Kun Peng

Orcid: 0009-0000-2433-8610

According to our database1, Kun Peng authored at least 104 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Rage of righteousness: Anger's role in promoting debunking effects during the COVID-19 pandemic.
Comput. Hum. Behav., November, 2023

New fuel consumption model considering vehicular speed, acceleration, and jerk.
J. Intell. Transp. Syst., March, 2023

Prompt Based Tri-Channel Graph Convolution Neural Network for Aspect Sentiment Triplet Extraction.
CoRR, 2023

A Neural Network-Based Model with Conditional-Deactivation Structure for Autonomous Vehicle Motivation Prediction at Intersections.
Proceedings of the 2023 International Conference on Power, 2023

Receipt-Freeness By Flexible Usage Of Mix Network.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Characterizing ordinal network of time series based on complexity-entropy curve.
Pattern Recognit., 2022

Brief Announcement: Secure and Efficient Participant Authentication - Application to Mobile E-Voting.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2022

Efficient Homomorphic E-Voting Based On Batch Proof Techniques - An Improvement to Secure MPC Application.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Prompt as a Knowledge Probe for Chinese Spelling Check.
Proceedings of the Knowledge Science, Engineering and Management, 2022

2021
ToAM: a task-oriented authentication model for UAVs based on blockchain.
EURASIP J. Wirel. Commun. Netw., 2021

Perfect ZK Argument of Knowledge of Discrete Logarithm in A Cyclic Group with Unknown Order.
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021

2020
To be attractive or to be authentic? How two competing motivations influence self-presentation in online dating.
Internet Res., 2020

Paid and Anonymous Usage of Cloud Software.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Brief Announcements: Verifiable Data Sharing in Distributed Computing.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020

2019
Ultra-Low-Power CMOS Temperature Sensor for UHF RFID Systems.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

2018
A Climate of Support: A Process-Oriented Analysis of the Impact of Rapport on Peer Tutoring.
Proceedings of the Rethinking learning in the digital age: Making the Learning Sciences count, 2018

2016
Fiber optic perimeter detection based on human engineering.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

2014
Efficient homomorphic sealed-bid auction free of bid validity check and equality test.
Secur. Commun. Networks, 2014

Assumptions and conditions for mix networks: analysis, clarification and improvement.
Int. J. Secur. Networks, 2014

2013
Self-Calibration of Catadioptric Camera with Two Planar Mirrors from Silhouettes.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

A Secure Network for Mobile Wireless Service.
J. Inf. Process. Syst., 2013

A shuffle to achieve high efficiency through pre-computation and batch verification.
Int. J. Inf. Sec., 2013

Efficient proof of bid validity with untrusted verifier in homomorphic e-auction.
IET Inf. Secur., 2013

Multiplicative Homomorphic E-Auction with Formally Provable Security.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

Studying a Range Proof Technique - Exception and Optimisation.
Proceedings of the Progress in Cryptology, 2013

Modification and Optimisation of an ElGamal-Based PVSS Scheme.
Proceedings of the Progress in Cryptology, 2013

2012
Vanishing point detection using cascaded 1D Hough Transform from single images.
Pattern Recognit. Lett., 2012

Efficient and General PVSS Based on ElGamal Encryption.
J. Inf. Process. Syst., 2012

Attack and Correction: How to Design a Secure and Efficient Mix Network.
J. Inf. Process. Syst., 2012

How to communicate anonymously in a network: study and optimisation of efficiency and security of anonymous communication networks.
Int. J. Secur. Networks, 2012

Threshold distributed access control with public verification: a practical application of PVSS.
Int. J. Inf. Sec., 2012

Critical survey of existing publicly verifiable secret sharing schemes.
IET Inf. Secur., 2012

Attack against a batch zero-knowledge proof system.
IET Inf. Secur., 2012

Enhanced personal autostereoscopic telepresence system using commodity depth cameras.
Comput. Graph., 2012

A Secure Mix Network with an Efficient Validity Verification Mechanism.
Proceedings of the Internet and Distributed Computing Systems, 2012

A Secure and Efficient Mix Network Especially Suitable for E-Voting.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

How to Fix Two RSA-Based PVSS Schemes - Exploration and Solution.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
An efficient shuffling based eVoting scheme.
J. Syst. Softw., 2011

Efficient VSS free of computational assumption.
J. Parallel Distributed Comput., 2011

Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting.
J. Inf. Process. Syst., 2011

Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency.
Int. J. Inf. Sec., 2011

A general and efficient countermeasure to relation attacks in mix-based e-voting.
Int. J. Inf. Sec., 2011

Failure of A Mix Network
CoRR, 2011

Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Secure E-Commerce Based on Distributed Processing.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

Investigation and Survey of Secret Sharing in Verifiable Distributed Systems.
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011

A General, Flexible and Efficient Proof of Inclusion and Exclusion.
Proceedings of the Trusted Systems - Third International Conference, 2011

A Secure and Efficient Proof of Integer in an Interval Range.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Verifiable Secret Sharing with Comprehensive and Efficient Public Verification.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Analysing a Batch Range Proof to Address a Security Concern.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

Impracticality of Efficient PVSS in Real Life Security Standard (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

Survey, analysis and re-evaluation - How efficient and secure a mix network can be.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
Efficiency Improvement of Homomorphic E-Auction.
Proceedings of the Trust, 2010

An Efficient Range Proof Scheme.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

A Shuffling Scheme with Strict and Strong Security.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Vulnerability of a Non-membership Proof Scheme.
Proceedings of the SECRYPT 2010, 2010

Formal and Precise Analysis of Soundness of Several Shuffling Schemes.
Proceedings of the Provable Security - 4th International Conference, 2010

Efficient Proof of Validity of Votes in Homomorphic E-Voting.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Efficient Multiplicative Homomorphic E-Voting.
Proceedings of the Information Security - 13th International Conference, 2010

Simultaneous Vanishing Point Detection and Camera Calibration from Single Images.
Proceedings of the Advances in Visual Computing - 6th International Symposium, 2010

Single View Metrology Along Orthogonal Directions.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

A Secure RFID Ticket System for Public Transport.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Geometric properties of multiple reflections in catadioptric camera with two planar mirrors.
Proceedings of the Twenty-Third IEEE Conference on Computer Vision and Pattern Recognition, 2010

Batch Range Proof for Practical Small Ranges.
Proceedings of the Progress in Cryptology, 2010

Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A Design of Secure Preferential E-Voting.
Proceedings of the E-Voting and Identity, Second International Conference, 2009

Walkthrough in large environments using concatenated panoramas.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

A Hybrid E-Voting Scheme.
Proceedings of the Information Security Practice and Experience, 2009

Practicalization of a Range Test and Its Application to E-Auction.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

2008
Correct, Private, Flexible and Efficient Range Test.
J. Res. Pract. Inf. Technol., 2008

Efficient Vote Validity Check in Homomorphic Electronic Voting.
Proceedings of the Information Security and Cryptology, 2008

Correction, Optimisation and Secure and Efficient Application of PBD Shuffling.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Batch ZK Proof and Verification of OR Logic.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Batch zero-knowledge proof and verification and its applications.
ACM Trans. Inf. Syst. Secur., 2007

Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction.
Proceedings of the Information Security Practice and Experience, 2007

Secure Multiparty Computation of DNF.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

A Range Test Secure in the Active Adversary Model.
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007

2006
Batch verification of validity of bids in homomorphic e-auction.
Comput. Commun., 2006

A Smart Identification Card System Using Facial Biometric: From Architecture to Application.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Sealed-Bid Micro Auctions.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Klein Bottle Routing: An Alternative to Onion Routing and Mix Network.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

A Novel Range Test.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.
Proceedings of the Progress in Cryptology, 2005

A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.
Proceedings of the Information Security, 8th International Conference, 2005

Ciphertext Comparison, a New Solution to the Millionaire Problem.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

A Robust and Efficient Algorithm for Eye Detection on Gray Intensity Face.
Proceedings of the Pattern Recognition and Image Analysis, 2005

Simple and Efficient Shuffling with Provable Correctness and ZK Privacy.
Proceedings of the Advances in Cryptology, 2005

A Novel Method to Maintain Privacy in Mobile Agent Applications.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

A novel scheme of face verification using active appearance models.
Proceedings of the Advanced Video and Signal Based Surveillance, 2005

Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
A Correct, Private, and Efficient Mix Network.
Proceedings of the Public Key Cryptography, 2004

Multiplicative Homomorphic E-Voting.
Proceedings of the Progress in Cryptology, 2004

An Efficient and Verifiable Solution to the Millionaire Problem.
Proceedings of the Information Security and Cryptology, 2004

Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents.
Proceedings of the E-Commerce and Web Technologies, 5th International Conference, 2004

A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.
Proceedings of the Cryptographic Algorithms and their Uses, 2004

Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
An Improved Forward Integrity Protocol for Mobile Agents.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Five Sealed-bid Auction Models.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003

2002
Non-interactive Auction Schemewith Strong Privacy.
Proceedings of the Information Security and Cryptology, 2002

Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2000
On a Session Key Compromise Problem in [KC95] protocol.
ACM SIGOPS Oper. Syst. Rev., 2000


  Loading...