The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Feng Hao" ( http://dblp.L3S.de/Authors/Feng_Hao )

  Author page on DBLP  Author page in RDF  Community of Feng Hao in ASPL-2

Publication years (Num. hits)
2005-2010 (17) 2011-2014 (19) 2015-2016 (21) 2017-2018 (24) 2019 (5)
Publication types (Num. hits)
article(48) inproceedings(38)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5 occurrences of 5 keywords

Results
Found 87 publication records. Showing 86 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Xun Yi, Zahir Tari, Feng Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan Lam, Ibrahim Khalil, Albert Y. Zomaya Efficient threshold password-authenticated secret sharing protocols for cloud computing. Search on Bibsonomy J. Parallel Distrib. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Muhammad Ajmal Azad, Samiran Bag, Simon Parkinson, Feng Hao TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks. Search on Bibsonomy IEEE Internet of Things Journal The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, Feng Hao DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Samiran Bag, Muhammad Ajmal Azad, Feng Hao PriVeto: a fully private two-round veto protocol. Search on Bibsonomy IET Information Security The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Samiran Bag, Muhammad Ajmal Azad, Feng Hao E2E Verifiable Borda Count Voting System without Tallying Authorities. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Muhammad Ajmal Azad, Samiran Bag, Feng Hao PrivBox: Verifiable decentralized reputation system for online marketplaces. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chengqing Li, Dongdong Lin, Bingbing Feng, Jinhu Lu, Feng Hao Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong Analyzing and Patching SPEKE in ISO/IEC. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Raffaello Perrotta, Feng Hao Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti Verifiable Classroom Voting in Practice. Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao ZombieCoin 2.0: managing next-generation botnets using Bitcoin. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao Stealing PINs via mobile sensors: actual risk versus user perception. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chengqing Li, Dongdong Lin, Jinhu Lu, Feng Hao Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography. Search on Bibsonomy IEEE MultiMedia The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong Analysing and Patching SPEKE in ISO/IEC. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Saulius Venskutonis, Feng Hao, Matthew Collison On legitimate mining of cryptocurrency in the browser - a feasibility study. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Samiran Bag, Muhammad Ajmal Azad, Feng Hao A privacy-aware decentralized and personalized reputation system. Search on Bibsonomy Computers & Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Khaled Salah M2M-REP: Reputation system for machines in the internet of things. Search on Bibsonomy Computers & Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Feng Hao, Long Zhao, Tiantian Xu, Xiangjun Dong Application of Negative and Positive Association Rules in Mental Health Analysis of College Students. Search on Bibsonomy ICNC-FSKD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ehsan Toreini, Siamak F. Shahandashti, Feng Hao Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Patrick McCorry, Siamak F. Shahandashti, Feng Hao A Smart Contract for Boardroom Voting with Maximum Voter Privacy. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti Verifiable Classroom Voting in Practice. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2017 DBLP  BibTeX  RDF
1Feng Hao Schnorr Non-interactive Zero-Knowledge Proof. Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Feng Hao J-PAKE: Password-Authenticated Key Exchange by Juggling. Search on Bibsonomy RFC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini Erratum to "On the Privacy of Private Browsing - A Forensic Approach" [JISA 19/1(2014), 88-100]. Search on Bibsonomy J. Inf. Sec. Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Raffaello Perrotta, Feng Hao Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Ehsan Toreini, Siamak F. Shahandashti, Feng Hao Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
1Chenlu Li, Feng Hao, Long Zhao, Lizhe Song, Xiangjun Dong Analysis of medical and healthcare data based on positive and negative association rules. Search on Bibsonomy ICNC-FSKD The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Patrick McCorry, Siamak F. Shahandashti, Feng Hao A Smart Contract for Boardroom Voting with Maximum Voter Privacy. Search on Bibsonomy Financial Cryptography The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Muhammad Ajmal Azad, Samiran Bag, Feng Hao M2M-REP: Reputation of Machines in the Internet of Things. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xun Yi, Fang-Yu Rao, Zahir Tari, Feng Hao, Elisa Bertino, Ibrahim Khalil, Albert Y. Zomaya ID2S Password-Authenticated Key Exchange Protocols. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Feng Hao, Dylan Clarke, Avelino Francisco Zorzo Deleting Secret Data with Public Verifiability. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao Towards Bitcoin Payment Networks. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Patrick McCorry, Siamak Fayyaz Shahandashti, Feng Hao Refund attacks on Bitcoin's Payment Protocol. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Siamak Fayyaz Shahandashti, Feng Hao DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2016 DBLP  BibTeX  RDF
1Feng Hao, Xun Yi, Elisa Bertino Editorial of special issue on security and privacy in cloud computing. Search on Bibsonomy J. Inf. Sec. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript. Search on Bibsonomy J. Inf. Sec. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao Stealing PINs via Mobile Sensors: Actual Risk versus User Perception. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
1Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
1Siamak F. Shahandashti, Feng Hao DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities. Search on Bibsonomy ESORICS (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Patrick McCorry, Siamak F. Shahandashti, Feng Hao Refund Attacks on Bitcoin's Payment Protocol. Search on Bibsonomy Financial Cryptography The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao Towards Bitcoin Payment Networks. Search on Bibsonomy ACISP (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maryam Mehrnezhad, Mohammed Aamir Ali, Feng Hao, Aad P. A. van Moorsel NFC Payment Spy: A Privacy Attack on Contactless Payments. Search on Bibsonomy SSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao Authenticated Key Exchange over Bitcoin. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2015 DBLP  BibTeX  RDF
1Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript. Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. Search on Bibsonomy IoTPTS@AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xun Yi, Feng Hao, Liqun Chen, Joseph K. Liu Practical Threshold Password-Authenticated Secret Sharing Protocol. Search on Bibsonomy ESORICS (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao ZombieCoin: Powering Next-Generation Botnets with Bitcoin. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao Authenticated Key Exchange over Bitcoin. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maryam Mehrnezhad, Feng Hao, Siamak Fayyaz Shahandashti Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment. Search on Bibsonomy SSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Feng Hao, Siamak Fayyaz Shahandashti The SPEKE Protocol Revisited. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2014 DBLP  BibTeX  RDF
1Feng Hao, Dylan Clarke, Avelino Francisco Zorzo Deleting Secret Data with Public Verifiability. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2014 DBLP  BibTeX  RDF
1Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini On the privacy of private browsing - A forensic approach. Search on Bibsonomy J. Inf. Sec. Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dylan Clarke, Feng Hao Cryptanalysis of the dragonfly key exchange protocol. Search on Bibsonomy IET Information Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xun Yi, Feng Hao, Elisa Bertino ID-Based Two-Server Password-Authenticated Key Exchange. Search on Bibsonomy ESORICS (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Feng Hao, Matthew Nicolas Kreeger, Brian Randell, Dylan Clarke, Siamak Fayyaz Shahandashti, Peter Hyun-Jeen Lee Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting. Search on Bibsonomy EVT/WOTE The full citation details ... 2014 DBLP  BibTeX  RDF
1Feng Hao, Siamak Fayyaz Shahandashti The SPEKE Protocol Revisited. Search on Bibsonomy SSR The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dylan Clarke, Feng Hao Cryptanalysis of the Dragonfly Key Exchange Protocol. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2013 DBLP  BibTeX  RDF
1Feng Hao, Dylan Clarke, Carlton Shepherd Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Feng Hao Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini On the Privacy of Private Browsing - A Forensic Approach. Search on Bibsonomy DPM/SETOP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Feng Hao, Dylan Clarke Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2012 DBLP  BibTeX  RDF
1Feng Hao, Brian Randell, Dylan Clarke Self-enforcing Electronic Voting. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dylan Clarke, Feng Hao, Brian Randell Analysis of Issues and Challenges of E-Voting in the UK. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Feng Hao Self-enforcing Electronic Voting (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dalia Khader, Ben Smyth, Peter Y. A. Ryan, Feng Hao A Fair and Robust Voting System by Broadcast. Search on Bibsonomy Electronic Voting The full citation details ... 2012 DBLP  BibTeX  RDF
1Feng Hao, Dylan Clarke Security Analysis of a Multi-factor Authenticated Key Exchange Protocol. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Feng Hao, Peter Y. A. Ryan How to Sync with Alice. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Feng Hao How to Sync with Alice (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Feng Hao, Peter Ryan J-PAKE: Authenticated Key Exchange Without PKI. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Feng Hao On Robust Key Agreement Based on Public Key Authentication. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Feng Hao On Small Subgroup Non-confinement Attack. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Feng Hao, Matthew Nicolas Kreeger Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting. Search on Bibsonomy IACR Cryptology ePrint Archive The full citation details ... 2010 DBLP  BibTeX  RDF
1Feng Hao, Peter Ryan J-PAKE: Authenticated Key Exchange without PKI. Search on Bibsonomy Trans. Computational Science The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Feng Hao, Peter Y. A. Ryan, Piotr Zielinski Anonymous voting by two-round public discussion. Search on Bibsonomy IET Information Security The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Feng Hao On Robust Key Agreement Based on Public Key Authentication. Search on Bibsonomy Financial Cryptography The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Feng Hao On Small Subgroup Non-confinement Attack. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Secure Remote Password protocol, secure communication, password authenticated key exchange
1Feng Hao, Piotr Zielinski The Power of Anonymous Veto in Public Discussion. Search on Bibsonomy Trans. Computational Science The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dining Cryptographers problem, DC-net, anonymous veto, secure multiparty computation
1Wenming Cao 0001, Feng Hao Geometry Algebra Neuron Based on Biomimetic Pattern Recognition. Search on Bibsonomy ISNN (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Feng Hao, John Daugman, Piotr Zielinski A Fast Search Algorithm for a Large Fuzzy Database. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Feng Hao, Peter Y. A. Ryan Password Authenticated Key Exchange by Juggling. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Feng Hao Password Authenticated Key Exchange by Juggling (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Feng Hao, Ross J. Anderson, John Daugman Combining Crypto with Biometrics Effectively. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF iris code, Hadamard code, Biometrics, Reed-Solomon code
1Feng Hao A 2-Round Anonymous Veto Protocol. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Feng Hao, Piotr Zielinski A 2-Round Anonymous Veto Protocol. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Feng Hao Combining Crypto with Biometrics: A New Human-Security Interface. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #86 of 86 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license