CHURNs: freshness assurance for humans K Radke, C Boyd, JG Nieto, H Bartlett The Computer Journal 58 (10), 2404-2425, 2015 | 4 | 2015 |
Automated proofs for computational indistinguishability L Ngo, C Boyd, JG Nieto The Computer Journal 57 (10), 1513-1536, 2014 | | 2014 |
Enhanced geoproof: improved geographic assurance for data in the cloud A Albeshri, C Boyd, JG Nieto International Journal of Information Security 13, 191-198, 2014 | 29 | 2014 |
Formalising human recognition: a fundamental building block for security proofs K Radke, C Boyd, J Gonzalez Nieto, M Manulis, D Stebila Proceedings of the Twelfth Australasian Information Security Conference …, 2014 | 5 | 2014 |
" Who decides?" security and privacy in the wild K Radke, C Boyd, JG Nieto, L Buys Proceedings of the 25th Australian Computer-Human Interaction Conference …, 2013 | 8 | 2013 |
Predicate encryption for multi‐inner‐products D Sun, C Boyd, JMG Nieto Security and Communication Networks 6 (3), 325-339, 2013 | 1 | 2013 |
Forward-secure hierarchical predicate encryption JM González Nieto, M Manulis, D Sun Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013 | 13 | 2013 |
A security architecture for cloud storage combining proofs of retrievability and fairness A Albeshri, C Boyd, JG Nieto 3rd International Conference on Cloud Computing, GRIDS and Virtualization, 30-35, 2012 | 11 | 2012 |
Geoproof: Proofs of geographic location for cloud computing environment A Albeshri, C Boyd, JG Nieto 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 70 | 2012 |
Practical client puzzles in the standard model L Kuppusamy, J Rangasamy, D Stebila, C Boyd, JG Nieto Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | 10 | 2012 |
Mitigating On‐Off attacks in reputation‐based secure data aggregation for wireless sensor networks H Alzaid, E Foo, JG Nieto, E Ahmed Security and Communication Networks 5 (2), 125-144, 2012 | 14 | 2012 |
Improving the efficiency of RFID authentication with pre-computation K Lee, JMG Nieto, C Boyd Proceedings of the Tenth Australasian Information Security Conference-Volume …, 2012 | 6 | 2012 |
Who is more susceptible to phishing emails?: a Saudi Arabian study I Alseadoon, T Chan, E Foo, J Gonzalez Nieto | 61 | 2012 |
Publicly verifiable ciphertexts JM González Nieto, M Manulis, B Poettering, J Rangasamy, D Stebila Security and Cryptography for Networks: 8th International Conference, SCN …, 2012 | 17* | 2012 |
A state-aware RFID privacy model with reader corruption K Lee, JG Nieto, C Boyd Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012 | 9 | 2012 |
Towards a secure human-and-computer mutual authentication protocol K Radke, C Boyd, J Gonzalez Nieto, M Brereton Information Security 2012-Proceedings of the Tenth Australasian Information …, 2012 | 5 | 2012 |
Efficient modular exponentiation-based puzzles for denial-of-service protection J Rangasamy, D Stebila, L Kuppusamy, C Boyd, J Gonzalez Nieto Information Security and Cryptology-ICISC 2011: 14th International …, 2012 | 13 | 2012 |
Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking K Lee, C Boyd, JM González-Nieto Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 1 | 2012 |
Fully private revocable predicate encryption JM González-Nieto, M Manulis, D Sun Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 36 | 2012 |
Effort-release public-key encryption from cryptographic puzzles J Rangasamy, D Stebila, C Boyd, JM González-Nieto, L Kuppusamy Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 2 | 2012 |