" Who decides?" security and privacy in the wild K Radke, C Boyd, JG Nieto, L Buys Proceedings of the 25th Australian Computer-Human Interaction Conference …, 2013 | 8 | 2013 |
A forward & backward secure key management in wireless sensor networks for PCS/SCADA H Alzaid, DG Park, JG Nieto, C Boyd, E Foo Emerging technologies in wireless ad-hoc networks: applications and future …, 2011 | 26 | 2011 |
A framework for security analysis of key derivation functions CC Wen, E Dawson, JM González Nieto, L Simpson Information Security Practice and Experience: 8th International Conference …, 2012 | 8 | 2012 |
A novel method to maintain privacy in mobile agent applications K Peng, E Dawson, JG Nieto, E Okamoto, J López Cryptology and Network Security: 4th International Conference, CANS 2005 …, 2005 | 4 | 2005 |
A password-based authenticator: Security proof and applications Y Hitchcock, YST Tin, JM Gonzalez-Nieto, C Boyd, P Montague Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003 | 20 | 2003 |
A public key cryptosystem based on the subgroup membership problem J Nieto, C Boyd, E Dawson Information and Communications Security, 352-363, 2001 | 43* | 2001 |
A secure framework for user privacy in heterogeneous location networks H Vasanta, YST Tin, C Boyd, M Looi, JM González Nieto Mobility Aware Technologies and Applications: First International Workshop …, 2004 | 2 | 2004 |
A security architecture for cloud storage combining proofs of retrievability and fairness A Albeshri, C Boyd, JG Nieto 3rd International Conference on Cloud Computing, GRIDS and Virtualization, 30-35, 2012 | 11 | 2012 |
A self-escrowed integer factorisation based public key infrastructure J Gonzalez Nieto, K Viswanathan, C Boyd, E Dawson VII Spanish Meeting on Cryptology and Information Security (RECSI VII), 315-327, 2002 | 3 | 2002 |
A state-aware RFID privacy model with reader corruption K Lee, JG Nieto, C Boyd Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012 | 9 | 2012 |
A taxonomy of secure data aggregation in wireless sensor networks H Alzaid, E Foo, JMG Nieto, DG Park International Journal of Communication Networks and Distributed Systems 8 (1 …, 2012 | 16 | 2012 |
Access control in federated databases: how legal issues shape security M Burdon, J Gonzalez Nieto, S Christensen, E Dawson, WD Duncan, ... Electronic Government: 6th International Conference, EGOV 2007, Regensburg …, 2007 | | 2007 |
An integrated approach to cryptographic mitigation of denial-of-service attacks J Rangasamy, D Stebila, C Boyd, JG Nieto Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 22 | 2011 |
Attribute-based authenticated key exchange MC Gorantla, C Boyd, JM González Nieto Australasian Conference on Information Security and Privacy, 300-317, 2010 | 73 | 2010 |
Automated proof for formal indistinguishability and its applications L Ngo, C Boyd, JM Gonzalez Nieto The 7th Workshop on Formal and Computational Cryptography (FCC 2011), 2011 | | 2011 |
Automated proofs for computational indistinguishability L Ngo, C Boyd, JG Nieto The Computer Journal 57 (10), 1513-1536, 2014 | | 2014 |
Automated proofs for Diffie-Hellman-based key exchanges L Ngo, C Boyd, J Gonz 2011 IEEE 24th Computer Security Foundations Symposium, 51-65, 2011 | 11 | 2011 |
Automating computational proofs for public-key-based key L Ngo, C Boyd, JG Nieto | | 2010 |
Automating computational proofs for public-key-based key exchange L Ngo, C Boyd, JG Nieto International Conference on Provable Security, 53-69, 2010 | 7 | 2010 |
Autonomic and Trusted Computing: 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings JG Nieto, G Wang, W Reif, J Indulska Springer Science & Business Media, 2009 | | 2009 |