default search action
Feng Hao 0001
Person information
- affiliation: University of Warwick, Department of Computer Science, Conventry, UK
- affiliation (former): University of Cambridge, Computer Laboratory, UK
Other persons with the same name
- Feng Hao — disambiguation page
- Feng Hao 0002 — Qilu University of Technology, Jinan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Liang Zhang, Haibin Kan, Feiyang Qiu, Feng Hao:
A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized CP-ABE. Comput. J. 67(3): 1017-1029 (2024) - [j48]Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, Feng Hao:
On the feasibility of E2E verifiable online voting - A case study from Durga Puja trial. J. Inf. Secur. Appl. 81: 103719 (2024) - [j47]Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao:
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems. ACM Trans. Priv. Secur. 27(1): 1:1-1:25 (2024) - [j46]Sifan Li, Yue Cao, Hassan Jalil Hadi, Feng Hao, Faisal Bashir Hussain, Luan Chen:
ECF-IDS: An Enhanced Cuckoo Filter-Based Intrusion Detection System for In-Vehicle Network. IEEE Trans. Netw. Serv. Manag. 21(4): 3846-3860 (2024) - [c43]Luke Harrison, Samiran Bag, Feng Hao:
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities. AsiaCCS 2024 - 2023
- [j45]Shih-Chun You, Markus G. Kuhn, Sumanta Sarkar, Feng Hao:
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 344-366 (2023) - [c42]Mohammad Sadegh Nourbakhsh, Feng Hao, Arshad Jhumka:
Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications. ESORICS Workshops (1) 2023: 327-343 - [c41]Samuel Herodotou, Feng Hao:
Spying on the Spy: Security Analysis of Hidden Cameras. NSS 2023: 345-362 - [c40]Mahshid Mehr Nezhad, Elliot Laidlaw, Feng Hao:
Security Analysis of Mobile Point-of-Sale Terminals. NSS 2023: 363-384 - [i35]Samuel Herodotou, Feng Hao:
Spying on the Spy: Security Analysis of Hidden Cameras. CoRR abs/2306.00610 (2023) - [i34]Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao:
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems. CoRR abs/2306.06198 (2023) - [i33]Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot:
Owl: An Augmented Password-Authenticated Key Exchange Scheme. IACR Cryptol. ePrint Arch. 2023: 768 (2023) - [i32]Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, Feng Hao:
On the Feasibility of E2E Verifiable Online Voting - A Case Study From Durga Puja Trial. IACR Cryptol. ePrint Arch. 2023: 1770 (2023) - [i31]Luke Harrison, Samiran Bag, Feng Hao:
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities. IACR Cryptol. ePrint Arch. 2023: 1920 (2023) - 2022
- [j44]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
End-to-end verifiable cumulative voting without tallying authorities. Int. J. Appl. Cryptogr. 4(2): 85-103 (2022) - [j43]Liang Zhang, Feiyang Qiu, Feng Hao, Haibin Kan:
1-Round Distributed Key Generation With Efficient Reconstruction Using Decentralized CP-ABE. IEEE Trans. Inf. Forensics Secur. 17: 894-907 (2022) - [c39]Feng Hao, Paul C. van Oorschot:
SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons. AsiaCCS 2022: 697-711 - [c38]Luke Harrison, Samiran Bag, Hang Luo, Feng Hao:
VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities. AsiaCCS 2022: 1113-1125 - [c37]Samiran Bag, Indranil Ghosh Ray, Feng Hao:
A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search. SECRYPT 2022: 366-373 - 2021
- [j42]Muhammad Ajmal Azad, Samiran Bag, Farhan Ahmad, Feng Hao:
Sharing is Caring: A collaborative framework for sharing security alerts. Comput. Commun. 165: 75-84 (2021) - [j41]Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng Hao:
Formal modelling and security analysis of bitcoin's payment protocol. Comput. Secur. 107: 102279 (2021) - [j40]Feng Hao:
Prudent Practices in Security Standardization. IEEE Commun. Stand. Mag. 5(3): 40-47 (2021) - [j39]Patrick McCorry, Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
On Secure E-Voting over Blockchain. DTRAP 2(4): 33:1-33:13 (2021) - [j38]Muhammad Ajmal Azad, Charith Perera, Samiran Bag, Mahmoud Barhamgi, Feng Hao:
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks. ACM Trans. Cyber Phys. Syst. 5(1): 4:1-4:24 (2021) - [j37]Shen Wang, Ehsan Toreini, Feng Hao:
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. IEEE Trans. Inf. Forensics Secur. 16: 2823-2835 (2021) - [c36]Mahshid Mehr Nezhad, Feng Hao:
OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks. ACSAC 2021: 375-384 - [i30]Shen Wang, Ehsan Toreini, Feng Hao:
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. CoRR abs/2103.06184 (2021) - [i29]Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng Hao:
Formal Modelling and Security Analysis of Bitcoin's Payment Protocol. CoRR abs/2103.08436 (2021) - [i28]Feng Hao:
Prudent Practices in Security Standardization. IACR Cryptol. ePrint Arch. 2021: 839 (2021) - [i27]Feng Hao, Paul C. van Oorschot:
SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons. IACR Cryptol. ePrint Arch. 2021: 1492 (2021) - 2020
- [j36]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting. IEEE Secur. Priv. 18(6): 6-13 (2020) - [j35]Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Andrii Shalaginov:
Decentralized Self-Enforcing Trust Management System for Social Internet of Things. IEEE Internet Things J. 7(4): 2690-2703 (2020) - [j34]Somnath Panja, Samiran Bag, Feng Hao, Bimal Kumar Roy:
A Smart Contract System for Decentralized Borda Count Voting. IEEE Trans. Engineering Management 67(4): 1323-1339 (2020) - [j33]Muhammad Ajmal Azad, Samiran Bag, Shazia Tabassum, Feng Hao:
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams. IEEE Trans. Emerg. Top. Comput. 8(2): 313-327 (2020) - [j32]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IEEE Trans. Inf. Forensics Secur. 15: 2042-2052 (2020) - [j31]Muhammad Ajmal Azad, Samiran Bag, Charith Perera, Mahmoud Barhamgi, Feng Hao:
Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network. IEEE Trans. Ind. Informatics 16(5): 3606-3615 (2020) - [i26]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. IACR Cryptol. ePrint Arch. 2020: 650 (2020)
2010 – 2019
- 2019
- [j30]Mohammed Aamir Ali, Muhammad Ajmal Azad, Mario Parreño Centeno, Feng Hao, Aad van Moorsel:
Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Gener. Comput. Syst. 100: 408-427 (2019) - [j29]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
PriVeto: a fully private two-round veto protocol. IET Inf. Secur. 13(4): 311-320 (2019) - [j28]Ehsan Toreini, Siamak F. Shahandashti, Maryam Mehrnezhad, Feng Hao:
DOMtegrity: ensuring web page integrity against malicious browser extensions. Int. J. Inf. Sec. 18(6): 801-814 (2019) - [j27]Muhammad Ajmal Azad, Samiran Bag, Simon Parkinson, Feng Hao:
TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks. IEEE Internet Things J. 6(4): 5878-5891 (2019) - [j26]Xun Yi, Zahir Tari, Feng Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan Lam, Ibrahim Khalil, Albert Y. Zomaya:
Efficient threshold password-authenticated secret sharing protocols for cloud computing. J. Parallel Distributed Comput. 128: 57-70 (2019) - [c35]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
E2E Verifiable Borda Count Voting System without Tallying Authorities. ARES 2019: 11:1-11:9 - [c34]Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao:
SSR'19: The 5th Conference on Security Standardisation Research. CCS 2019: 2699-2700 - [c33]Samiran Bag, Feng Hao:
E2E Verifiable Electronic Voting System for Shareholders. DSC 2019: 1-8 - [e2]Feng Hao, Sushmita Ruj, Sourav Sen Gupta:
Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings. Lecture Notes in Computer Science 11898, Springer 2019, ISBN 978-3-030-35422-0 [contents] - [e1]Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao:
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6832-2 [contents] - [i25]Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, Feng Hao:
DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions. CoRR abs/1905.12951 (2019) - [i24]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IACR Cryptol. ePrint Arch. 2019: 1332 (2019) - 2018
- [j25]Chengqing Li, Dongdong Lin, Bingbing Feng, Jinhu Lu, Feng Hao:
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy. IEEE Access 6: 75834-75842 (2018) - [j24]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
A privacy-aware decentralized and personalized reputation system. Comput. Secur. 77: 514-530 (2018) - [j23]Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Khaled Salah:
M2M-REP: Reputation system for machines in the internet of things. Comput. Secur. 79: 1-16 (2018) - [j22]Muhammad Ajmal Azad, Samiran Bag, Feng Hao:
PrivBox: Verifiable decentralized reputation system for online marketplaces. Future Gener. Comput. Syst. 89: 44-57 (2018) - [j21]Chengqing Li, Dongdong Lin, Jinhu Lu, Feng Hao:
Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography. IEEE Multim. 25(4): 46-56 (2018) - [j20]Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. IEEE Secur. Priv. 16(1): 72-81 (2018) - [j19]Raffaello Perrotta, Feng Hao:
Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions. IEEE Secur. Priv. 16(4): 66-81 (2018) - [j18]Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Stealing PINs via mobile sensors: actual risk versus user perception. Int. J. Inf. Sec. 17(3): 291-313 (2018) - [j17]Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao:
ZombieCoin 2.0: managing next-generation botnets using Bitcoin. Int. J. Inf. Sec. 17(4): 411-422 (2018) - [j16]Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong:
Analyzing and Patching SPEKE in ISO/IEC. IEEE Trans. Inf. Forensics Secur. 13(11): 2844-2855 (2018) - [i23]Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong:
Analysing and Patching SPEKE in ISO/IEC. CoRR abs/1802.04900 (2018) - [i22]Saulius Venskutonis, Feng Hao, Matthew Collison:
On legitimate mining of cryptocurrency in the browser - a feasibility study. CoRR abs/1812.04054 (2018) - 2017
- [j15]Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini:
Erratum to "On the Privacy of Private Browsing - A Forensic Approach" [JISA 19/1(2014), 88-100]. J. Inf. Secur. Appl. 33: 66 (2017) - [j14]Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns. ACM Trans. Priv. Secur. 20(3): 9:1-9:29 (2017) - [c32]Muhammad Ajmal Azad, Samiran Bag, Feng Hao:
M2M-REP: Reputation of Machines in the Internet of Things. ARES 2017: 28:1-28:7 - [c31]Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. Financial Cryptography 2017: 357-375 - [i21]Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns. CoRR abs/1705.02510 (2017) - [i20]Raffaello Perrotta, Feng Hao:
Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions. CoRR abs/1709.09577 (2017) - [i19]Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. IACR Cryptol. ePrint Arch. 2017: 56 (2017) - [i18]Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. IACR Cryptol. ePrint Arch. 2017: 110 (2017) - [i17]Feng Hao:
Schnorr Non-interactive Zero-Knowledge Proof. RFC 8235: 1-13 (2017) - [i16]Feng Hao:
J-PAKE: Password-Authenticated Key Exchange by Juggling. RFC 8236: 1-15 (2017) - 2016
- [j13]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript. J. Inf. Secur. Appl. 26: 23-38 (2016) - [j12]Feng Hao, Xun Yi, Elisa Bertino:
Editorial of special issue on security and privacy in cloud computing. J. Inf. Secur. Appl. 27-28: 1-2 (2016) - [j11]Xun Yi, Fang-Yu Rao, Zahir Tari, Feng Hao, Elisa Bertino, Ibrahim Khalil, Albert Y. Zomaya:
ID2S Password-Authenticated Key Exchange Protocols. IEEE Trans. Computers 65(12): 3687-3701 (2016) - [j10]Feng Hao, Dylan Clarke, Avelino Francisco Zorzo:
Deleting Secret Data with Public Verifiability. IEEE Trans. Dependable Secur. Comput. 13(6): 617-629 (2016) - [c30]Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao:
Towards Bitcoin Payment Networks. ACISP (1) 2016: 57-76 - [c29]Siamak F. Shahandashti, Feng Hao:
DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities. ESORICS (2) 2016: 223-240 - [c28]Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
Refund Attacks on Bitcoin's Payment Protocol. Financial Cryptography 2016: 581-599 - [c27]Maryam Mehrnezhad, Mohammed Aamir Ali, Feng Hao, Aad P. A. van Moorsel:
NFC Payment Spy: A Privacy Attack on Contactless Payments. SSR 2016: 92-111 - [i15]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript. CoRR abs/1602.04115 (2016) - [i14]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception. CoRR abs/1605.05549 (2016) - [i13]Patrick McCorry, Siamak Fayyaz Shahandashti, Feng Hao:
Refund attacks on Bitcoin's Payment Protocol. IACR Cryptol. ePrint Arch. 2016: 24 (2016) - [i12]Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao:
Towards Bitcoin Payment Networks. IACR Cryptol. ePrint Arch. 2016: 408 (2016) - [i11]Siamak Fayyaz Shahandashti, Feng Hao:
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities. IACR Cryptol. ePrint Arch. 2016: 670 (2016) - 2015
- [c26]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IoTPTS@AsiaCCS 2015: 27-34 - [c25]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript. AsiaCCS 2015: 673 - [c24]Xun Yi, Feng Hao, Liqun Chen, Joseph K. Liu:
Practical Threshold Password-Authenticated Secret Sharing Protocol. ESORICS (1) 2015: 347-365 - [c23]Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao:
ZombieCoin: Powering Next-Generation Botnets with Bitcoin. Financial Cryptography Workshops 2015: 34-48 - [c22]Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. SSR 2015: 3-20 - [c21]Maryam Mehrnezhad, Feng Hao, Siamak Fayyaz Shahandashti:
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment. SSR 2015: 21-39 - [i10]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IACR Cryptol. ePrint Arch. 2015: 80 (2015) - [i9]Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. IACR Cryptol. ePrint Arch. 2015: 308 (2015) - 2014
- [j9]Dylan Clarke, Feng Hao:
Cryptanalysis of the dragonfly key exchange protocol. IET Inf. Secur. 8(6): 283-289 (2014) - [j8]Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini:
On the privacy of private browsing - A forensic approach. J. Inf. Secur. Appl. 19(1): 88-100 (2014) - [c20]Xun Yi, Feng Hao, Elisa Bertino:
ID-Based Two-Server Password-Authenticated Key Exchange. ESORICS (2) 2014: 257-276 - [c19]Feng Hao, Siamak Fayyaz Shahandashti:
The SPEKE Protocol Revisited. SSR 2014: 26-38 - [c18]Feng Hao, Matthew Nicolas Kreeger, Brian Randell, Dylan Clarke, Siamak Fayyaz Shahandashti, Peter Hyun-Jeen Lee:
Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting. EVT/WOTE 2014 - [i8]Feng Hao, Dylan Clarke, Avelino Francisco Zorzo:
Deleting Secret Data with Public Verifiability. IACR Cryptol. ePrint Arch. 2014: 364 (2014) - [i7]Feng Hao, Siamak Fayyaz Shahandashti:
The SPEKE Protocol Revisited. IACR Cryptol. ePrint Arch. 2014: 585 (2014) - 2013
- [c17]Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini:
On the Privacy of Private Browsing - A Forensic Approach. DPM/SETOP 2013: 380-389 - [c16]Feng Hao, Dylan Clarke, Carlton Shepherd:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. Security Protocols Workshop 2013: 245-254 - [c15]Feng Hao:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion). Security Protocols Workshop 2013: 255-264 - [i6]Dylan Clarke, Feng Hao:
Cryptanalysis of the Dragonfly Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2013: 58 (2013) - 2012
- [c14]Feng Hao, Dylan Clarke:
Security Analysis of a Multi-factor Authenticated Key Exchange Protocol. ACNS 2012: 1-11 - [c13]Dalia Khader, Ben Smyth, Peter Y. A. Ryan, Feng Hao:
A Fair and Robust Voting System by Broadcast. Electronic Voting 2012: 285-299 - [c12]Feng Hao, Brian Randell, Dylan Clarke:
Self-enforcing Electronic Voting. Security Protocols Workshop 2012: 23-31 - [c11]Feng Hao:
Self-enforcing Electronic Voting (Transcript of Discussion). Security Protocols Workshop 2012: 32-40 - [c10]Dylan Clarke, Feng Hao, Brian Randell:
Analysis of Issues and Challenges of E-Voting in the UK. Security Protocols Workshop 2012: 126-135 - [i5]Feng Hao, Dylan Clarke:
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2012: 39 (2012) - 2011
- [c9]Feng Hao, Peter Y. A. Ryan:
How to Sync with Alice. Security Protocols Workshop 2011: 170-178 - [c8]Feng Hao:
How to Sync with Alice (Transcript of Discussion). Security Protocols Workshop 2011: 179-188 - 2010
- [j7]Feng Hao, Peter Y. A. Ryan, Piotr Zielinski:
Anonymous voting by two-round public discussion. IET Inf. Secur. 4(2): 62-67 (2010) - [j6]Feng Hao, Peter Y. A. Ryan:
J-PAKE: Authenticated Key Exchange without PKI. Trans. Comput. Sci. 11: 192-206 (2010) - [c7]Feng Hao:
On Small Subgroup Non-confinement Attack. CIT 2010: 1022-1025 - [c6]Feng Hao:
On Robust Key Agreement Based on Public Key Authentication. Financial Cryptography 2010: 383-390 - [i4]Feng Hao:
On Robust Key Agreement Based on Public Key Authentication. IACR Cryptol. ePrint Arch. 2010: 136 (2010) - [i3]Feng Hao:
On Small Subgroup Non-confinement Attack. IACR Cryptol. ePrint Arch. 2010: 149 (2010) - [i2]Feng Hao, Peter Y. A. Ryan:
J-PAKE: Authenticated Key Exchange Without PKI. IACR Cryptol. ePrint Arch. 2010: 190 (2010) - [i1]Feng Hao, Matthew Nicolas Kreeger:
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting. IACR Cryptol. ePrint Arch. 2010: 452 (2010)
2000 – 2009
- 2009
- [j5]Feng Hao, Piotr Zielinski:
The Power of Anonymous Veto in Public Discussion. Trans. Comput. Sci. 4: 41-52 (2009) - 2008
- [j4]Feng Hao, John Daugman, Piotr Zielinski:
A Fast Search Algorithm for a Large Fuzzy Database. IEEE Trans. Inf. Forensics Secur. 3(2): 203-212 (2008) - [c5]Feng Hao, Peter Y. A. Ryan:
Password Authenticated Key Exchange by Juggling. Security Protocols Workshop 2008: 159-171 - [c4]Feng Hao:
Password Authenticated Key Exchange by Juggling (Transcript of Discussion). Security Protocols Workshop 2008: 172-179 - 2007
- [b1]Feng Hao:
On using fuzzy data in security mechanisms. University of Cambridge, UK, 2007 - 2006
- [j3]Feng Hao, Ross J. Anderson, John Daugman:
Combining Crypto with Biometrics Effectively. IEEE Trans. Computers 55(9): 1081-1088 (2006) - [c3]Feng Hao, Piotr Zielinski:
A 2-Round Anonymous Veto Protocol. Security Protocols Workshop 2006: 202-211 - [c2]Feng Hao:
A 2-Round Anonymous Veto Protocol. Security Protocols Workshop 2006: 212-214 - 2005
- [c1]Feng Hao:
Combining Crypto with Biometrics: A New Human-Security Interface. Security Protocols Workshop 2005: 133-138 - 2003
- [j2]Feng Hao, Chan Choong Wah:
Online signature verification using a new extreme points warping technique. Pattern Recognit. Lett. 24(16): 2943-2951 (2003) - 2002
- [j1]Feng Hao, Chan Choong Wah:
Private key generation from on-line handwritten signatures. Inf. Manag. Comput. Secur. 10(4): 159-164 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint