Navigasjon

  • Hopp til innhold
NTNU Hjemmeside NTNU Hjemmeside

ntnu.no

  • Studier
    • Studere på NTNU
    • Finn studieprogram
    • Søke opptak
    • Videreutdanning og deltid
    • Forkurs og oppfriskning
  • Studentliv
    • Student i Gjøvik
    • Student i Trondheim
    • Student i Ålesund
  • Forskning og innovasjon
    • Forskning
    • Innovasjon
    • Satsingsområder
    • Toppforskning
    • Ekspertlister
    • Ph.d.
  • Om NTNU
    • Fakulteter og institutter
    • Sentre
    • Bibliotek
    • Kart
    • Ledige stillinger
    • Arrangement
    • Nyheter
    • Kontakt oss
    • Om NTNU
  1. Ansatte

Språkvelger

English

Colin Alexander Boyd

Last ned pressefoto
Last ned pressefoto
Foto:

Colin Alexander Boyd

Professor
Institutt for informasjonssikkerhet og kommunikasjonsteknologi

colin.boyd@ntnu.no
73551758 98065197 Elektro B, 225, Gløshaugen
Publikasjoner Undervisning Formidling

Publikasjoner

  • Kronologisk
  • Etter kategori
  • Alle publikasjoner i Nasjonalt vitenarkiv (NVA)

2025

  • Millerjord, Lise; Boyd, Colin Alexander; Gjøsteen, Kristian; Gligoroski, Danilo; Mjølsnes, Stig Frode. (2025) Key Exchange in a Post Quantum World. Norges teknisk-naturvitenskapelige universitet Norges teknisk-naturvitenskapelige universitet
    Doktorgradsavhandling
  • Li, Qinyi; Millerjord, Lise; Boyd, Colin Alexander. (2025) TEAKEX: TESLA-Authenticated Group Key Exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2024

  • Marku, Enio; Boyd, Colin Alexander; Biczok, Gergely. (2024) SafeLib: A Comprehensive Framework for Secure Outsourcing of Network Functions. IEEE Transactions on Network and Service Management
    Vitenskapelig artikkel

2023

  • Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise. (2023) Hybrid Group Key Exchange with Application to Constrained Networks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Millerjord, Lise; Kock, Bor de. (2023) Modular Design of KEM-Based Authenticated Key Exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2022

  • Boyd, Colin Alexander. (2022) Key Exchange (Chapter 9).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2021

  • Boyd, Colin Alexander; Davies, Gareth T.; Kock, Bor de; Gellert, Kai; Jager, Tibor; Millerjord, Lise. (2021) Symmetric Key Exchange with Full Forward Security and Robust Synchronization. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander. (2021) Introduction to the Special Issue on TLS 1.3. Journal of Cryptology
    Leder
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2021) SafeLib: a practical library for outsourcing stateful network functions securely.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2020

  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Protocols for Authentication and Key Establishment. Springer Springer
    Vitenskapelig monografi
  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Preface. Information Security and Cryptography (IS&C)
    Leder
  • Boyd, Colin Alexander; Haines, Thomas Edmund; Rønne, Peter. (2020) Vote Selling Resistant Voting. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2020) Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Communications Magazine
    Vitenskapelig artikkel
  • Au, Man Ho; Han, Jinguang; Wu, Qianhong; Boyd, Colin Alexander. (2020) Special Issue on Cryptographic Currency and Blockchain Technology. Future Generation Computer Systems
    Leder
  • Boyd, Colin Alexander; Gellert, Kai. (2020) A Modern View on Forward Security. Computer journal
    Vitenskapelig artikkel

2019

  • Boyd, Colin Alexander; Hale, Britta. (2019) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2019) Towards protected VNFs for multi-operator service delivery.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2018

  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander. (2018) OWASP Top 10 - Do Startups Care?.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Boyd, Colin Alexander; Carr, Christopher. (2018) Valuable Puzzles for Proofs-of-Work. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2017

  • Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. (2017) Key recovery: Inert and public. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas. (2017) Bitcoin Unchained. ERCIM News
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Hale, Britta. (2017) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2016

  • Boyd, Colin Alexander; Cremers, Cas; Feltz, Michele; Paterson, K; Poettering, Bertram; Stebila, Douglas. (2016) ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Carr, Christopher. (2016) Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Radke, Kenneth; Boyd, Colin Alexander. (2016) Security Proofs for Protocols Involving Humans. Computer journal
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News
    Vitenskapelig artikkel

2015

  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online
    Vitenskapelig artikkel
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Modelling attacks on self-authentication watermarking. Multimedia Tools and Applications
    Vitenskapelig artikkel
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing
    Vitenskapelig artikkel
  • Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. (2015) PassCue: The Shared Cues System in Practice.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2014

  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing
    Vitenskapelig artikkel
  • Albeshri, Aiiad; Boyd, Colin Alexander; Nieto, Juan Gonzalez. (2014) Enhanced GeoProof: improved geographic assurance for data in the cloud. International Journal of Information Security
    Vitenskapelig artikkel
  • Seifi, Y; Suriadi, Suriadi; Foo, Ernest; Boyd, Colin Alexander. (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks (IJSN)
    Vitenskapelig artikkel
  • Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. (2014) Continuous After-the-Fact Leakage-Resilient Key Exchange.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Radke, Kenneth; Boyd, Colin Alexander; Nieto, Juan Gonzalez; Bartlett, Harry. (2014) CHURNs: Freshness Assurance for Humans. Computer journal
    Vitenskapelig artikkel
  • Hale, Britta J.; Boyd, Colin Alexander. (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2013

  • Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh. (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Radke, Kenneth; Boyd, Colin Alexander; Nieto, Juan Gonzalez; Buys, Laurie. (2013) "Who decides?" Security and Privacy in the Wild.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

Tidsskriftspublikasjoner

  • Li, Qinyi; Millerjord, Lise; Boyd, Colin Alexander. (2025) TEAKEX: TESLA-Authenticated Group Key Exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Marku, Enio; Boyd, Colin Alexander; Biczok, Gergely. (2024) SafeLib: A Comprehensive Framework for Secure Outsourcing of Network Functions. IEEE Transactions on Network and Service Management
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise. (2023) Hybrid Group Key Exchange with Application to Constrained Networks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Millerjord, Lise; Kock, Bor de. (2023) Modular Design of KEM-Based Authenticated Key Exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth T.; Kock, Bor de; Gellert, Kai; Jager, Tibor; Millerjord, Lise. (2021) Symmetric Key Exchange with Full Forward Security and Robust Synchronization. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander. (2021) Introduction to the Special Issue on TLS 1.3. Journal of Cryptology
    Leder
  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Preface. Information Security and Cryptography (IS&C)
    Leder
  • Boyd, Colin Alexander; Haines, Thomas Edmund; Rønne, Peter. (2020) Vote Selling Resistant Voting. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2020) Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Communications Magazine
    Vitenskapelig artikkel
  • Au, Man Ho; Han, Jinguang; Wu, Qianhong; Boyd, Colin Alexander. (2020) Special Issue on Cryptographic Currency and Blockchain Technology. Future Generation Computer Systems
    Leder
  • Boyd, Colin Alexander; Gellert, Kai. (2020) A Modern View on Forward Security. Computer journal
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Hale, Britta. (2019) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Carr, Christopher. (2018) Valuable Puzzles for Proofs-of-Work. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. (2017) Key recovery: Inert and public. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas. (2017) Bitcoin Unchained. ERCIM News
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Hale, Britta. (2017) Secure Channels and Termination: The Last Word on TLS. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Cremers, Cas; Feltz, Michele; Paterson, K; Poettering, Bertram; Stebila, Douglas. (2016) ASICS: authenticated key exchange security incorporating certification systems. International Journal of Information Security
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Carr, Christopher. (2016) Fair client puzzles from the Bitcoin blockchain. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Radke, Kenneth; Boyd, Colin Alexander. (2016) Security Proofs for Protocols Involving Humans. Computer journal
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News
    Vitenskapelig artikkel
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Content-independent embedding scheme for multi-modal medical image watermarking. Biomedical engineering online
    Vitenskapelig artikkel
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Protecting encrypted cookies from compression Side-Channel attacks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Modelling attacks on self-authentication watermarking. Multimedia Tools and Applications
    Vitenskapelig artikkel
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2015) Watermarking capacity control for dynamic payload embedding. Advances in Intelligent Systems and Computing
    Vitenskapelig artikkel
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous after-the-fact leakage-resilient eCK-secure key exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander. (2014) Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP Journal on Advances in Signal Processing
    Vitenskapelig artikkel
  • Albeshri, Aiiad; Boyd, Colin Alexander; Nieto, Juan Gonzalez. (2014) Enhanced GeoProof: improved geographic assurance for data in the cloud. International Journal of Information Security
    Vitenskapelig artikkel
  • Seifi, Y; Suriadi, Suriadi; Foo, Ernest; Boyd, Colin Alexander. (2014) Security properties analysis in a TPM-based protocol. International Journal of Security and Networks (IJSN)
    Vitenskapelig artikkel
  • Radke, Kenneth; Boyd, Colin Alexander; Nieto, Juan Gonzalez; Bartlett, Harry. (2014) CHURNs: Freshness Assurance for Humans. Computer journal
    Vitenskapelig artikkel

Bøker

  • Boyd, Colin Alexander; Mathuria, Anish; Stebila, Douglas. (2020) Protocols for Authentication and Key Establishment. Springer Springer
    Vitenskapelig monografi

Del av bok/rapport

  • Boyd, Colin Alexander. (2022) Key Exchange (Chapter 9).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2021) SafeLib: a practical library for outsourcing stateful network functions securely.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander. (2019) Towards protected VNFs for multi-operator service delivery.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander. (2018) OWASP Top 10 - Do Startups Care?.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. (2015) PassCue: The Shared Cues System in Practice.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. (2014) Continuous After-the-Fact Leakage-Resilient Key Exchange.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Hale, Britta J.; Boyd, Colin Alexander. (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh. (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Radke, Kenneth; Boyd, Colin Alexander; Nieto, Juan Gonzalez; Buys, Laurie. (2013) "Who decides?" Security and Privacy in the Wild.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

Rapport

  • Millerjord, Lise; Boyd, Colin Alexander; Gjøsteen, Kristian; Gligoroski, Danilo; Mjølsnes, Stig Frode. (2025) Key Exchange in a Post Quantum World. Norges teknisk-naturvitenskapelige universitet Norges teknisk-naturvitenskapelige universitet
    Doktorgradsavhandling

Undervisning

Emner

  • TTM4905 - Masteroppgave

Formidling

2020

  • Vitenskapelig foredrag
    wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. (2020) A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains 2020-07-20 - 2020-07-21

2017

  • Faglig foredrag
    Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17) 2017-04-02 - 2017-04-06
  • Vitenskapelig foredrag
    Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2017) Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity , Darmstadt 2017-11-16 -

2016

  • Vitenskapelig foredrag
    Boyd, Colin Alexander. (2016) Modelling the Security of Key Exchange. Tenth International Conference on Provable Security (ProvSec 2016) , Nanjing 2016-11-10 - 2016-11-12
  • Vitenskapelig foredrag
    Biczok, Gergely; Sonkoly, Balázs; Bereczky, Nikolett; Boyd, Colin Alexander. (2016) Private VNFs for collaborative multi-operator service delivery: An architectural case. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium 2016-04-25 - 2016-04-29
  • Vitenskapelig foredrag
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) A Hierarchy of Authentication and Authenticated Encryption Constructions with Application to TLS. TU-Darmstadt Invited Talk , Darmstadt, Germany 2016-04-21 - 2016-04-21
  • Vitenskapelig foredrag
    Boyd, Colin Alexander; Hale, Britta. (2016) Secure Channels and Termination: The Last Word on TLS. Secure Key Exchange and Channel Protocols (SKECH) Workshop 2016 , Bertinoro, Italy 2016-07-01 - 2016-07-04
  • Vitenskapelig foredrag
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) Stateful Authentication and AEAD Experiments: Constructing a Bridge in the Analysis of TLS. COINS Finse Winter School 2016 , Finse, Norway 2016-04-24 - 2016-04-29
  • Vitenskapelig foredrag
    Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas. (2016) From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016 , San Francisco, USA 2016-02-29 - 2016-03-04
  • Vitenskapelig foredrag
    Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas. (2016) Key Recovery: Inert, Public, Transparent (KRIPT). Mycrypt 2016: Paradigm-shifting Crypto , Pullman Kuala Lumpur City Centre 2016-12-01 - 2016-12-02

2015

  • Vitenskapelig foredrag
    Alawatugoda, Janaka; Stebila, Douglas; Boyd, Colin Alexander. (2015) Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography and Data Security 2015-01-26 - 2015-01-30
  • Vitenskapelig foredrag
    Boyd, Colin Alexander; Stebila, Douglas; Alawatugoda, Janaka. (2015) Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. Fifteenth IMA International Conference on Cryptography and Coding , Oxford 2015-12-15 - 2015-12-17

2014

  • Vitenskapelig foredrag
    Alawatugoda, Janaka; Boyd, Colin Alexander; Stebila, Douglas. (2014) Continuous after-the-fact leakage-resilient key exchange. Information Security and Privacy 19th Australasian Conference, ACISP 2014 2014-07-07 - 2014-07-09
  • Vitenskapelig foredrag
    Sandvoll, Mats; Boyd, Colin Alexander; Larsen, Bjørn B.. (2014) PassCue: the Shared Cues System in Practice. The 7 th International Conference on Passwords , Trondheim 2014-12-08 - 2014-12-10
  • Vitenskapelig foredrag
    Radke, Kenneth; Boyd, Colin Alexander; Nieto, Juan Gonzalez; Manulis, Mark; Stebila, Douglas. (2014) Formalising Human Recognition: a Fundamental Building Block for Security Proofs. Australasian Information Security Conference (ACSW-AISC) 2014 2014-01-20 - 2014-01-23
  • Vitenskapelig foredrag
    Hale, Britta J.; Boyd, Colin Alexander. (2014) Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. SSR'14 , Royal Holloway University of London, Egham, UK 2014-12-16 - 2014-12-17

2013

  • Vitenskapelig foredrag
    Radke, Kenneth; Boyd, Colin Alexander; Nieto, Juan Gonzalez; Buys, Laurie. (2013) "Who decides?" Security and Privacy in the Wild. OzCHI 2013 , Adelaide 2013-11-25 - 2013-11-29
  • Vitenskapelig foredrag
    Nyeem, Hussain; Boyd, Colin Alexander; Boles, Wageeh. (2013) Counterfeiting attacks on block-wise dependent fragile watermarking schemes. 6th International Conference on Security of Information and Networks , Aksaray University 2013-11-26 - 2013-11-28

NTNU – Norges teknisk-naturvitenskapelige universitet

  • For ansatte
  • |
  • For studenter
  • |
  • Innsida
  • |
  • Blackboard

Studere

  • Om studier
  • Studieprogram
  • Emner
  • Videreutdanning
  • Karriere

Aktuelt

  • Nyheter
  • Arrangement
  • Jobbe ved NTNU

Om NTNU

  • Om NTNU
  • Bibliotek
  • Strategi
  • Forskning
  • Satsingsområder
  • Innovasjon
  • Organisasjonskart
  • Utdanningskvalitet

Kontakt

  • Kontakt oss
  • Finn ansatte
  • Spør en ekspert
  • Pressekontakter
  • Kart

NTNU i tre byer

  • NTNU i Gjøvik
  • NTNU i Trondheim
  • NTNU i Ålesund

Om nettstedet

  • Bruk av informasjonskapsler
  • Tilgjengelighetserklæring
  • Personvern
  • Ansvarlig redaktør
Facebook Instagram Linkedin Snapchat Tiktok Youtube
Logg inn
NTNU logo