Colin Boyd

Research interests

  • Proofs and designs for cryptographic protocols
  • User-oriented security protocols

Selected publications

  • Gorantla MC, Boyd C, Gonzalez Nieto J, Manulis M, (2011) Modeling key compromise impersonation attacks on group key exchange protocols, ACM Transactions on Information and System Security p1-24
  • Radke K, Brereton M, Mirisaee S, Ghelawat S, Boyd C, Gonzalez Nieto J, (2011) Tensions in developing a secure collective information practice - the case of agile ridesharing, Lecture Notes in Computer Science [Human-Computer Interaction - INTERACT 2011 -13th IFIP TC 13 International Conference Proceedings, Part II] p524-532
  • Ngo L, Boyd C, Gonzalez Nieto JM, (2011) Automated proofs for Diffie-Hellman-based key exchanges, Proceedings of 24th IEEE Computer Security Foundations Symposium p51-65
  • Stebila D, Kuppusamy L, Rangasamy J, Boyd C, Gonzalez Nieto JM, (2011) Stronger difficulty notions for client puzzles and denial-of-service resistant protocols, Lecture Notes in Computer Science : Topics in Cryptology - CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011 p284-301
  • Du R, Foo E, Boyd C, (2008) Designing a secure e-tender submission protocol, Electronic Commerce Research p115-142
  • Josang A, Ismail R, Boyd CA, (2007) A Survey of Trust and Reputation Systems for Online Service Provision, Decision Support Systems p618-644
  • Peng K, Boyd CA, Dawson EP, (2007) Batch Zero-Knowledge Proof and Verification and Its Applications, ACM Transactions on Information and System Security p1-28
  • Choo K, Boyd C, Hitchcock YR, (2005) Examining Indistinguishability-Based Proof Models for Key Establishment Protocols, Lecture Notes in Computer Science p585-604
  • Gonzalez-Nieto JM, Boyd C, Dawson EP, (2005) A Public Key Cryptosystem Based on a Subgroup Membership Problem, Design, Codes and Cryptography p301-316
  • Boyd C, Mathuria A, (2003) Protocols for Authentication and Key Establishment p1-300

Scientific activities