Feng Hao

According to our database1, Feng Hao
  • authored at least 68 papers between 2005 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Verifiable Classroom Voting in Practice.
IEEE Security & Privacy, 2018

2017
J-PAKE: Password-Authenticated Key Exchange by Juggling.
RFC, September, 2017

Schnorr Non-interactive Zero-Knowledge Proof.
RFC, September, 2017

Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns.
ACM Trans. Priv. Secur., 2017

Erratum to "On the Privacy of Private Browsing - A Forensic Approach" [JISA 19/1(2014), 88-100].
J. Inf. Sec. Appl., 2017

A Smart Contract for Boardroom Voting with Maximum Voter Privacy.
IACR Cryptology ePrint Archive, 2017

Verifiable Classroom Voting in Practice.
IACR Cryptology ePrint Archive, 2017

Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions.
CoRR, 2017

Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns.
CoRR, 2017

A Smart Contract for Boardroom Voting with Maximum Voter Privacy.
Proceedings of the Financial Cryptography and Data Security, 2017

M2M-REP: Reputation of Machines in the Internet of Things.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Deleting Secret Data with Public Verifiability.
IEEE Trans. Dependable Sec. Comput., 2016

ID2S Password-Authenticated Key Exchange Protocols.
IEEE Trans. Computers, 2016

TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript.
J. Inf. Sec. Appl., 2016

Editorial of special issue on security and privacy in cloud computing.
J. Inf. Sec. Appl., 2016

DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities.
IACR Cryptology ePrint Archive, 2016

Refund attacks on Bitcoin's Payment Protocol.
IACR Cryptology ePrint Archive, 2016

Towards Bitcoin Payment Networks.
IACR Cryptology ePrint Archive, 2016

Stealing PINs via Mobile Sensors: Actual Risk versus User Perception.
CoRR, 2016

TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript.
CoRR, 2016

NFC Payment Spy: A Privacy Attack on Contactless Payments.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

Refund Attacks on Bitcoin's Payment Protocol.
Proceedings of the Financial Cryptography and Data Security, 2016

DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities.
Proceedings of the Computer Security - ESORICS 2016, 2016

Towards Bitcoin Payment Networks.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Authenticated Key Exchange over Bitcoin.
IACR Cryptology ePrint Archive, 2015

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group.
IACR Cryptology ePrint Archive, 2015

Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Authenticated Key Exchange over Bitcoin.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

ZombieCoin: Powering Next-Generation Botnets with Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2015

Practical Threshold Password-Authenticated Secret Sharing Protocol.
Proceedings of the Computer Security - ESORICS 2015, 2015

TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript.
Proceedings of the 10th ACM Symposium on Information, 2015

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015

2014
On the privacy of private browsing - A forensic approach.
J. Inf. Sec. Appl., 2014

Cryptanalysis of the dragonfly key exchange protocol.
IET Information Security, 2014

The SPEKE Protocol Revisited.
IACR Cryptology ePrint Archive, 2014

Deleting Secret Data with Public Verifiability.
IACR Cryptology ePrint Archive, 2014

Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

The SPEKE Protocol Revisited.
Proceedings of the Security Standardisation Research - First International Conference, 2014

ID-Based Two-Server Password-Authenticated Key Exchange.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Cryptanalysis of the Dragonfly Key Exchange Protocol.
IACR Cryptology ePrint Archive, 2013

Verifiable Classroom Voting: Where Cryptography Meets Pedagogy.
Proceedings of the Security Protocols XXI, 2013

Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

On the Privacy of Private Browsing - A Forensic Approach.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol.
IACR Cryptology ePrint Archive, 2012

Self-enforcing Electronic Voting.
Proceedings of the Security Protocols XX, 2012

Self-enforcing Electronic Voting (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Analysis of Issues and Challenges of E-Voting in the UK.
Proceedings of the Security Protocols XX, 2012

A Fair and Robust Voting System by Broadcast.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

Security Analysis of a Multi-factor Authenticated Key Exchange Protocol.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
How to Sync with Alice.
Proceedings of the Security Protocols XIX, 2011

How to Sync with Alice (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

2010
J-PAKE: Authenticated Key Exchange without PKI.
Trans. Computational Science, 2010

Anonymous voting by two-round public discussion.
IET Information Security, 2010

J-PAKE: Authenticated Key Exchange Without PKI.
IACR Cryptology ePrint Archive, 2010

Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting.
IACR Cryptology ePrint Archive, 2010

On Small Subgroup Non-confinement Attack.
IACR Cryptology ePrint Archive, 2010

On Robust Key Agreement Based on Public Key Authentication.
IACR Cryptology ePrint Archive, 2010

On Robust Key Agreement Based on Public Key Authentication.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

On Small Subgroup Non-confinement Attack.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
The Power of Anonymous Veto in Public Discussion.
Trans. Computational Science, 2009

Geometry Algebra Neuron Based on Biomimetic Pattern Recognition.
Proceedings of the Sixth International Symposium on Neural Networks, 2009

2008
A Fast Search Algorithm for a Large Fuzzy Database.
IEEE Trans. Information Forensics and Security, 2008

Password Authenticated Key Exchange by Juggling.
Proceedings of the Security Protocols XVI, 2008

Password Authenticated Key Exchange by Juggling (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

2006
Combining Crypto with Biometrics Effectively.
IEEE Trans. Computers, 2006

A 2-Round Anonymous Veto Protocol.
Proceedings of the Security Protocols, 2006

A 2-Round Anonymous Veto Protocol.
Proceedings of the Security Protocols, 2006

2005
Combining Crypto with Biometrics: A New Human-Security Interface.
Proceedings of the Security Protocols, 2005


  Loading...