2022 - Research.com Computer Science in Norway Leader Award
His scientific interests lie mostly in Computer security, Cryptography, Theoretical computer science, Public-key cryptography and Key. The study incorporates disciplines such as Scheme and Signature in addition to Computer security. His work in the fields of Cryptography, such as Cryptosystem, overlaps with other areas such as Key establishment.
As a member of one scientific family, Colin Boyd mostly works in the field of Theoretical computer science, focusing on Digital watermarking and, on occasion, Liability. His Public-key cryptography research incorporates themes from Shared secret and Security parameter. His Key study incorporates themes from Class and Provable security.
Colin Boyd mainly focuses on Computer security, Cryptography, Theoretical computer science, Public-key cryptography and Encryption. As a part of the same scientific study, Colin Boyd usually deals with the Computer security, concentrating on Protocol and frequently concerns with Forward secrecy. In his study, Signature is strongly linked to Scheme, which falls under the umbrella field of Cryptography.
His Theoretical computer science research is multidisciplinary, relying on both Random oracle, Hash function and Standard model. His Public-key cryptography research incorporates elements of Cryptosystem and Distributed computing. His study in Key exchange is interdisciplinary in nature, drawing from both Password and Computer security model.
Computer security, Cryptography, Encryption, Computer network and Digital watermarking are his primary areas of study. Computer security is closely attributed to Cloud computing security in his study. Colin Boyd has included themes like Theoretical computer science, Public key infrastructure and State in his Cryptography study.
His Encryption research integrates issues from Cryptographic protocol and Information security. His work is dedicated to discovering how Computer network, Computer security model are connected with Certificate authority and other disciplines. Colin Boyd focuses mostly in the field of Digital watermarking, narrowing it down to matters related to Embedding and, in some cases, Distortion, Scheme, Multimedia and Medical imaging.
His primary areas of study are Computer security, Digital watermarking, Cryptography, Adversary and Image. His study in Authentication, Encryption, Key, Cloud storage and Session key are all subfields of Computer security. The various areas that Colin Boyd examines in his Digital watermarking study include Scheme, Embedding, Multimedia and Medical imaging.
His Cryptography study combines topics from a wide range of disciplines, such as Homomorphic encryption, State and Field. Colin Boyd combines subjects such as Authenticated Key Exchange and Computer security model with his study of Adversary. His work deals with themes such as Watermarking attack, Theoretical computer science and Component, which intersect with Image.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A survey of trust and reputation systems for online service provision
Audun Jøsang;Roslan Ismail;Colin Boyd.
decision support systems (2007)
A survey of trust and reputation systems for online service provision
Audun Jøsang;Roslan Ismail;Colin Boyd.
decision support systems (2007)
Information Security and Privacy
Colin Boyd;Juan Manuel González Nieto.
Lecture Notes in Computer Science (1996)
Information Security and Privacy
Colin Boyd;Juan Manuel González Nieto.
Lecture Notes in Computer Science (1996)
Advances in Cryptology - ASIACRYPT 2001
Colin Boyd.
(2001)
Protocols for Authentication and Key Establishment
Colin Boyd;Anish Mathuria.
(2003)
Protocols for Authentication and Key Establishment
Colin Boyd;Anish Mathuria.
(2003)
Cryptography and Coding
Colin Boyd.
(1995)
Off-Line Fair Payment Protocols Using Convertible Signatures
Colin Boyd;Ernest Foo.
international cryptology conference (1998)
Off-Line Fair Payment Protocols Using Convertible Signatures
Colin Boyd;Ernest Foo.
international cryptology conference (1998)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Queensland University of Technology
University of Waterloo
The University of Texas at San Antonio
ETH Zurich
University of Oslo
University of Limerick
Queensland University of Technology
University of Queensland
Korea Advanced Institute of Science and Technology
University of Rennes
Purdue University West Lafayette
Skolkovo Institute of Science and Technology
University of Kansas
Wills Eye Hospital
Structural Genomics Consortium
University of Washington
University of Montpellier
RIKEN
University of Exeter
Missouri University of Science and Technology
Emory University
Duke University
Complutense University of Madrid
Max Planck Society
University of California, San Diego
University of Western Ontario