Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
Colin Boyd
Norwegian University of Science and Technology
367Publications
38H-index
9,043Citations
Publications 367
Newest
Enio Marku , Gergely Biczók10
Estimated H-index: 10
(BME: Budapest University of Technology and Economics),
Colin Boyd38
Estimated H-index: 38
(NTNU: Norwegian University of Science and Technology)
Published on Oct 25, 2018
Colin Boyd38
Estimated H-index: 38
(NTNU: Norwegian University of Science and Technology),
Gareth T. Davies3
Estimated H-index: 3
(NTNU: Norwegian University of Science and Technology)
+ 2 AuthorsMohsen Toorani12
Estimated H-index: 12
(University of Bergen)
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required for such encryption. Furthermore, cloud storage providers often use techniques such as data deduplication for improving efficiency which restricts the application of semantically-secure encryption. Generic security goals and attack models have thus far proved elusive: primitive...
Published on Sep 6, 2018
Colin Boyd38
Estimated H-index: 38
(NTNU: Norwegian University of Science and Technology),
Christopher Carr2
Estimated H-index: 2
(NTNU: Norwegian University of Science and Technology)
Proof-of-work (PoW) is used as the consensus mechanism in most cryptocurrencies. PoW-based puzzles play an important part in the operation and security of a cryptocurrency, but come at a considerable energy cost. One approach to the problem of energy wastage is to find ways to build PoW schemes from valuable computational problems. This work proposes calibration of public key cryptographic systems as a suitable source of PoW puzzles. We describe the properties needed to adapt public key cryptosy...
Published on Jun 1, 2018
Halldis M Søhoel , Martin Gilje Jaatun13
Estimated H-index: 13
(SINTEF),
Colin Boyd38
Estimated H-index: 38
(NTNU: Norwegian University of Science and Technology)
In a cut-throat world where time-to-market can be the difference between success and failure, it can be tempting for startups to think “let's get it to work first, and then we'll worry about security later.” However, major security flaws have killed more than one startup. This paper studies a small sample of 5 IT startups that offer services via the web, to determine to what extent they are aware of and can handle the OWASP top 10 threats.
Colin Boyd38
Estimated H-index: 38
,
Gareth T. Davies3
Estimated H-index: 3
+ -3 AuthorsYao Jiang1
Estimated H-index: 1
Colin Boyd38
Estimated H-index: 38
,
Gareth T. Davies3
Estimated H-index: 3
+ -3 AuthorsMohsen Toorani12
Estimated H-index: 12
Colin Boyd38
Estimated H-index: 38
,
Xavier Boyen36
Estimated H-index: 36
+ -3 AuthorsThomas Haines1
Estimated H-index: 1
Published on Dec 1, 2016in Multimedia Tools and Applications 2.10
Hussain Nyeem6
Estimated H-index: 6
(KUET: Khulna University of Engineering & Technology),
Wageeh W. Boles23
Estimated H-index: 23
(QUT: Queensland University of Technology),
Colin Boyd38
Estimated H-index: 38
(NTNU: Norwegian University of Science and Technology)
Although the Self-Authentication Watermarking (SAW) schemes are promising to tackle the multimedia information assurance problem, their unknown security level seems to impair their potential. In this paper, we identify three new counterfeiting attacks on those schemes and present their countermeasure. We develop, analyse, and validate the models of the identified attacks followed by the development of a new SAW model to resist those attacks. The identified attack models generalize three main sec...
12345678910