D-Index & Metrics Best Publications
Computer Science
Norway
2022

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 44 Citations 13,940 308 World Ranking 4698 National Ranking 11

Research.com Recognitions

Awards & Achievements

2022 - Research.com Computer Science in Norway Leader Award

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Computer security
  • The Internet

His scientific interests lie mostly in Computer security, Cryptography, Theoretical computer science, Public-key cryptography and Key. The study incorporates disciplines such as Scheme and Signature in addition to Computer security. His work in the fields of Cryptography, such as Cryptosystem, overlaps with other areas such as Key establishment.

As a member of one scientific family, Colin Boyd mostly works in the field of Theoretical computer science, focusing on Digital watermarking and, on occasion, Liability. His Public-key cryptography research incorporates themes from Shared secret and Security parameter. His Key study incorporates themes from Class and Provable security.

His most cited work include:

  • A survey of trust and reputation systems for online service provision (2860 citations)
  • Information Security and Privacy (1064 citations)
  • Advances in Cryptology - ASIACRYPT 2001 (791 citations)

What are the main themes of his work throughout his whole career to date?

Colin Boyd mainly focuses on Computer security, Cryptography, Theoretical computer science, Public-key cryptography and Encryption. As a part of the same scientific study, Colin Boyd usually deals with the Computer security, concentrating on Protocol and frequently concerns with Forward secrecy. In his study, Signature is strongly linked to Scheme, which falls under the umbrella field of Cryptography.

His Theoretical computer science research is multidisciplinary, relying on both Random oracle, Hash function and Standard model. His Public-key cryptography research incorporates elements of Cryptosystem and Distributed computing. His study in Key exchange is interdisciplinary in nature, drawing from both Password and Computer security model.

He most often published in these fields:

  • Computer security (59.25%)
  • Cryptography (30.29%)
  • Theoretical computer science (19.57%)

What were the highlights of his more recent work (between 2012-2021)?

  • Computer security (59.25%)
  • Cryptography (30.29%)
  • Encryption (14.48%)

In recent papers he was focusing on the following fields of study:

Computer security, Cryptography, Encryption, Computer network and Digital watermarking are his primary areas of study. Computer security is closely attributed to Cloud computing security in his study. Colin Boyd has included themes like Theoretical computer science, Public key infrastructure and State in his Cryptography study.

His Encryption research integrates issues from Cryptographic protocol and Information security. His work is dedicated to discovering how Computer network, Computer security model are connected with Certificate authority and other disciplines. Colin Boyd focuses mostly in the field of Digital watermarking, narrowing it down to matters related to Embedding and, in some cases, Distortion, Scheme, Multimedia and Medical imaging.

Between 2012 and 2021, his most popular works were:

  • A review of medical image watermarking requirements for teleradiology. (92 citations)
  • A Guide to Fully Homomorphic Encryption. (79 citations)
  • Digital image watermarking: its formal model, fundamental properties and possible attacks (48 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • The Internet
  • Computer security

His primary areas of study are Computer security, Digital watermarking, Cryptography, Adversary and Image. His study in Authentication, Encryption, Key, Cloud storage and Session key are all subfields of Computer security. The various areas that Colin Boyd examines in his Digital watermarking study include Scheme, Embedding, Multimedia and Medical imaging.

His Cryptography study combines topics from a wide range of disciplines, such as Homomorphic encryption, State and Field. Colin Boyd combines subjects such as Authenticated Key Exchange and Computer security model with his study of Adversary. His work deals with themes such as Watermarking attack, Theoretical computer science and Component, which intersect with Image.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A survey of trust and reputation systems for online service provision

Audun Jøsang;Roslan Ismail;Colin Boyd.
decision support systems (2007)

4676 Citations

A survey of trust and reputation systems for online service provision

Audun Jøsang;Roslan Ismail;Colin Boyd.
decision support systems (2007)

4676 Citations

Information Security and Privacy

Colin Boyd;Juan Manuel González Nieto.
Lecture Notes in Computer Science (1996)

1550 Citations

Information Security and Privacy

Colin Boyd;Juan Manuel González Nieto.
Lecture Notes in Computer Science (1996)

1550 Citations

Advances in Cryptology - ASIACRYPT 2001

Colin Boyd.
(2001)

1261 Citations

Protocols for Authentication and Key Establishment

Colin Boyd;Anish Mathuria.
(2003)

951 Citations

Protocols for Authentication and Key Establishment

Colin Boyd;Anish Mathuria.
(2003)

951 Citations

Cryptography and Coding

Colin Boyd.
(1995)

825 Citations

Off-Line Fair Payment Protocols Using Convertible Signatures

Colin Boyd;Ernest Foo.
international cryptology conference (1998)

289 Citations

Off-Line Fair Payment Protocols Using Convertible Signatures

Colin Boyd;Ernest Foo.
international cryptology conference (1998)

289 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Colin Boyd

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 100

Yi Mu

Yi Mu

Fujian Normal University

Publications: 89

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 48

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 41

Jie Zhang

Jie Zhang

Nanyang Technological University

Publications: 41

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 40

Fangguo Zhang

Fangguo Zhang

Sun Yat-sen University

Publications: 38

Guomin Yang

Guomin Yang

Singapore Management University

Publications: 36

Javier Lopez

Javier Lopez

University of Malaga

Publications: 36

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 35

Liqun Chen

Liqun Chen

University of Surrey

Publications: 34

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 34

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 29

Audun Jøsang

Audun Jøsang

University of Oslo

Publications: 28

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 28

Huaxiong Wang

Huaxiong Wang

Nanyang Technological University

Publications: 27

Trending Scientists

T. N. Vijaykumar

T. N. Vijaykumar

Purdue University West Lafayette

Keith J. Stevenson

Keith J. Stevenson

Skolkovo Institute of Science and Technology

Victor W. Day

Victor W. Day

University of Kansas

Larry A. Donoso

Larry A. Donoso

Wills Eye Hospital

Jinrong Min

Jinrong Min

Structural Genomics Consortium

Joshua D. Smith

Joshua D. Smith

University of Washington

Michel Vidal

Michel Vidal

University of Montpellier

Frances Wall

Frances Wall

University of Exeter

Stephen S. Gao

Stephen S. Gao

Missouri University of Science and Technology

Mahlon R. DeLong

Mahlon R. DeLong

Emory University

Cagla Eroglu

Cagla Eroglu

Duke University

Fernando Maestú

Fernando Maestú

Complutense University of Madrid

Willem J. M. Levelt

Willem J. M. Levelt

Max Planck Society

Barry H. Greenberg

Barry H. Greenberg

University of California, San Diego

Janet E. Pope

Janet E. Pope

University of Western Ontario

Something went wrong. Please try again later.