default search action
Colin Boyd
Person information
- affiliation: Queensland University of Technology, Brisbane, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c180]Colin Boyd, Bor de Kock, Lise Millerjord:
Modular Design of KEM-Based Authenticated Key Exchange. ACISP 2023: 553-579 - [c179]Colin Boyd, Elsie Mestl Fondevik, Kristian Gjøsteen, Lise Millerjord:
Hybrid Group Key Exchange with Application to Constrained Networks. ISC 2023: 455-472 - [i41]Colin Boyd, Bor de Kock, Lise Millerjord:
Modular Design of KEM-Based Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2023: 167 (2023) - 2021
- [j38]Colin Boyd, Kai Gellert:
A Modern View on Forward Security. Comput. J. 64(4): 639-652 (2021) - [j37]Colin Boyd:
Introduction to the Special Issue on TLS 1.3. J. Cryptol. 34(3): 24 (2021) - [c178]Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord:
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. ASIACRYPT (4) 2021: 681-710 - [c177]Enio Marku, Gergely Biczók, Colin Boyd:
SafeLib: a practical library for outsourcing stateful network functions securely. NetSoft 2021: 244-252 - [i40]Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord:
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. IACR Cryptol. ePrint Arch. 2021: 702 (2021) - 2020
- [b2]Colin Boyd, Anish Mathuria, Douglas Stebila:
Protocols for Authentication and Key Establishment, Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-58145-2, pp. 1-440 - [j36]Enio Marku, Gergely Biczók, Colin Boyd:
Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Commun. Mag. 58(7): 72-77 (2020) - [j35]Man Ho Au, Jinguang Han, Qianhong Wu, Colin Boyd:
Special Issue on Cryptographic Currency and Blockchain Technology. Future Gener. Comput. Syst. 107: 758-759 (2020) - [c176]Colin Boyd, Kristian Gjøsteen, Shuang Wu:
A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. FMBC@CAV 2020: 5:1-5:13 - [c175]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Fast and Secure Updatable Encryption. CRYPTO (1) 2020: 464-493 - [c174]Colin Boyd, Thomas Haines, Peter B. Rønne:
Vote Selling Resistant Voting. Financial Cryptography Workshops 2020: 345-359
2010 – 2019
- 2019
- [c173]Colin Boyd, Kristian Gjøsteen, Clémentine Gritti, Thomas Haines:
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. INDOCRYPT 2019: 250-270 - [c172]Enio Marku, Gergely Biczók, Colin Boyd:
Towards protected VNFs for multi-operator service delivery. NetSoft 2019: 19-23 - [i39]Colin Boyd, Kai Gellert:
A Modern View on Forward Security. IACR Cryptol. ePrint Arch. 2019: 1362 (2019) - [i38]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
RISE and SHINE: Fast and Secure Updatable Encryption. IACR Cryptol. ePrint Arch. 2019: 1457 (2019) - 2018
- [c171]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. ARES 2018: 41:1-41:7 - [c170]Halldis Sohoel, Martin Gilje Jaatun, Colin Boyd:
OWASP Top 10 - Do Startups Care? Cyber Security 2018: 1-8 - [c169]Colin Boyd, Christopher Carr:
Valuable Puzzles for Proofs-of-Work. DPM/CBT@ESORICS 2018: 130-139 - [c168]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Offline Assisted Group Key Exchange. ISC 2018: 268-285 - [c167]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Security Notions for Cloud Storage and Deduplication. ProvSec 2018: 347-365 - [i37]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Offline Assisted Group Key Exchange. IACR Cryptol. ePrint Arch. 2018: 114 (2018) - [i36]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. IACR Cryptol. ePrint Arch. 2018: 748 (2018) - 2017
- [j34]Kenneth Radke, Colin Boyd:
Security Proofs for Protocols Involving Humans. Comput. J. 60(4): 527-540 (2017) - [j33]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: authenticated key exchange security incorporating certification systems. Int. J. Inf. Sec. 16(2): 151-171 (2017) - [c166]Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side Channels in Deduplication: Trade-offs between Leakage and Efficiency. AsiaCCS 2017: 266-274 - [c165]Colin Boyd, Britta Hale:
Secure Channels and Termination: The Last Word on TLS. LATINCRYPT 2017: 44-65 - [i35]Christopher Carr, Colin Boyd, Xavier Boyen, Thomas Haines:
Bitcoin Unchained. ERCIM News 2017(110) (2017) - [i34]Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. IACR Cryptol. ePrint Arch. 2017: 243 (2017) - [i33]Colin Boyd, Britta Hale:
Secure Channels and Termination: The Last Word on TLS. IACR Cryptol. ePrint Arch. 2017: 784 (2017) - [i32]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum:
Security notions for cloud storage and deduplication. IACR Cryptol. ePrint Arch. 2017: 1208 (2017) - 2016
- [j32]Hussain Nyeem, Wageeh W. Boles, Colin Boyd:
Modelling attacks on self-authentication watermarking. Multim. Tools Appl. 75(23): 15849-15880 (2016) - [c164]Colin Boyd, Christopher Carr:
Fair Client Puzzles from the Bitcoin Blockchain. ACISP (1) 2016: 161-177 - [c163]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. CT-RSA 2016: 55-71 - [c162]Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. Mycrypt 2016: 111-126 - [c161]Gergely Biczók, Balázs Sonkoly, Nikolett Bereczky, Colin Boyd:
Private VNFs for collaborative multi-operator service delivery: An architectural case. NOMS 2016: 1249-1252 - [i31]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016(106) (2016) - [i30]Colin Boyd, Christopher Carr:
Fair Client Puzzles from the Bitcoin Blockchain. IACR Cryptol. ePrint Arch. 2016: 680 (2016) - [i29]Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side channels in deduplication: trade-offs between leakage and efficiency. IACR Cryptol. ePrint Arch. 2016: 977 (2016) - 2015
- [j31]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett:
CHURNs: Freshness Assurance for Humans. Comput. J. 58(10): 2404-2425 (2015) - [j30]Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Analysis of two authorization protocols using Colored Petri Nets. Int. J. Inf. Sec. 14(3): 221-247 (2015) - [j29]Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Colin Boyd:
Identity-based proxy signatures: a generic construction and a concrete scheme from RSA. Secur. Commun. Networks 8(18): 3602-3614 (2015) - [c160]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. Financial Cryptography 2015: 86-106 - [c159]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange. IMACC 2015: 277-294 - [i28]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. IACR Cryptol. ePrint Arch. 2015: 335 (2015) - [i27]Chris Pavlovski, Colin Boyd:
Microcash: Efficient Off-Line Small Payments. IACR Cryptol. ePrint Arch. 2015: 635 (2015) - [i26]Colin Boyd, Britta Hale, Stig Frode Mjølsnes, Douglas Stebila:
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS. IACR Cryptol. ePrint Arch. 2015: 1150 (2015) - [i25]Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand:
A Guide to Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2015: 1192 (2015) - 2014
- [j28]Long Ngo, Colin Boyd, Juan Manuel González Nieto:
Automated Proofs for Computational Indistinguishability. Comput. J. 57(10): 1513-1536 (2014) - [j27]Hussain Nyeem, Wageeh W. Boles, Colin Boyd:
Digital image watermarking: its formal model, fundamental properties and possible attacks. EURASIP J. Adv. Signal Process. 2014: 135 (2014) - [j26]Aiiad Albeshri, Colin Boyd, Juan Manuel González Nieto:
Enhanced GeoProof: improved geographic assurance for data in the cloud. Int. J. Inf. Sec. 13(2): 191-198 (2014) - [j25]Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Security properties analysis in a TPM-based protocol. Int. J. Secur. Networks 9(2): 85-103 (2014) - [c158]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-Fact Leakage-Resilient Key Exchange. ACISP 2014: 258-273 - [c157]Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila:
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. AISC 2014: 37-45 - [c156]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling after-the-fact leakage for key exchange. AsiaCCS 2014: 207-216 - [c155]Mats Sandvoll, Colin Boyd, Bjørn B. Larsen:
PassCue: The Shared Cues System in Practice. PASSWORDS 2014: 119-137 - [c154]Britta Hale, Colin Boyd:
Computationally Analyzing the ISO 9798-2.4 Authentication Protocol. SSR 2014: 236-255 - [i24]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling After-the-fact Leakage for Key Exchange. IACR Cryptol. ePrint Arch. 2014: 131 (2014) - [i23]Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-fact Leakage-Resilient Key Exchange (full version). IACR Cryptol. ePrint Arch. 2014: 264 (2014) - [i22]Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Protecting Encrypted Cookies from Compression Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2014: 724 (2014) - 2013
- [j24]Hussain Nyeem, Wageeh W. Boles, Colin Boyd:
A Review of Medical Image Watermarking Requirements for Teleradiology. J. Digit. Imaging 26(2): 326-343 (2013) - [j23]Colin Boyd:
Cryptography in the Cloud: Advances and Challenges. J. Inform. and Commun. Convergence Engineering 11(1): 17-23 (2013) - [j22]Dongdong Sun, Colin Boyd, Juan Manuel González Nieto:
Predicate encryption for multi-inner-products. Secur. Commun. Networks 6(3): 325-339 (2013) - [c153]Hussain Nyeem, Wageeh W. Boles, Colin Boyd:
Utilizing Least Significant Bit-Planes of RONI Pixels for Medical Image Watermarking. DICTA 2013: 1-8 - [c152]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013: 381-399 - [c151]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Laurie Buys:
"Who decides?": security and privacy in the wild. OZCHI 2013: 27-36 - [c150]Hussain Nyeem, Wageeh W. Boles, Colin Boyd:
Counterfeiting attacks on block-wise dependent fragile watermarking schemes. SIN 2013: 86-93 - [e10]Colin Boyd, Leonie Simpson:
Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings. Lecture Notes in Computer Science 7959, Springer 2013, ISBN 978-3-642-39058-6 [contents] - [i21]Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila:
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. IACR Cryptol. ePrint Arch. 2013: 398 (2013) - 2012
- [c149]Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy:
Effort-Release Public-Key Encryption from Cryptographic Puzzles. ACISP 2012: 194-207 - [c148]Kaleb Lee, Colin Boyd, Juan Manuel González Nieto:
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking. ACISP 2012: 434-441 - [c147]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton:
Towards a Secure Human-and-Computer Mutual Authentication Protocol. AISC 2012: 39-46 - [c146]Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd:
Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets. AISC 2012: 47-58 - [c145]Kaleb Lee, Juan Manuel González Nieto, Colin Boyd:
Improving the Efficiency of RFID Authentication with Pre-Computation. AISC 2012: 91-100 - [c144]Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto:
Practical client puzzles in the standard model. AsiaCCS 2012: 42-43 - [c143]Kaleb Lee, Juan Manuel González Nieto, Colin Boyd:
A State-Aware RFID Privacy Model with Reader Corruption. CSS 2012: 324-338 - [c142]Aiiad Albeshri, Colin Boyd, Juan Manuel González Nieto:
GeoProof: Proofs of Geographic Location for Cloud Computing Environment. ICDCS Workshops 2012: 506-514 - [c141]Colin Boyd, Denis Edwards, Philip Loftus, Timothy G. Schaefer:
Chief information officer (CIO) panel: how to groom IT leadership as change agents. CPR 2012: 1-2 - 2011
- [j21]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Modeling key compromise impersonation attacks on group key exchange protocols. ACM Trans. Inf. Syst. Secur. 14(4): 28:1-28:24 (2011) - [c140]Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto:
An integrated approach to cryptographic mitigation of denial-of-service attacks. AsiaCCS 2011: 114-123 - [c139]Long Ngo, Colin Boyd, Juanma González Nieto:
Automated Proofs for Diffie-Hellman-Based Key Exchanges. CSF 2011: 51-65 - [c138]Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto:
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. CT-RSA 2011: 284-301 - [c137]Hussain Nyeem, Wageeh W. Boles, Colin Boyd:
Developing a Digital Image Watermarking Model. DICTA 2011: 468-473 - [c136]Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection. ICISC 2011: 319-331 - [c135]Colin Boyd, Juanma González Nieto:
On Forward Secrecy in One-Round Key Exchange. IMACC 2011: 451-468 - [c134]Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto:
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy. INDOCRYPT 2011: 379-398 - [c133]Kenneth Radke, Margot Brereton, Seyed Hadi Mirisaee, Sunil Ghelawat, Colin Boyd, Juan Manuel González Nieto:
Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing. INTERACT (2) 2011: 524-532 - [c132]Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Irfan Ahmed:
User-representative feature selection for keystroke dynamics. NSS 2011: 229-233 - [c131]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton:
Ceremony Analysis: Strengths and Weaknesses. SEC 2011: 104-115 - [e9]Colin Boyd, Josef Pieprzyk:
Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. CRPIT 116, Australian Computer Society 2011, ISBN 978-1-920682-96-5 [contents] - [i20]Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection. IACR Cryptol. ePrint Arch. 2011: 665 (2011) - 2010
- [c130]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Attribute-Based Authenticated Key Exchange. ACISP 2010: 300-317 - [c129]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Avoiding Full Extension Field Arithmetic in Pairing Computations. AFRICACRYPT 2010: 203-224 - [c128]Eesa A. Alsolami, Colin Boyd, Andrew J. Clark, Asadul K. Islam:
Continuous Biometric Authentication: Can It Be More Practical? HPCC 2010: 647-652 - [c127]Kenneth Radke, Colin Boyd, Margot Brereton, Juan Manuel González Nieto:
How HCI design influences web security decisions. OZCHI 2010: 252-255 - [c126]Long Ngo, Colin Boyd, Juan Manuel González Nieto:
Automating Computational Proofs for Public-Key-Based Key Exchange. ProvSec 2010: 53-69 - [c125]Dongdong Sun, Colin Boyd, Juan Manuel González Nieto:
Delegation in Predicate Encryption Supporting Disjunctive Queries. SEC 2010: 229-240 - [c124]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Delaying Mismatched Field Multiplications in Pairing Computations. WAIFI 2010: 196-214 - [e8]Colin Boyd, Willy Susilo:
8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010. CRPIT 105, Australian Computer Society 2010, ISBN 978-1-920682-86-6 [contents] - [i19]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
One Round Group Key Exchange with Forward Security in the Standard Model. IACR Cryptol. ePrint Arch. 2010: 83 (2010) - [i18]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Attribute-based Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2010: 84 (2010) - [i17]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Avoiding Full Extension Field Arithmetic in Pairing Computations. IACR Cryptol. ePrint Arch. 2010: 104 (2010) - [i16]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Delaying Mismatched Field Multiplications in Pairing Computations. IACR Cryptol. ePrint Arch. 2010: 123 (2010) - [i15]Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto:
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. IACR Cryptol. ePrint Arch. 2010: 649 (2010)
2000 – 2009
- 2009
- [j20]Baoyuan Kang, Colin Boyd, Ed Dawson:
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Comput. Electr. Eng. 35(1): 9-17 (2009) - [j19]Baoyuan Kang, Colin Boyd, Ed Dawson:
Identity-based strong designated verifier signature schemes: Attacks and new construction. Comput. Electr. Eng. 35(1): 49-53 (2009) - [j18]Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
One-round key exchange in the standard model. Int. J. Appl. Cryptogr. 1(3): 181-199 (2009) - [j17]Baoyuan Kang, Colin Boyd, Ed Dawson:
A novel identity-based strong designated verifier signature scheme. J. Syst. Softw. 82(2): 270-273 (2009) - [c123]Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto:
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. ACNS 2009: 53-70 - [c122]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Strong Designated Verifier Signature in a Multi-user Setting. AISC 2009: 21-31 - [c121]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Universally composable contributory group key exchange. AsiaCCS 2009: 146-156 - [c120]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Generic One Round Group Key Exchange in the Standard Model. ICISC 2009: 1-15 - [c119]Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Efficient Certificateless KEM in the Standard Model. ICISC 2009: 34-46 - [c118]Craig Costello, Hüseyin Hisil, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Faster Pairings on Special Weierstrass Curves. Pairing 2009: 89-101 - [c117]Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Strongly Secure Certificateless Key Agreement. Pairing 2009: 206-230 - [c116]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Public Key Cryptography 2009: 105-123 - [c115]