017-05-29">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0001-9208-5336" pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="54/5482">Anish Mathuria</author>
<title>An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.</title>
<pages>371-382</pages>
<year>2006</year>
<crossref>conf/acisp/2006</crossref>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/11780656_31</ee>
<url>db/conf/acisp/acisp2006.html#BoydCM06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acns/CliffTB06" mdate="2019-08-20">
<author pid="08/5194">Yvonne Cliff</author>
<author pid="47/4046">Yiu Shing Terry Tin</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Password Based Server Aided Key Exchange .</title>
<pages>146-161</pages>
<year>2006</year>
<crossref>conf/acns/2006</crossref>
<booktitle>ACNS</booktitle>
<ee type="oa">https://doi.org/10.1007/11767480_10</ee>
<url>db/conf/acns/acns2006.html#CliffTB06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsw/SmithNB06" mdate="2018-11-26">
<author pid="02/1964-1">Jason Smith 0001</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Modelling denial of service attacks on JFK with Meadows's cost-based framework.</title>
<pages>125-134</pages>
<year>2006</year>
<crossref>conf/acsw/2006</crossref>
<booktitle>ACSW</booktitle>
<ee>https://dl.acm.org/citation.cfm?id=1151844</ee>
<url>db/conf/acsw/acsw2006.html#SmithNB06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsw/DuFBC06" mdate="2018-11-26">
<author pid="85/2037">Rong Du</author>
<author pid="42/3445">Ernest Foo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<title>Formal analysis of secure contracting protocol for e-tendering.</title>
<pages>155-164</pages>
<year>2006</year>
<crossref>conf/acsw/2006</crossref>
<booktitle>ACSW</booktitle>
<ee>https://dl.acm.org/citation.cfm?id=1151847</ee>
<url>db/conf/acsw/acsw2006.html#DuFBC06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsw/DawsonBDN06" mdate="2018-11-26">
<author pid="96/3747">Robert Dawson</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>SKMA: a key management architecture for SCADA systems.</title>
<pages>183-192</pages>
<year>2006</year>
<crossref>conf/acsw/2006</crossref>
<booktitle>ACSW</booktitle>
<ee>https://dl.acm.org/citation.cfm?id=1151850</ee>
<url>db/conf/acsw/acsw2006.html#DawsonBDN06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cans/BrownNB06" mdate="2017-05-24">
<author pid="53/2944">Jaimee Brown</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems.</title>
<pages>1-18</pages>
<year>2006</year>
<crossref>conf/cans/2006</crossref>
<booktitle>CANS</booktitle>
<ee>https://doi.org/10.1007/11935070_1</ee>
<url>db/conf/cans/cans2006.html#BrownNB06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icuct/HaHMB06" mdate="2017-05-26">
<author pid="h/JaeCheolHa">JaeCheol Ha</author>
<author pid="35/5357">JungHoon Ha</author>
<author pid="40/6149">Sang-Jae Moon</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System.</title>
<pages>80-89</pages>
<year>2006</year>
<crossref>conf/icuct/2006</crossref>
<booktitle>ICUCT</booktitle>
<ee>https://doi.org/10.1007/978-3-540-71789-8_9</ee>
<url>db/conf/icuct/icuct2006.html#HaHMB06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/BrownNB06" mdate="2017-05-19">
<author pid="53/2944">Jaimee Brown</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions.</title>
<pages>176-190</pages>
<year>2006</year>
<crossref>conf/indocrypt/2006</crossref>
<booktitle>INDOCRYPT</booktitle>
<ee>https://doi.org/10.1007/11941378_13</ee>
<url>db/conf/indocrypt/indocrypt2006.html#BrownNB06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/otm/TritilanuntBFN06" mdate="2025-03-03">
<author pid="13/4225">Suratose Tritilanunt</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Examining the DoS Resistance of HIP.</title>
<pages>616-625</pages>
<year>2006</year>
<crossref>conf/otm/2006-w1</crossref>
<booktitle>OTM Workshops (1)</booktitle>
<ee>https://doi.org/10.1007/11915034_85</ee>
<url>db/conf/otm/otm2006-w1.html#TritilanuntBFN06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/ChowBN06" mdate="2018-11-02">
<author orcid="0000-0001-7306-453X" pid="c/ShermanSMChow">Sherman S. M. Chow</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Security-Mediated Certificateless Cryptography.</title>
<pages>508-524</pages>
<year>2006</year>
<crossref>conf/pkc/2006</crossref>
<booktitle>Public Key Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/11745853_33</ee>
<url>db/conf/pkc/pkc2006.html#ChowBN06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/PengBD06" mdate="2019-10-19">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Sealed-Bid Micro Auctions.</title>
<pages>246-257</pages>
<year>2006</year>
<crossref>conf/sec/2006</crossref>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/0-387-33406-8_21</ee>
<url>db/conf/sec/sec2006.html#PengBD06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustbus/DuBF06" mdate="2025-03-03">
<author pid="85/2037">Rong Du</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<title>A Secure E-Tender Submission Protocol.</title>
<pages>213-222</pages>
<year>2006</year>
<crossref>conf/trustbus/2006</crossref>
<booktitle>TrustBus</booktitle>
<ee>https://doi.org/10.1007/11824633_22</ee>
<url>db/conf/trustbus/trustbus2006.html#DuBF06</url>
</inproceedings>
</r>
<r><article key="journals/csse/AdityaLBD05" mdate="2007-02-20">
<author pid="48/6094">Riza Aditya</author>
<author pid="12/4124">Byoungcheon Lee</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption.</title>
<year>2005</year>
<volume>20</volume>
<journal>Comput. Syst. Sci. Eng.</journal>
<number>6</number>
<url>db/journals/csse/csse20.html#AdityaLBD05</url>
</article>
</r>
<r><article key="journals/dcc/NietoBD05" mdate="2019-10-19">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>A Public Key Cryptosystem Based On A Subgroup Membership Problem.</title>
<pages>301-316</pages>
<year>2005</year>
<volume>36</volume>
<journal>Des. Codes Cryptogr.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10623-004-1721-5</ee>
<url>db/journals/dcc/dcc36.html#NietoBD05</url>
</article>
</r>
<r><article key="journals/ijisec/BoydM05" mdate="2017-05-27">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/2278">Wenbo Mao</author>
<title>Preface to the special issue on ISC 2003.</title>
<pages>227-227</pages>
<year>2005</year>
<volume>4</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s10207-004-0066-4</ee>
<url>db/journals/ijisec/ijisec4.html#BoydM05</url>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/ChooBH05" mdate="2017-06-01">
<author orcid="0000-0001-9208-5336" pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/5948">Yvonne Hitchcock</author>
<title>Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.</title>
<pages>585-604</pages>
<year>2005</year>
<crossref>conf/asiacrypt/2005</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/11593447_32</ee>
<url>db/conf/asiacrypt/asiacrypt2005.html#ChooBH05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/ChooBH05a" mdate="2017-06-01">
<author orcid="0000-0001-9208-5336" pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/5948">Yvonne Hitchcock</author>
<title>Errors in Computational Complexity Proofs for Protocols.</title>
<pages>624-643</pages>
<year>2005</year>
<crossref>conf/asiacrypt/2005</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/11593447_34</ee>
<url>db/conf/asiacrypt/asiacrypt2005.html#ChooBH05a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/crypto/PengBD05" mdate="2017-05-26">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>Simple and Efficient Shuffling with Provable Correctness and ZK Privacy.</title>
<pages>188-204</pages>
<year>2005</year>
<crossref>conf/crypto/2005</crossref>
<booktitle>CRYPTO</booktitle>
<ee>https://doi.org/10.1007/11535218_12</ee>
<url>db/conf/crypto/crypto2005.html#PengBD05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/PengBDL05" mdate="2019-10-31">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="12/4124">Byoungcheon Lee</author>
<title>Ciphertext Comparison, a New Solution to the Millionaire Problem.</title>
<pages>84-96</pages>
<year>2005</year>
<crossref>conf/icics/2005</crossref>
<booktitle>ICICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11602897_8</ee>
<url>db/conf/icics/icics2005.html#PengBDL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/PengBD05" mdate="2017-05-21">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.</title>
<pages>374-388</pages>
<year>2005</year>
<crossref>conf/isw/2005</crossref>
<booktitle>ISC</booktitle>
<ee>https://doi.org/10.1007/11556992_27</ee>
<url>db/conf/isw/isc2005.html#PengBD05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mycrypt/PengBD05" mdate="2017-05-24">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.</title>
<pages>84-98</pages>
<year>2005</year>
<crossref>conf/mycrypt/2005</crossref>
<booktitle>Mycrypt</booktitle>
<ee>https://doi.org/10.1007/11554868_7</ee>
<url>db/conf/mycrypt/mycrypt2005.html#PengBD05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mycrypt/ChooBH05" mdate="2017-06-04">
<author orcid="0000-0001-9208-5336" pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/5948">Yvonne Hitchcock</author>
<title>On Session Key Construction in Provably-Secure Key Establishment Protocols.</title>
<pages>116-131</pages>
<year>2005</year>
<crossref>conf/mycrypt/2005</crossref>
<booktitle>Mycrypt</booktitle>
<ee>https://doi.org/10.1007/11554868_9</ee>
<url>db/conf/mycrypt/mycrypt2005.html#ChooBH05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mycrypt/BoydC05" mdate="2017-06-04">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0001-9208-5336" pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<title>Security of Two-Party Identity-Based Key Agreement.</title>
<pages>229-243</pages>
<year>2005</year>
<crossref>conf/mycrypt/2005</crossref>
<booktitle>Mycrypt</booktitle>
<ee>https://doi.org/10.1007/11554868_17</ee>
<url>db/conf/mycrypt/mycrypt2005.html#BoydC05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustbus/DuFNB05" mdate="2017-05-26">
<author pid="85/2037">Rong Du</author>
<author pid="42/3445">Ernest Foo</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Designing Secure E-Tendering Systems.</title>
<pages>70-79</pages>
<year>2005</year>
<crossref>conf/trustbus/2005</crossref>
<booktitle>TrustBus</booktitle>
<ee>https://doi.org/10.1007/11537878_8</ee>
<url>db/conf/trustbus/trustbus2005.html#DuFNB05</url>
</inproceedings>
</r>
<r><proceedings key="conf/acisp/2005" mdate="2019-05-14">
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<editor pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</editor>
<title>Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings</title>
<isbn>3-540-26547-3</isbn>
<volume>3574</volume>
<year>2005</year>
<booktitle>ACISP</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<publisher>Springer</publisher>
<ee>https://doi.org/10.1007/b137750</ee>
<url>db/conf/acisp/acisp2005.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/ChooBH05" mdate="2020-05-11">
<author pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/5948">Yvonne Hitchcock</author>
<title>On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen &#38; Kudla (2003) and McCullagh &#38; Barreto (2005) ID-Based Protocols.</title>
<pages>206</pages>
<year>2005</year>
<volume>2005</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2005/206</ee>
<url>db/journals/iacr/iacr2005.html#ChooBH05</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ChooBH05a" mdate="2020-05-11">
<author pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/5948">Yvonne Hitchcock</author>
<title>Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.</title>
<pages>270</pages>
<year>2005</year>
<volume>2005</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2005/270</ee>
<url>db/journals/iacr/iacr2005.html#ChooBH05a</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/PengBD05" mdate="2020-05-11">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>Batch Verification of Validity of Bids in Homomorphic E-auction.</title>
<pages>346</pages>
<year>2005</year>
<volume>2005</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2005/346</ee>
<url>db/journals/iacr/iacr2005.html#PengBD05</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/ChooBH05b" mdate="2020-05-11">
<author pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/5948">Yvonne Hitchcock</author>
<title>Errors in Computational Complexity Proofs for Protocols.</title>
<pages>351</pages>
<year>2005</year>
<volume>2005</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2005/351</ee>
<url>db/journals/iacr/iacr2005.html#ChooBH05b</url>
</article>
</r>
<r><inproceedings key="conf/acisp/TinVBN04" mdate="2017-05-25">
<author pid="47/4046">Yiu Shing Terry Tin</author>
<author pid="24/5893">Harikrishna Vasanta</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Protocols with Security Proofs for Mobile Applications.</title>
<pages>358-369</pages>
<ee>https://doi.org/10.1007/978-3-540-27800-9_31</ee>
<year>2004</year>
<crossref>conf/acisp/2004</crossref>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp2004.html#TinVBN04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acns/BoydMP04" mdate="2017-05-23">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/2278">Wenbo Mao</author>
<author pid="39/780">Kenneth G. Paterson</author>
<title>Key Agreement Using Statically Keyed Authenticators.</title>
<pages>248-262</pages>
<ee>https://doi.org/10.1007/978-3-540-24852-1_18</ee>
<year>2004</year>
<crossref>conf/acns/2004</crossref>
<booktitle>ACNS</booktitle>
<url>db/conf/acns/acns2004.html#BoydMP04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acns/AdityaPBDL04" mdate="2017-05-23">
<author pid="48/6094">Riza Aditya</author>
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="12/4124">Byoungcheon Lee</author>
<title>Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.</title>
<pages>494-508</pages>
<ee>https://doi.org/10.1007/978-3-540-24852-1_36</ee>
<year>2004</year>
<crossref>conf/acns/2004</crossref>
<booktitle>ACNS</booktitle>
<url>db/conf/acns/acns2004.html#AdityaPBDL04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsw/DuFBF04" mdate="2019-07-25">
<author pid="85/2037">Rong Du</author>
<author pid="42/3445">Ernest Foo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="f/BrianFitzgerald2">Brian Fitzgerald 0002</author>
<title>Defining Security Services for Electronic Tendering.</title>
<pages>43-52</pages>
<year>2004</year>
<crossref>conf/acsw/2004</crossref>
<booktitle>ACSW</booktitle>
<ee>http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Du.html</ee>
<url>db/conf/acsw/acsw2004.html#DuFBF04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsw/LeeBDKYY04" mdate="2019-07-25">
<author pid="12/4124">Byoungcheon Lee</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="98/3736">Kwangjo Kim</author>
<author pid="29/3487">Jeongmo Yang</author>
<author pid="46/1816">Seungjae Yoo</author>
<title>Secure Key Issuing in ID-based Cryptography.</title>
<pages>69-74</pages>
<year>2004</year>
<crossref>conf/acsw/2004</crossref>
<booktitle>ACSW</booktitle>
<ee>http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Lee.html</ee>
<url>db/conf/acsw/acsw2004.html#LeeBDKYY04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cau/PengABDL04" mdate="2004-07-16">
<author pid="04/2229">Kun Peng</author>
<author pid="48/6094">Riza Aditya</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="12/4124">Byoungcheon Lee</author>
<title>A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.</title>
<pages>57-71</pages>
<year>2004</year>
<crossref>conf/cau/2004</crossref>
<booktitle>Cryptographic Algorithms and their Uses</booktitle>
<url>db/conf/cau/cau2004.html#PengABDL04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/PengBDL04" mdate="2017-05-26">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="12/4124">Byoungcheon Lee</author>
<title>An Efficient and Verifiable Solution to the Millionaire Problem.</title>
<pages>51-66</pages>
<year>2004</year>
<crossref>conf/icisc/2004</crossref>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/11496618_6</ee>
<url>db/conf/icisc/icisc2004.html#PengBDL04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip1-7/ChooBHM04" mdate="2018-06-26">
<author pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/5948">Yvonne Hitchcock</author>
<author pid="85/3420">Greg Maitland</author>
<title>Complementing Computational Protocol Analysis with Formal Specifications.</title>
<pages>129-144</pages>
<year>2004</year>
<crossref>conf/ifip1-7/2004</crossref>
<booktitle>Formal Aspects in Security and Trust</booktitle>
<ee type="oa">https://doi.org/10.1007/0-387-24098-5_10</ee>
<url>db/conf/ifip1-7/fast2004.html#ChooBHM04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/Boyd04" mdate="2017-05-19">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Design of Secure Key Establishment Protocols: Successes, Failures and Prospects.</title>
<pages>1-13</pages>
<ee>https://doi.org/10.1007/978-3-540-30556-9_1</ee>
<year>2004</year>
<crossref>conf/indocrypt/2004</crossref>
<booktitle>INDOCRYPT</booktitle>
<url>db/conf/indocrypt/indocrypt2004.html#Boyd04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/HitchcockBN04" mdate="2017-05-19">
<author pid="52/5948">Yvonne Hitchcock</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.</title>
<pages>17-32</pages>
<ee>https://doi.org/10.1007/978-3-540-30556-9_3</ee>
<year>2004</year>
<crossref>conf/indocrypt/2004</crossref>
<booktitle>INDOCRYPT</booktitle>
<url>db/conf/indocrypt/indocrypt2004.html#HitchcockBN04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/PengABDL04" mdate="2017-05-19">
<author pid="04/2229">Kun Peng</author>
<author pid="48/6094">Riza Aditya</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="12/4124">Byoungcheon Lee</author>
<title>Multiplicative Homomorphic E-Voting.</title>
<pages>61-72</pages>
<ee>https://doi.org/10.1007/978-3-540-30556-9_6</ee>
<year>2004</year>
<crossref>conf/indocrypt/2004</crossref>
<booktitle>INDOCRYPT</booktitle>
<url>db/conf/indocrypt/indocrypt2004.html#PengABDL04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mata/VasantaTBLN04" mdate="2017-05-25">
<author pid="24/5893">Harikrishna Vasanta</author>
<author pid="47/4046">Yiu Shing Terry Tin</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="34/5813">Mark Looi</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>A Secure Framework for User Privacy in Heterogeneous Location Networks.</title>
<pages>264-274</pages>
<ee>https://doi.org/10.1007/978-3-540-30178-3_25</ee>
<year>2004</year>
<crossref>conf/mata/2004</crossref>
<booktitle>MATA</booktitle>
<url>db/conf/mata/mata2004.html#VasantaTBLN04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/PengBDV04" mdate="2017-05-24">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="29/5594">Kapalee Viswanathan</author>
<title>A Correct, Private, and Efficient Mix Network.</title>
<pages>439-454</pages>
<ee>https://doi.org/10.1007/978-3-540-24632-9_32</ee>
<year>2004</year>
<crossref>conf/pkc/2004</crossref>
<booktitle>Public Key Cryptography</booktitle>
<url>db/conf/pkc/pkc2004.html#PengBDV04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/scn/ChooBHM04" mdate="2017-05-26">
<author pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/5948">Yvonne Hitchcock</author>
<author pid="85/3420">Greg Maitland</author>
<title>On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.</title>
<pages>351-366</pages>
<ee>https://doi.org/10.1007/978-3-540-30598-9_25</ee>
<year>2004</year>
<crossref>conf/scn/2004</crossref>
<booktitle>SCN</booktitle>
<url>db/conf/scn/scn2004.html#ChooBHM04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sis/IsmailBJR04" mdate="2004-06-24">
<author pid="49/6515">Roslan Ismail</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="j/AudunJosang">Audun J&#248;sang</author>
<author pid="97/4597">Selwyn Russell</author>
<title>An Efficient Off-Line Reputation Scheme Using Articulated Certificates.</title>
<pages>53-62</pages>
<year>2004</year>
<crossref>conf/sis/2004</crossref>
<booktitle>WOSIS</booktitle>
<url>db/conf/sis/wosis2004.html#IsmailBJR04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sis/IsmailBJR04a" mdate="2004-06-24">
<author pid="49/6515">Roslan Ismail</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="j/AudunJosang">Audun J&#248;sang</author>
<author pid="97/4597">Selwyn Russell</author>
<title>Private Reputation Schemes for P2P systems.</title>
<pages>196-206</pages>
<year>2004</year>
<crossref>conf/sis/2004</crossref>
<booktitle>WOSIS</booktitle>
<url>db/conf/sis/wosis2004.html#IsmailBJR04a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustbus/AdityaLBD04" mdate="2017-05-26">
<author pid="48/6094">Riza Aditya</author>
<author pid="12/4124">Byoungcheon Lee</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness.</title>
<pages>152-161</pages>
<ee>https://doi.org/10.1007/978-3-540-30079-3_16</ee>
<year>2004</year>
<crossref>conf/trustbus/2004</crossref>
<booktitle>TrustBus</booktitle>
<url>db/conf/trustbus/trustbus2004.html#AdityaLBD04</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/ChooBHM04" mdate="2020-05-11">
<author pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/5948">Yvonne Hitchcock</author>
<author pid="85/3420">Greg Maitland</author>
<title>On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.</title>
<pages>345</pages>
<year>2004</year>
<volume>2004</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2004/345</ee>
<url>db/journals/iacr/iacr2004.html#ChooBHM04</url>
</article>
</r>
<r><book key="series/isc/BoydM03" mdate="2018-11-14">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="54/5482">Anish Mathuria</author>
<title>Protocols for Authentication and Key Establishment</title>
<year>2003</year>
<pages>I-XXIV, 1-323</pages>
<publisher>Springer</publisher>
<series href="db/series/isc/index.html">Information Security and Cryptography</series>
<isbn>978-3-642-07716-6</isbn>
<ee>https://doi.org/10.1007/978-3-662-09527-0</ee>
<ee>https://www.wikidata.org/entity/Q52769177</ee>
</book>
</r>
<r><inproceedings key="conf/acisp/TinBN03" mdate="2017-05-25">
<author pid="47/4046">Yiu Shing Terry Tin</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach.</title>
<pages>166-179</pages>
<ee>https://doi.org/10.1007/3-540-45067-X_15</ee>
<year>2003</year>
<crossref>conf/acisp/2003</crossref>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp2003.html#TinBN03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsw/PengBDV03" mdate="2019-07-25">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="77/6038">Kapali Viswanathan</author>
<title>Five Sealed-bid Auction Models.</title>
<pages>77-86</pages>
<year>2003</year>
<crossref>conf/acsw/2003</crossref>
<booktitle>ACSW</booktitle>
<ee>http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV21APeng.html</ee>
<url>db/conf/acsw/acsw2003.html#PengBDV03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsw/TinBN03" mdate="2019-07-25">
<author pid="47/4046">Yiu Shing Terry Tin</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juanma Gonz&#225;lez Nieto</author>
<title>Provably Secure Key Exchange: An Engineering Approach.</title>
<pages>97-104</pages>
<year>2003</year>
<crossref>conf/acsw/2003</crossref>
<booktitle>ACSW</booktitle>
<ee>http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV21ATin.html</ee>
<url>db/conf/acsw/acsw2003.html#TinBN03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecweb/IsmailBJR03" mdate="2019-10-19">
<author pid="49/6515">Roslan Ismail</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0001-6337-2264" pid="j/AudunJosang">Audun J&#248;sang</author>
<author pid="97/4597">Selwyn Russell</author>
<title>A Security Architecture for Reputation Systems.</title>
<pages>176-185</pages>
<ee>https://doi.org/10.1007/978-3-540-45229-4_18</ee>
<year>2003</year>
<crossref>conf/ecweb/2003</crossref>
<booktitle>EC-Web</booktitle>
<url>db/conf/ecweb/ecweb2003.html#IsmailBJR03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/egov/AdityaBDV03" mdate="2017-05-22">
<author pid="48/6094">Riza Aditya</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="77/6038">Kapali Viswanathan</author>
<title>Secure e-Voting for Preferential Elections.</title>
<pages>246-249</pages>
<ee>https://doi.org/10.1007/10929179_44</ee>
<year>2003</year>
<crossref>conf/egov/2003</crossref>
<booktitle>EGOV</booktitle>
<url>db/conf/egov/egov2003.html#AdityaBDV03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/LeeBDKYY03" mdate="2017-05-26">
<author pid="12/4124">Byoungcheon Lee</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="98/3736">Kwangjo Kim</author>
<author pid="29/3487">Jeongmo Yang</author>
<author pid="46/1816">Seungjae Yoo</author>
<title>Providing Receipt-Freeness in Mixnet-Based Voting Protocols.</title>
<pages>245-258</pages>
<ee>https://doi.org/10.1007/978-3-540-24691-6_19</ee>
<year>2003</year>
<crossref>conf/icisc/2003</crossref>
<booktitle>ICISC</booktitle>
<url>db/conf/icisc/icisc2003.html#LeeBDKYY03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/HitchcockTNBM03" mdate="2017-05-19">
<author pid="52/5948">Yvonne Hitchcock</author>
<author pid="47/4046">Yiu Shing Terry Tin</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="50/805">Paul Montague</author>
<title>A Password-Based Authenticator: Security Proof and Applications.</title>
<pages>388-401</pages>
<ee>https://doi.org/10.1007/978-3-540-24582-7_29</ee>
<year>2003</year>
<crossref>conf/indocrypt/2003</crossref>
<booktitle>INDOCRYPT</booktitle>
<url>db/conf/indocrypt/indocrypt2003.html#HitchcockTNBM03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/BoydN03" mdate="2017-05-24">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<title>Round-Optimal Contributory Conference Key Agreement.</title>
<pages>161-174</pages>
<year>2003</year>
<crossref>conf/pkc/2003</crossref>
<booktitle>Public Key Cryptography</booktitle>
<ee>https://doi.org/10.1007/3-540-36288-6_12</ee>
<url>db/conf/pkc/pkc2003.html#BoydN03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/spw/BoydMP03" mdate="2017-05-25">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/2278">Wenbo Mao</author>
<author pid="39/780">Kenneth G. Paterson</author>
<title>Deniable Authenticated Key Establishment for Internet Protocols.</title>
<pages>255-271</pages>
<year>2003</year>
<crossref>conf/spw/2003</crossref>
<booktitle>Security Protocols Workshop</booktitle>
<ee>https://doi.org/10.1007/11542322_31</ee>
<url>db/conf/spw/spw2003.html#BoydMP03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisa/PengBDV03" mdate="2017-05-21">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="29/5594">Kapalee Viswanathan</author>
<title>Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.</title>
<pages>244-256</pages>
<ee>https://doi.org/10.1007/978-3-540-24591-9_19</ee>
<year>2003</year>
<crossref>conf/wisa/2003</crossref>
<booktitle>WISA</booktitle>
<url>db/conf/wisa/wisa2003.html#PengBDV03</url>
</inproceedings>
</r>
<r><proceedings key="conf/isw/2003" mdate="2019-05-14">
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<editor pid="52/2278">Wenbo Mao</editor>
<title>Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings</title>
<booktitle>ISC</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>2851</volume>
<publisher>Springer</publisher>
<year>2003</year>
<isbn>3-540-20176-9</isbn>
<ee>https://doi.org/10.1007/b13828</ee>
<url>db/conf/isw/isc2003.html</url>
</proceedings>
</r>
<r><article key="journals/compsec/ViswanathanBD02" mdate="2023-08-28">
<author pid="77/6038">Kapali Viswanathan</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Hybrid Key Escrow: A New Paradigm.</title>
<pages>77-92</pages>
<year>2002</year>
<volume>21</volume>
<journal>Comput. Secur.</journal>
<number>1</number>
<url>db/journals/compsec/compsec21.html#ViswanathanBD02</url>
<ee>https://doi.org/10.1016/S0167-4048(02)00111-6</ee>
<ee>https://www.wikidata.org/entity/Q115031745</ee>
</article>
</r>
<r><article key="journals/ijisec/NietoVBCD02" mdate="2017-05-27">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="77/6038">Kapali Viswanathan</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="05/4615">Andrew J. Clark</author>
<author pid="73/1998">Ed Dawson</author>
<title>Key recovery for the commercial environment.</title>
<pages>161-174</pages>
<year>2002</year>
<volume>1</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10207-002-0014-0</ee>
<url>db/journals/ijisec/ijisec1.html#NietoVBCD02</url>
</article>
</r>
<r><article key="journals/ijisec/DawsonVB02" mdate="2017-05-27">
<author pid="73/1998">Ed Dawson</author>
<author pid="77/6038">Kapali Viswanathan</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Compliant cryptologic protocols.</title>
<pages>189-202</pages>
<year>2002</year>
<volume>1</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10207-002-0016-y</ee>
<url>db/journals/ijisec/ijisec1.html#DawsonVB02</url>
</article>
</r>
<r><inproceedings key="conf/ctrsa/MaitlandB02" mdate="2017-05-21">
<author pid="85/3420">Greg Maitland</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Co-operatively Formed Group Signatures.</title>
<pages>218-235</pages>
<year>2002</year>
<crossref>conf/ctrsa/2002</crossref>
<booktitle>CT-RSA</booktitle>
<ee>https://doi.org/10.1007/3-540-45760-7_15</ee>
<url>db/conf/ctrsa/ctrsa2002.html#MaitlandB02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fasec/BoydV02" mdate="2017-05-19">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="77/6038">Kapali Viswanathan</author>
<title>Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis.</title>
<pages>49-61</pages>
<ee>https://doi.org/10.1007/978-3-540-40981-6_6</ee>
<year>2002</year>
<crossref>conf/fasec/2002</crossref>
<booktitle>FASec</booktitle>
<url>db/conf/fasec/fasec2002.html#BoydV02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/PengBDV02" mdate="2017-05-23">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="77/6038">Kapali Viswanathan</author>
<title>Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.</title>
<pages>147-159</pages>
<year>2002</year>
<crossref>conf/icics/2002</crossref>
<booktitle>ICICS</booktitle>
<ee>https://doi.org/10.1007/3-540-36159-6_13</ee>
<url>db/conf/icics/icics2002.html#PengBDV02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/PengBDV02" mdate="2017-05-26">
<author pid="04/2229">Kun Peng</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="77/6038">Kapali Viswanathan</author>
<title>Non-interactive Auction Schemewith Strong Privacy.</title>
<pages>407-420</pages>
<year>2002</year>
<crossref>conf/icisc/2002</crossref>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/3-540-36552-4_28</ee>
<url>db/conf/icisc/icisc2002.html#PengBDV02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/MaitlandB02" mdate="2017-05-24">
<author pid="85/3420">Greg Maitland</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>A Provably Secure Restrictive Partially Blind Signature Scheme.</title>
<pages>99-114</pages>
<year>2002</year>
<crossref>conf/pkc/2002</crossref>
<booktitle>Public Key Cryptography</booktitle>
<ee>https://doi.org/10.1007/3-540-45664-3_7</ee>
<url>db/conf/pkc/pkc2002.html#MaitlandB02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/PavlovskiB01" mdate="2018-11-02">
<author orcid="0000-0002-2910-8184" pid="89/2732">Chris Pavlovski</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Attacks Based on Small Factors in Various Group Structures.</title>
<pages>36-50</pages>
<year>2001</year>
<crossref>conf/acisp/2001</crossref>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/3-540-47719-5_5</ee>
<url>db/conf/acisp/acisp2001.html#PavlovskiB01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/ParkKBD01" mdate="2019-10-19">
<author pid="64/6683">DongGook Park</author>
<author pid="22/227">JungJoon Kim</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks.</title>
<pages>334-343</pages>
<year>2001</year>
<crossref>conf/acisp/2001</crossref>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/3-540-47719-5_27</ee>
<url>db/conf/acisp/acisp2001.html#ParkKBD01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/BoydMN01" mdate="2017-05-25">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="50/805">Paul Montague</author>
<author pid="18/2927">Khanh Quoc Nguyen</author>
<title>Elliptic Curve Based Password Authenticated Key Exchange Protocols.</title>
<pages>487-501</pages>
<year>2001</year>
<crossref>conf/acisp/2001</crossref>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/3-540-47719-5_38</ee>
<url>db/conf/acisp/acisp2001.html#BoydMN01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/NietoBD01" mdate="2017-05-23">
<author pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>A Public Key Cryptosystem Based on the Subgroup Membership Problem.</title>
<pages>352-363</pages>
<year>2001</year>
<crossref>conf/icics/2001</crossref>
<booktitle>ICICS</booktitle>
<ee>https://doi.org/10.1007/3-540-45600-7_38</ee>
<url>db/conf/icics/icics2001.html#NietoBD01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/MaitlandB01" mdate="2017-05-23">
<author pid="85/3420">Greg Maitland</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Fair Electronic Cash Based on a Group Signature Scheme.</title>
<pages>461-465</pages>
<year>2001</year>
<crossref>conf/icics/2001</crossref>
<booktitle>ICICS</booktitle>
<ee>https://doi.org/10.1007/3-540-45600-7_51</ee>
<url>db/conf/icics/icics2001.html#MaitlandB01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/indocrypt/ViswanathanBD01" mdate="2017-05-19">
<author pid="77/6038">Kapali Viswanathan</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>An Analysis of Integrity Services in Protocols.</title>
<pages>175-187</pages>
<year>2001</year>
<crossref>conf/indocrypt/2001</crossref>
<booktitle>INDOCRYPT</booktitle>
<ee>https://doi.org/10.1007/3-540-45311-3_17</ee>
<url>db/conf/indocrypt/indocrypt2001.html#ViswanathanBD01</url>
</inproceedings>
</r>
<r><proceedings key="conf/asiacrypt/2001" mdate="2021-06-01">
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<title>Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings</title>
<booktitle>ASIACRYPT</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>2248</volume>
<publisher>Springer</publisher>
<year>2001</year>
<isbn>3-540-42987-5</isbn>
<ee>https://doi.org/10.1007/3-540-45682-1</ee>
<ee>https://www.wikidata.org/entity/Q21767537</ee>
<url>db/conf/asiacrypt/asiacrypt2001.html</url>
</proceedings>
</r>
<r><article key="journals/comcom/BoydM00" mdate="2020-02-20">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="54/5482">Anish Mathuria</author>
<title>Key establishment protocols for secure mobile communications: a critical survey.</title>
<pages>575-587</pages>
<year>2000</year>
<volume>23</volume>
<journal>Comput. Commun.</journal>
<number>5-6</number>
<ee>https://doi.org/10.1016/S0140-3664(99)00210-8</ee>
<url>db/journals/comcom/comcom23.html#BoydM00</url>
</article>
</r>
<r><inproceedings key="conf/acisp/FooB00" mdate="2022-06-23">
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Passive Entities: A Strategy for Electronic Payment Design.</title>
<pages>134-148</pages>
<year>2000</year>
<crossref>conf/acisp/2000</crossref>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp2000.html#FooB00</url>
<ee>https://doi.org/10.1007/10718964_12</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/NietoVBD00" mdate="2019-10-19">
<author pid="g/JuanmaGNieto">Juanma Gonz&#225;lez Nieto</author>
<author pid="77/6038">Kapali Viswanathan</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Key Recovery System for the Commercial Environment.</title>
<pages>149-162</pages>
<year>2000</year>
<crossref>conf/acisp/2000</crossref>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp2000.html#NietoVBD00</url>
<ee>https://doi.org/10.1007/10718964_13</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/ViswanathanBD00" mdate="2019-10-19">
<author pid="77/6038">Kapali Viswanathan</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>A Three Phased Schema for Sealed Bid Auction System Design.</title>
<pages>412-426</pages>
<year>2000</year>
<crossref>conf/acisp/2000</crossref>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp2000.html#ViswanathanBD00</url>
<ee>https://doi.org/10.1007/10718964_34</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/BoydP00" mdate="2017-05-19">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="89/2732">Chris Pavlovski</author>
<title>Attacking and Repairing Batch Verification Schemes.</title>
<pages>58-71</pages>
<year>2000</year>
<crossref>conf/asiacrypt/2000</crossref>
<booktitle>ASIACRYPT</booktitle>
<ee>https://doi.org/10.1007/3-540-44448-3_5</ee>
<url>db/conf/asiacrypt/asiacrypt2000.html#BoydP00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/ParkBD00" mdate="2019-10-19">
<author pid="64/6683">DongGook Park</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Micropayments for Wireless Communications.</title>
<pages>192-205</pages>
<year>2000</year>
<crossref>conf/icisc/2000</crossref>
<booktitle>ICISC</booktitle>
<ee>https://doi.org/10.1007/3-540-45247-8_16</ee>
<url>db/conf/icisc/icisc2000.html#ParkBD00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/MaitlandRFBD00" mdate="2025-03-03">
<author pid="85/3420">Greg Maitland</author>
<author pid="74/1029">Jason Reid</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>Linkability in Practical Electronic Cash Design.</title>
<pages>149-163</pages>
<ee>https://doi.org/10.1007/3-540-44456-4_12</ee>
<year>2000</year>
<crossref>conf/isw/2000</crossref>
<booktitle>ISW</booktitle>
<url>db/conf/isw/isw2000.html#MaitlandRFBD00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/ParkBD00" mdate="2017-05-21">
<author pid="64/6683">DongGook Park</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>Classification of Authentication Protocols: A Practical Approach.</title>
<pages>194-208</pages>
<ee>https://doi.org/10.1007/3-540-44456-4_15</ee>
<year>2000</year>
<crossref>conf/isw/2000</crossref>
<booktitle>ISW</booktitle>
<url>db/conf/isw/isw2000.html#ParkBD00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isw/BoydK00" mdate="2017-05-21">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="57/1444">Peter Kearney</author>
<title>Exploring Fair Exchange Protocols Using Specification Animation.</title>
<pages>209-223</pages>
<ee>https://doi.org/10.1007/3-540-44456-4_16</ee>
<year>2000</year>
<crossref>conf/isw/2000</crossref>
<booktitle>ISW</booktitle>
<url>db/conf/isw/isw2000.html#BoydK00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/ParkBD00" mdate="2017-05-24">
<author pid="g/JuanmaGNieto">Juanma Gonz&#225;lez Nieto</author>
<author pid="64/6683">DongGook Park</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>Key Recovery in Third Generation Wireless Communication Systems.</title>
<pages>223-237</pages>
<year>2000</year>
<crossref>conf/pkc/2000</crossref>
<booktitle>Public Key Cryptography</booktitle>
<url>db/conf/pkc/pkc2000.html#ParkBD00</url>
<ee>https://doi.org/10.1007/978-3-540-46588-1_16</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/ParkBM00" mdate="2017-05-24">
<author pid="64/6683">DongGook Park</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="40/6149">Sang-Jae Moon</author>
<title>Forward Secrecy and Its Application to Future Mobile Communications Security.</title>
<pages>433-445</pages>
<year>2000</year>
<crossref>conf/pkc/2000</crossref>
<booktitle>Public Key Cryptography</booktitle>
<url>db/conf/pkc/pkc2000.html#ParkBM00</url>
<ee>https://doi.org/10.1007/978-3-540-46588-1_29</ee>
</inproceedings>
</r>
<r><proceedings key="conf/acisp/2000" mdate="2019-10-19">
<editor orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</editor>
<editor pid="05/4615">Andrew J. Clark</editor>
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<title>Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings</title>
<booktitle>ACISP</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>1841</volume>
<publisher>Springer</publisher>
<year>2000</year>
<isbn>3-540-67742-9</isbn>
<ee>https://doi.org/10.1007/10718964</ee>
<url>db/conf/acisp/acisp2000.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/acisp/ViswanathanBD99" mdate="2017-05-23">
<author pid="77/6038">Kapali Viswanathan</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="73/1998">Ed Dawson</author>
<title>Publicly Verifiable Key Escrow with Limited Time Span.</title>
<pages>36-50</pages>
<ee>https://doi.org/10.1007/3-540-48970-3_4</ee>
<year>1999</year>
<crossref>conf/acisp/1999</crossref>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp1999.html#ViswanathanBD99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/BoydFP99" mdate="2025-03-03">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<author pid="89/2732">Chris Pavlovski</author>
<title>Efficient Electronic Cash Using Batch Signatures.</title>
<pages>244-257</pages>
<ee>https://doi.org/10.1007/3-540-48970-3_20</ee>
<year>1999</year>
<crossref>conf/acisp/1999</crossref>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp1999.html#BoydFP99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/PavlovskiBF99" mdate="2022-06-23">
<author orcid="0000-0002-2910-8184" pid="89/2732">Chris Pavlovski</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<title>Detachable Electronic Coins.</title>
<pages>54-70</pages>
<year>1999</year>
<crossref>conf/icics/1999</crossref>
<booktitle>ICICS</booktitle>
<url>db/conf/icics/icics1999.html#PavlovskiBF99</url>
<ee>https://doi.org/10.1007/978-3-540-47942-0_6</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/ViswanathanBD99" mdate="2019-10-19">
<author pid="77/6038">Kapali Viswanathan</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Signature Scheme for Controlled Environments.</title>
<pages>119-134</pages>
<year>1999</year>
<crossref>conf/icics/1999</crossref>
<booktitle>ICICS</booktitle>
<url>db/conf/icics/icics1999.html#ViswanathanBD99</url>
<ee>https://doi.org/10.1007/978-3-540-47942-0_10</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/ViswanathanBD99" mdate="2019-10-19">
<author pid="77/6038">Kapali Viswanathan</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Secure Selection Protocols.</title>
<pages>132-146</pages>
<year>1999</year>
<crossref>conf/icisc/1999</crossref>
<booktitle>ICISC</booktitle>
<url>db/conf/icisc/icisc1999.html#ViswanathanBD99</url>
<ee>https://doi.org/10.1007/10719994_11</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/icppw/ViswanathanBD99" mdate="2023-03-24">
<author pid="77/6038">Kapali Viswanathan</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Strong Binding for Software Key Escrow.</title>
<pages>134-139</pages>
<year>1999</year>
<crossref>conf/icppw/1999</crossref>
<booktitle>ICPP Workshops</booktitle>
<ee>https://doi.org/10.1109/ICPPW.1999.800052</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICPPW.1999.800052</ee>
<url>db/conf/icppw/icppw1999.html#ViswanathanBD99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ima/LiuFB99" mdate="2021-07-30">
<author pid="08/2373">Xian Liu</author>
<author pid="57/1842">Patrick Guy Farrell</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>A Unified Code.</title>
<pages>84-93</pages>
<year>1999</year>
<crossref>conf/ima/1999</crossref>
<booktitle>IMACC</booktitle>
<ee>https://doi.org/10.1007/3-540-46665-7_9</ee>
<url>db/conf/ima/ima1999.html#LiuFB99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/BoydM98" mdate="2017-05-23">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="54/5482">Anish Mathuria</author>
<title>Key Establishment Protocols for Secure Mobile Communications: A Selective Survey.</title>
<pages>344-355</pages>
<year>1998</year>
<crossref>conf/acisp/1998</crossref>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/BFb0053746</ee>
<url>db/conf/acisp/acisp1998.html#BoydM98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/BoydF98" mdate="2025-03-03">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<title>Off-Line Fair Payment Protocols Using Convertible Signatures.</title>
<pages>271-285</pages>
<ee>https://doi.org/10.1007/3-540-49649-1_22</ee>
<year>1998</year>
<crossref>conf/asiacrypt/1998</crossref>
<booktitle>ASIACRYPT</booktitle>
<url>db/conf/asiacrypt/asiacrypt98.html#BoydF98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fc/FooB98" mdate="2022-06-23">
<author orcid="0000-0002-3971-6415" pid="42/3445">Ernest Foo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>A Payment Scheme Using Vouchers.</title>
<pages>103-121</pages>
<ee>https://doi.org/10.1007/BFb0055476</ee>
<year>1998</year>
<crossref>conf/fc/1998</crossref>
<booktitle>Financial Cryptography</booktitle>
<url>db/conf/fc/fc1998.html#FooB98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/GaskellLDBR98" mdate="2002-01-11">
<author pid="84/3719">Gary Gaskell</author>
<author pid="34/5813">Mark Looi</author>
<author pid="73/1998">Ed Dawson</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="97/4597">Selwyn Russell</author>
<title>A security architecture for third generation wireless systems.</title>
<pages>15-32</pages>
<year>1998</year>
<crossref>conf/icisc/1998</crossref>
<booktitle>ICISC</booktitle>
<url>db/conf/icisc/icisc1998.html#GaskellLDBR98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icisc/BoydP98" mdate="2002-01-11">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="64/6683">DongGook Park</author>
<title>Public key protocols for wireless communications.</title>
<pages>47-57</pages>
<year>1998</year>
<crossref>conf/icisc/1998</crossref>
<booktitle>ICISC</booktitle>
<url>db/conf/icisc/icisc1998.html#BoydP98</url>
</inproceedings>
</r>
<r><proceedings key="conf/acisp/1998" mdate="2019-05-14">
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<editor pid="73/1998">Ed Dawson</editor>
<title>Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings</title>
<booktitle>ACISP</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>1438</volume>
<publisher>Springer</publisher>
<year>1998</year>
<isbn>3-540-64732-5</isbn>
<ee>https://doi.org/10.1007/BFb0053715</ee>
<url>db/conf/acisp/acisp1998.html</url>
</proceedings>
</r>
<r><article key="journals/tcom/BoydCIRW97" mdate="2020-09-01">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="c/JohnGCleary">John G. Cleary</author>
<author pid="73/4124">Sean A. Irvine</author>
<author pid="25/2020">Ingrid Rinsma-Melchert</author>
<author orcid="0000-0001-6428-8988" pid="w/IanHWitten">Ian H. Witten</author>
<title>Integrating error detection into arithmetic coding.</title>
<pages>1-3</pages>
<year>1997</year>
<volume>45</volume>
<journal>IEEE Trans. Commun.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/26.554275</ee>
<ee>https://www.wikidata.org/entity/Q59821222</ee>
<url>db/journals/tcom/tcom45.html#BoydCIRW97</url>
</article>
</r>
<r><inproceedings key="conf/acisp/LimBD97" mdate="2019-10-19">
<author pid="17/4989">Jen Lim</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author orcid="0000-0002-1932-1061" pid="73/1998">Ed Dawson</author>
<title>Cryptanalysis of Adaptive Arithmetic Coding Encryption Schemes.</title>
<pages>216-227</pages>
<year>1997</year>
<crossref>conf/acisp/1997</crossref>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp1997.html#LimBD97</url>
<ee>https://doi.org/10.1007/BFb0027929</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/Boyd97" mdate="2017-05-22">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>On Key Agreement and Conference Key Agreement.</title>
<pages>294-302</pages>
<year>1997</year>
<crossref>conf/acisp/1997</crossref>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp1997.html#Boyd97</url>
<ee>https://doi.org/10.1007/BFb0027936</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/Boyd97" mdate="2017-05-23">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Digital signature and public key cryptosystems in a prime order subgroup of Z<sub>n</sub><sup>*</sup>.</title>
<pages>346-355</pages>
<year>1997</year>
<crossref>conf/icics/1997</crossref>
<booktitle>ICICS</booktitle>
<url>db/conf/icics/icics1997.html#Boyd97</url>
<ee>https://doi.org/10.1007/BFb0028490</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/Boyd97a" mdate="2017-05-23">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Enforcing traceability in software.</title>
<pages>398-408</pages>
<year>1997</year>
<crossref>conf/icics/1997</crossref>
<booktitle>ICICS</booktitle>
<url>db/conf/icics/icics1997.html#Boyd97a</url>
<ee>https://doi.org/10.1007/BFb0028495</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ima/LiuFB97" mdate="2021-07-30">
<author pid="08/2373">Xian Liu</author>
<author pid="57/1842">Patrick Guy Farrell</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Resisting the Bergen-Hogan Attack on Adaptive Arithmetic Coding.</title>
<pages>199-208</pages>
<year>1997</year>
<crossref>conf/ima/1997</crossref>
<booktitle>IMACC</booktitle>
<url>db/conf/ima/ima1997.html#LiuFB97</url>
<ee>https://doi.org/10.1007/BFb0024465</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/FooBCD97" mdate="2002-01-03">
<author pid="42/3445">Ernest Foo</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="84/3128">William J. Caelli</author>
<author pid="73/1998">Ed Dawson</author>
<title>A taxonomy of electronic cash schemes.</title>
<pages>337-348</pages>
<year>1997</year>
<crossref>conf/sec/1997</crossref>
<booktitle>SEC</booktitle>
<url>db/conf/sec/sec1997.html#FooBCD97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acisp/Boyd96" mdate="2017-05-22">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>A Framework for Design of Key Establishment Protocols.</title>
<pages>146-157</pages>
<year>1996</year>
<crossref>conf/acisp/1996</crossref>
<booktitle>ACISP</booktitle>
<url>db/conf/acisp/acisp1996.html#Boyd96</url>
<ee>https://doi.org/10.1007/BFb0023295</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/Boyd96" mdate="2023-03-24">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>A Class of Flexible and Efficient Key Management Protocols.</title>
<pages>2-8</pages>
<year>1996</year>
<crossref>conf/csfw/1996</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.1996.503685</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.1996.503685</ee>
<url>db/conf/csfw/csfw1996.html#Boyd96</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/Boyd95" mdate="2023-03-24">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Towards a classification of key agreement protocols.</title>
<pages>38-43</pages>
<year>1995</year>
<crossref>conf/csfw/1995</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.1995.518551</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.1995.518551</ee>
<url>db/conf/csfw/csfw1995.html#Boyd95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ima/SmithB95" mdate="2020-03-18">
<author pid="87/1676">Andrew Smith</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>An Elliptic Curve Analogue of McCurley's Key Agreement Scheme.</title>
<pages>150-157</pages>
<year>1995</year>
<crossref>conf/ima/1995</crossref>
<booktitle>IMACC</booktitle>
<url>db/conf/ima/ima1995.html#SmithB95</url>
<ee>https://doi.org/10.1007/3-540-60693-9_17</ee>
</inproceedings>
</r>
<r><proceedings key="conf/ima/1995" mdate="2020-03-18">
<editor pid="b/ColinBoyd">Colin Boyd</editor>
<title>Cryptography and Coding, 5th IMA Conference, Cirencester, UK, December 18-20, 1995, Proceedings</title>
<booktitle>IMACC</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>1025</volume>
<publisher>Springer</publisher>
<year>1995</year>
<isbn>3-540-60693-9</isbn>
<ee>https://doi.org/10.1007/3-540-60693-9</ee>
<url>db/conf/ima/ima1995.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/asiacrypt/BoydM94" mdate="2017-05-19">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/2278">Wenbo Mao</author>
<title>Design and Analysis of Key Exchange Protocols via Secure Channel Identification.</title>
<pages>171-181</pages>
<year>1994</year>
<crossref>conf/asiacrypt/1994</crossref>
<booktitle>ASIACRYPT</booktitle>
<url>db/conf/asiacrypt/asiacrypt94.html#BoydM94</url>
<ee>https://doi.org/10.1007/BFb0000433</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/MaoB94" mdate="2017-05-25">
<author pid="52/2278">Wenbo Mao</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Development of Authentication Protocols: Some Misconceptions and a New Approach.</title>
<year>1994</year>
<crossref>conf/csfw/1994</crossref>
<booktitle>CSFW</booktitle>
<url>db/conf/csfw/csfw1994.html#MaoB94</url>
<pages>178-186</pages>
<ee>https://doi.org/10.1109/CSFW.1994.315936</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/BoydM94" mdate="2017-05-20">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/2278">Wenbo Mao</author>
<title>Designing Secure Key Exchange Protocols.</title>
<pages>93-105</pages>
<year>1994</year>
<crossref>conf/esorics/1994</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-58618-0_58</ee>
<url>db/conf/esorics/esorics1994.html#BoydM94</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/MaoB94" mdate="2017-05-20">
<author pid="52/2278">Wenbo Mao</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>On Strengthening Authentication Protocols to Foil Cryptanalysis.</title>
<pages>193-204</pages>
<year>1994</year>
<crossref>conf/esorics/1994</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-58618-0_64</ee>
<url>db/conf/esorics/esorics1994.html#MaoB94</url>
</inproceedings>
</r>
<r><article key="journals/jsac/Boyd93" mdate="2020-04-02">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Security Architectures Using Formal Methods.</title>
<pages>694-701</pages>
<year>1993</year>
<volume>11</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>5</number>
<url>db/journals/jsac/jsac11.html#Boyd93</url>
<ee>https://doi.org/10.1109/49.223872</ee>
</article>
</r>
<r><inproceedings key="conf/csfw/MaoB93" mdate="2017-05-25">
<author pid="52/2278">Wenbo Mao</author>
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Towards Formal Analysis of Security Protocols.</title>
<pages>147-158</pages>
<year>1993</year>
<crossref>conf/csfw/1993</crossref>
<booktitle>CSFW</booktitle>
<url>db/conf/csfw/csfw1993.html#MaoB93</url>
<ee>https://doi.org/10.1109/CSFW.1993.246631</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/BodyM93" mdate="2017-05-20">
<author pid="b/ColinBoyd">Colin Boyd</author>
<author pid="52/2278">Wenbo Mao</author>
<title>On a Limitation of BAN Logic.</title>
<pages>240-247</pages>
<ee>https://doi.org/10.1007/3-540-48285-7_20</ee>
<year>1993</year>
<crossref>conf/eurocrypt/93</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt93.html#BodyM93</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/Boyd92" mdate="2017-05-20">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>A Formal Framework for Authentication.</title>
<pages>273-292</pages>
<year>1992</year>
<crossref>conf/esorics/1992</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/BFb0013903</ee>
<url>db/conf/esorics/esorics1992.html#Boyd92</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/Boyd91" mdate="2017-05-20">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects.</title>
<pages>266-280</pages>
<ee>https://doi.org/10.1007/3-540-46416-6_23</ee>
<year>1991</year>
<crossref>conf/eurocrypt/91</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt91.html#Boyd91</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/Boyd89" mdate="2017-05-19">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>A New Multiple Key Cipher and an Improved Voting Scheme.</title>
<pages>617-625</pages>
<ee>https://doi.org/10.1007/3-540-46885-4_58</ee>
<year>1989</year>
<crossref>conf/eurocrypt/89</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt89.html#Boyd89</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurocrypt/Boyd88" mdate="2017-05-19">
<author pid="b/ColinBoyd">Colin Boyd</author>
<title>Some Applications of Multiple Key Ciphers.</title>
<pages>455-467</pages>
<ee>https://doi.org/10.1007/3-540-45961-8_40</ee>
<year>1988</year>
<crossref>conf/eurocrypt/88</crossref>
<booktitle>EUROCRYPT</booktitle>
<url>db/conf/eurocrypt/eurocrypt88.html#Boyd88</url>
</inproceedings>
</r>
<coauthors n="141" nc="7">
<co c="0"><na f="a/Aditya:Riza" pid="48/6094">Riza Aditya</na></co>
<co c="0"><na f="a/Ahmed_0001:Irfan" pid="76/5790-1">Irfan Ahmed 0001</na></co>
<co c="0"><na f="a/Alawatugoda_0001:Janaka" pid="142/1668-1">Janaka Alawatugoda 0001</na></co>
<co c="0"><na f="a/Albeshri:Aiiad" pid="44/8558">Aiiad Albeshri</na></co>
<co c="0" n="2"><na f="a/Alsolami:Eesa" pid="266/3773">Eesa Alsolami</na><na>Eesa A. Alsolami</na></co>
<co c="0"><na f="a/Alzaid:Hani" pid="95/865">Hani Alzaid</na></co>
<co c="0"><na f="a/Armknecht:Frederik" pid="65/6856">Frederik Armknecht</na></co>
<co c="0"><na f="a/Asaar:Maryam_Rajabzadeh" pid="86/6866">Maryam Rajabzadeh Asaar</na></co>
<co c="0"><na f="a/Au:Man_Ho" pid="55/24">Man Ho Au</na></co>
<co c="0"><na f="b/Bartlett:Harry" pid="30/9862">Harry Bartlett</na></co>
<co c="2"><na f="b/Bereczky:Nikolett" pid="143/3657">Nikolett Bereczky</na></co>
<co c="2"><na f="b/Bicz=oacute=k:Gergely" pid="83/2180">Gergely Bicz&#243;k</na></co>
<co c="0"><na f="b/Boles:Wageeh_W=" pid="58/1014">Wageeh W. Boles</na></co>
<co c="0"><na f="b/Boyen:Xavier" pid="53/4957">Xavier Boyen</na></co>
<co c="0"><na f="b/Bradley:Andrew_P=" pid="00/1197">Andrew P. Bradley</na></co>
<co c="0"><na f="b/Brereton:Margot" pid="93/5922">Margot Brereton</na></co>
<co c="0"><na f="b/Brown:Jaimee" pid="53/2944">Jaimee Brown</na></co>
<co c="0"><na f="b/Buys:Laurie" pid="18/6093">Laurie Buys</na></co>
<co c="0"><na f="c/Caelli:William_J=" pid="84/3128">William J. Caelli</na></co>
<co c="0"><na f="c/Carr:Christopher" pid="170/3527">Christopher Carr</na></co>
<co c="0"><na f="c/Chen:Shaokang" pid="43/5931">Shaokang Chen</na></co>
<co c="0"><na f="c/Choo:Kim=Kwang_Raymond" pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</na></co>
<co c="0"><na f="c/Chow:Sherman_S=_M=" pid="c/ShermanSMChow">Sherman S. M. Chow</na></co>
<co c="0"><na f="c/Clark:Andrew_J=" pid="05/4615">Andrew J. Clark</na></co>
<co c="1"><na f="c/Cleary:John_G=" pid="c/JohnGCleary">John G. Cleary</na></co>
<co c="0"><na f="c/Cliff:Yvonne" pid="08/5194">Yvonne Cliff</na></co>
<co c="0"><na f="c/Costello:Craig" pid="98/7227">Craig Costello</na></co>
<co c="0"><na f="c/Cremers:Cas" pid="17/2282">Cas Cremers</na></co>
<co c="0"><na f="c/Crozier:Stuart" pid="73/5039">Stuart Crozier</na></co>
<co c="0"><na f="d/Davies:Gareth_T=" pid="134/7582">Gareth T. Davies</na></co>
<co c="0"><na f="d/Dawson:Ed" pid="73/1998">Ed Dawson</na></co>
<co c="0"><na f="d/Dawson:Robert" pid="96/3747">Robert Dawson</na></co>
<co c="0"><na f="d/Dowling:Jason" pid="09/3463">Jason Dowling</na></co>
<co c="0"><na f="d/Du_0002:Jiang" pid="32/724-2">Jiang Du 0002</na></co>
<co c="0"><na f="d/Du:Rong" pid="85/2037">Rong Du</na></co>
<co c="3"><na f="e/Edwards:Denis" pid="130/4753">Denis Edwards</na></co>
<co c="4"><na f="f/Farrell:Patrick_Guy" pid="57/1842">Patrick Guy Farrell</na></co>
<co c="0"><na f="f/Feltz:Mich=egrave=le" pid="59/10309">Mich&#232;le Feltz</na></co>
<co c="0"><na f="f/Fitzgerald_0002:Brian" pid="f/BrianFitzgerald2">Brian Fitzgerald 0002</na></co>
<co c="0"><na f="f/Fondevik:Elsie_Mestl" pid="360/1121">Elsie Mestl Fondevik</na></co>
<co c="0"><na f="f/Foo:Ernest" pid="42/3445">Ernest Foo</na></co>
<co c="0" n="2"><na f="g/Galteland:Yao_Jiang" pid="305/9012">Yao Jiang Galteland</na><na>Yao Jiang 0001</na></co>
<co c="0"><na f="g/Gaskell:Gary" pid="84/3719">Gary Gaskell</na></co>
<co c="0"><na f="g/Gellert:Kai" pid="237/1554">Kai Gellert</na></co>
<co c="0"><na f="g/Ghelawat:Sunil" pid="28/8855">Sunil Ghelawat</na></co>
<co c="0"><na f="g/Gj=oslash=steen:Kristian" pid="90/4628">Kristian Gj&#248;steen</na></co>
<co c="0"><na f="g/Gorantla:M=_Choudary" pid="28/2550">M. Choudary Gorantla</na></co>
<co c="0" n="2"><na f="g/Gorke:Christian_A=" pid="119/1064">Christian A. Gorke</na><na>Christian A. Reuter</na></co>
<co c="0"><na f="g/Gritti:Cl=eacute=mentine" pid="136/9900">Cl&#233;mentine Gritti</na></co>
<co c="0"><na f="h/Ha:JaeCheol" pid="h/JaeCheolHa">JaeCheol Ha</na></co>
<co c="0"><na f="h/Ha:JungHoon" pid="35/5357">JungHoon Ha</na></co>
<co c="0"><na f="h/Haines:Thomas" pid="175/6283">Thomas Haines</na></co>
<co c="0"><na f="h/Hale:Britta" pid="167/7329">Britta Hale</na></co>
<co c="0"><na f="h/Han:Jinguang" pid="77/9673">Jinguang Han</na></co>
<co c="0"><na f="h/Hirschbichler:Marianne" pid="41/6386">Marianne Hirschbichler</na></co>
<co c="0"><na f="h/Hisil:H=uuml=seyin" pid="44/5656">H&#252;seyin Hisil</na></co>
<co c="0"><na f="h/Hitchcock:Yvonne" pid="52/5948">Yvonne Hitchcock</na></co>
<co c="1"><na f="i/Irvine:Sean_A=" pid="73/4124">Sean A. Irvine</na></co>
<co c="0"><na f="i/Islam:Asadul_K=" pid="33/8557">Asadul K. Islam</na></co>
<co c="0"><na f="i/Ismail:Roslan" pid="49/6515">Roslan Ismail</na></co>
<co c="6"><na f="j/Jaatun:Martin_Gilje" pid="66/3035">Martin Gilje Jaatun</na></co>
<co c="0"><na f="j/Jager:Tibor" pid="53/1548">Tibor Jager</na></co>
<co c="0"><na f="j/J=auml=schke:Angela" pid="174/0742">Angela J&#228;schke</na></co>
<co c="0"><na f="j/J=oslash=sang:Audun" pid="j/AudunJosang">Audun J&#248;sang</na></co>
<co c="0"><na f="k/Kang:Baoyuan" pid="09/85">Baoyuan Kang</na></co>
<co c="-1"><na f="k/Kearney:Peter" pid="57/1444">Peter Kearney</na></co>
<co c="0"><na f="k/Kim:Hwankoo" pid="65/1749">Hwankoo Kim</na></co>
<co c="0"><na f="k/Kim:JungJoon" pid="22/227">JungJoon Kim</na></co>
<co c="0"><na f="k/Kim:Kwangjo" pid="98/3736">Kwangjo Kim</na></co>
<co c="0"><na f="k/Kock:Bor_de" pid="275/3369">Bor de Kock</na></co>
<co c="0"><na f="k/Kuppusamy:Lakshmi" pid="19/9126">Lakshmi Kuppusamy</na></co>
<co c="5"><na f="l/Larsen:Bj=oslash=rn_B=" pid="06/5507">Bj&#248;rn B. Larsen</na></co>
<co c="0"><na f="l/Lee:Byoungcheon" pid="12/4124">Byoungcheon Lee</na></co>
<co c="0"><na f="l/Lee:Kaleb" pid="05/10025">Kaleb Lee</na></co>
<co c="0"><na f="l/Li:Qinyi" pid="117/8987">Qinyi Li</na></co>
<co c="0"><na f="l/Lim:Jen" pid="17/4989">Jen Lim</na></co>
<co c="0"><na f="l/Lippold:Georg" pid="04/7224">Georg Lippold</na></co>
<co c="4"><na f="l/Liu:Xian" pid="08/2373">Xian Liu</na></co>
<co c="3"><na f="l/Loftus:Philip" pid="130/4765">Philip Loftus</na></co>
<co c="0"><na f="l/Looi:Mark" pid="34/5813">Mark Looi</na></co>
<co c="0"><na f="m/Maeder:Anthony_J=" pid="21/3309">Anthony J. Maeder</na></co>
<co c="0"><na f="m/Maitland:Greg" pid="85/3420">Greg Maitland</na></co>
<co c="0"><na f="m/Manulis:Mark" pid="62/484">Mark Manulis</na></co>
<co c="0"><na f="m/Mao:Wenbo" pid="52/2278">Wenbo Mao</na></co>
<co c="2"><na f="m/Marku:Enio" pid="247/7699">Enio Marku</na></co>
<co c="0"><na f="m/Mathuria:Anish" pid="54/5482">Anish Mathuria</na></co>
<co c="0"><na f="m/Millerjord:Lise" pid="294/0785">Lise Millerjord</na></co>
<co c="0"><na f="m/Mirisaee:Seyed_Hadi" pid="71/9240">Seyed Hadi Mirisaee</na></co>
<co c="0" n="2"><na f="m/Mj=oslash=lsnes:Stig_Fr=" pid="67/4994">Stig Fr. Mj&#248;lsnes</na><na>Stig Frode Mj&#248;lsnes</na></co>
<co c="0"><na f="m/Montague:Paul" pid="50/805">Paul Montague</na></co>
<co c="0"><na f="m/Moon:Sang=Jae" pid="40/6149">Sang-Jae Moon</na></co>
<co c="0"><na f="n/Ngo:Long" pid="60/266">Long Ngo</na></co>
<co c="0"><na f="n/Nguyen:Khanh_Quoc" pid="18/2927">Khanh Quoc Nguyen</na></co>
<co c="0" n="2"><na f="n/Nieto:Juan_Manuel_Gonz=aacute=lez" pid="g/JuanmaGNieto">Juan Manuel Gonz&#225;lez Nieto</na><na>Juanma Gonz&#225;lez Nieto</na></co>
<co c="0"><na f="n/Nyeem:Hussain" pid="04/10772">Hussain Nyeem</na></co>
<co c="0"><na f="o/Okamoto:Eiji" pid="74/2114">Eiji Okamoto</na></co>
<co c="0"><na f="o/Okamoto:Takeshi" pid="85/1299">Takeshi Okamoto</na></co>
<co c="0"><na f="p/Park:DongGook" pid="64/6683">DongGook Park</na></co>
<co c="0"><na f="p/Park:JeaHoon" pid="00/6114">JeaHoon Park</na></co>
<co c="0"><na f="p/Paterson:Kenneth_G=" pid="39/780">Kenneth G. Paterson</na></co>
<co c="0" n="2"><na f="p/Pavlovski:Christopher_J=" pid="89/2732">Christopher J. Pavlovski</na><na>Chris Pavlovski</na></co>
<co c="0"><na f="p/Peng:Kun" pid="04/2229">Kun Peng</na></co>
<co c="0"><na f="p/Pham_0001:Binh" pid="181/2751-1">Binh Pham 0001</na></co>
<co c="0"><na f="p/Pieprzyk:Josef" pid="p/JosefPieprzyk">Josef Pieprzyk</na></co>
<co c="0"><na f="p/Planitz:Birgit_M=" pid="01/6910">Birgit M. Planitz</na></co>
<co c="0"><na f="p/Poettering:Bertram" pid="48/8243">Bertram Poettering</na></co>
<co c="0"><na f="r/Raddum:H=aring=vard" pid="03/5363">H&#229;vard Raddum</na></co>
<co c="0"><na f="r/Radke:Kenneth" pid="85/9240">Kenneth Radke</na></co>
<co c="0"><na f="r/Rangasamy:Jothi" pid="68/9125">Jothi Rangasamy</na></co>
<co c="0"><na f="r/Reid:Jason" pid="74/1029">Jason Reid</na></co>
<co c="1"><na f="r/Rinsma=Melchert:Ingrid" pid="25/2020">Ingrid Rinsma-Melchert</na></co>
<co c="0"><na f="r/R=oslash=nne:Peter_B=" pid="172/4084">Peter B. R&#248;nne</na></co>
<co c="0"><na f="r/Russell:Selwyn" pid="97/4597">Selwyn Russell</na></co>
<co c="0"><na f="s/Safavi=Naini:Reihaneh" pid="s/ReihanehSafaviNaini">Reihaneh Safavi-Naini</na></co>
<co c="0"><na f="s/Salmasizadeh:Mahmoud" pid="72/252">Mahmoud Salmasizadeh</na></co>
<co c="5"><na f="s/Sandvoll:Mats" pid="169/8023">Mats Sandvoll</na></co>
<co c="3"><na f="s/Schaefer:Timothy_G=" pid="130/4786">Timothy G. Schaefer</na></co>
<co c="0"><na f="s/Seifi:Younes" pid="146/1947">Younes Seifi</na></co>
<co c="0" n="2"><na f="s/Simpson:Leonie_Ruth" pid="18/382">Leonie Ruth Simpson</na><na>Leonie Simpson</na></co>
<co c="-1"><na f="s/Smith:Andrew" pid="87/1676">Andrew Smith</na></co>
<co c="0"><na f="s/Smith_0001:Jason" pid="02/1964-1">Jason Smith 0001</na></co>
<co c="6"><na f="s/Sohoel:Halldis" pid="231/4668">Halldis Sohoel</na></co>
<co c="2"><na f="s/Sonkoly:Bal=aacute=zs" pid="23/1820">Bal&#225;zs Sonkoly</na></co>
<co c="0"><na f="s/Stebila:Douglas" pid="67/675">Douglas Stebila</na></co>
<co c="0"><na f="s/Strand_0001:Martin" pid="130/8671-1">Martin Strand 0001</na></co>
<co c="0"><na f="s/Sun:Dongdong" pid="30/7002">Dongdong Sun</na></co>
<co c="0"><na f="s/Suriadi:Suriadi" pid="73/3463">Suriadi Suriadi</na></co>
<co c="0"><na f="s/Susilo:Willy" pid="12/3447">Willy Susilo</na></co>
<co c="0"><na f="t/Tin:Yiu_Shing_Terry" pid="47/4046">Yiu Shing Terry Tin</na></co>
<co c="0"><na f="t/Toorani:Mohsen" pid="71/4184">Mohsen Toorani</na></co>
<co c="0"><na f="t/Tritilanunt:Suratose" pid="13/4225">Suratose Tritilanunt</na></co>
<co c="0"><na f="t/Tso:Raylin" pid="73/5733">Raylin Tso</na></co>
<co c="0"><na f="v/Vasanta:Harikrishna" pid="24/5893">Harikrishna Vasanta</na></co>
<co c="0"><na f="v/Viswanathan:Kapalee" pid="29/5594">Kapalee Viswanathan</na></co>
<co c="0"><na f="v/Viswanathan:Kapali" pid="77/6038">Kapali Viswanathan</na></co>
<co c="1"><na f="w/Witten:Ian_H=" pid="w/IanHWitten">Ian H. Witten</na></co>
<co c="0"><na f="w/Wong:Kenneth_Koon=Ho" pid="46/1010">Kenneth Koon-Ho Wong</na></co>
<co c="0"><na f="w/Wu:Qianhong" pid="54/7015">Qianhong Wu</na></co>
<co c="0"><na f="w/Wu:Shuang" pid="85/3231">Shuang Wu</na></co>
<co c="0"><na f="y/Yang:Jeongmo" pid="29/3487">Jeongmo Yang</na></co>
<co c="0"><na f="y/Yoo:Seungjae" pid="46/1816">Seungjae Yoo</na></co>
</coauthors>
</dblpperson>

