Adjunct Professor
Colin Boyd
Faculty of Science,
School of Computer Science
Biography
Research theme: Secure and Resilient InfrastructureResearch discipline: Information Security
Research area Proofs and designs for cryptographic protocols The cryptology group in the Information Security Institute has extensive experience in design and analysis of cryptographic protocols. This includes generic protocols for authentication and key establishment as well as protocols aimed at specific technologies such as RFID devices and industrial control systems. User-oriented security protocols It is today widely recognised that technological solutions must be combined with social disciplines in order to achieve truly secure systems. This emerging research area aims to use ideas from economics and psychology to produce integrated security models and to analyse protocols from this new perspective.
Personal details
Positions
- Adjunct Professor
Faculty of Science,
School of Computer Science
Research field
Data Format, Computer Software, Distributed Computing
Field of Research code, Australian and New Zealand Standard Research Classification (ANZSRC), 2008
Qualifications
- Ph.D (University of Warwick)
- B.Sc(Hons) (University of Warwick)
Professional memberships and associations
- Editorial Board Member (Associate Editor): Designs, Codes and Cryptography and IEEE Transactions on Information Forensics and Security
Publications
- Gorantla, M., Boyd, C., Gonzalez Nieto, J. & Manulis, M. (2011). Modeling key compromise impersonation attacks on group key exchange protocols. ACM Transactions on Information and System Security, 14(4), 1–24. https://eprints.qut.edu.au/48117
- Radke, K., Brereton, M., Mirisaee, S., Ghelawat, S., Boyd, C. & Gonzalez Nieto, J. (2011). Tensions in developing a secure collective information practice - the case of agile ridesharing. Human-Computer Interaction - INTERACT 2011 -13th IFIP TC 13 International Conference, Proceedings, Part II [Lecture Notes in Computer Science, Vol 6947], 524–532. https://eprints.qut.edu.au/47744
- Ngo, L., Boyd, C. & Gonzalez Nieto, J. (2011). Automated proofs for Diffie-Hellman-based key exchanges. Proceedings of 24th IEEE Computer Security Foundations Symposium, 51–65. https://eprints.qut.edu.au/42550
- Stebila, D., Kuppusamy, L., Rangasamy, J., Boyd, C. & Gonzalez Nieto, J. (2011). Stronger difficulty notions for client puzzles and denial-of-service resistant protocols. Topics in Cryptology - CT-RSA 2011: The Cryptographers' Track at the RSA Conference 2011, Proceedings [Lecture Notes in Computer Science, Vol 6558], 284–301. https://eprints.qut.edu.au/40036
- Du, R., Foo, E. & Boyd, C. (2008). Designing a secure e-tender submission protocol. Electronic Commerce Research, 8(3), 115–142. https://eprints.qut.edu.au/30848
- Josang, A., Ismail, R. & Boyd, C. (2007). A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, 43(2), 618–644. https://eprints.qut.edu.au/7280
- Peng, K., Boyd, C. & Dawson, E. (2007). Batch Zero-Knowledge Proof and Verification and Its Applications. ACM Transactions on Information and System Security, 10(2), 1–28. https://eprints.qut.edu.au/43171
- Choo, K., Boyd, C. & Hitchcock, Y. (2005). Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Lecture Notes in Computer Science, 3788, 585–604. https://eprints.qut.edu.au/2181
- Gonzalez-Nieto, J., Boyd, C. & Dawson, E. (2005). A Public Key Cryptosystem Based on a Subgroup Membership Problem. Designs, Codes and Cryptography, 36(3), 301–316. https://eprints.qut.edu.au/10692
- Boyd, C. & Mathuria, A. (2003). Protocols for Authentication and Key Establishment. Springer. https://eprints.qut.edu.au/9636
QUT ePrints
For more publications by Colin, explore their research in QUT ePrints (our digital repository).
Supervision
Completed supervisions (Doctorate)
- Encryption Schemes and Key Exchange Protocols in the Certificateless Setting (2010)
- A Multiple Control Fuzzy Vault - A Multiple Control Biometric Cryptosystem with Fingerprints (2009)
- Secure Public-Key Encryption from Factorisation-Related Problems (2007)
- Key Establishment: Proofs and Refutations (2006)
- Secure, Privacy Assured Mechanisms for Heterogeneous Contextual Environments (2006)
- Secure Electronic Voting with Flexible Ballot Structure (2005)
- Secure Key Establishment for Mobile Networks (2005)
- Analysis and Design of Secure Sealed-Bid Auction (2004)
- Security of Reputation Systems (2004)
- Design of Practical Electronic Cash Schemes (2003)