default search action
Feng Hao 0001
Person information
- affiliation: University of Warwick, Department of Computer Science, Conventry, UK
- affiliation (former): University of Cambridge, Computer Laboratory, UK
Other persons with the same name
- Feng Hao — disambiguation page
- Feng Hao 0002 — Qilu University of Technology, Jinan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j48]Liang Zhang, Haibin Kan, Feiyang Qiu, Feng Hao:
A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized CP-ABE. Comput. J. 67(3): 1017-1029 (2024) - [j47]Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, Feng Hao:
On the feasibility of E2E verifiable online voting - A case study from Durga Puja trial. J. Inf. Secur. Appl. 81: 103719 (2024) - [j46]Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao:
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems. ACM Trans. Priv. Secur. 27(1): 1:1-1:25 (2024) - [j45]Sifan Li, Yue Cao, Hassan Jalil Hadi, Feng Hao, Faisal Bashir Hussain, Luan Chen:
ECF-IDS: An Enhanced Cuckoo Filter-Based Intrusion Detection System for In-Vehicle Network. IEEE Trans. Netw. Serv. Manag. 21(4): 3846-3860 (2024) - [c43]Luke Harrison, Samiran Bag, Feng Hao:
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities. AsiaCCS 2024 - 2023
- [j44]Shih-Chun You, Markus G. Kuhn, Sumanta Sarkar, Feng Hao:
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 344-366 (2023) - [c42]Mohammad Sadegh Nourbakhsh, Feng Hao, Arshad Jhumka:
Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications. ESORICS Workshops (1) 2023: 327-343 - [c41]Samuel Herodotou, Feng Hao:
Spying on the Spy: Security Analysis of Hidden Cameras. NSS 2023: 345-362 - [c40]Mahshid Mehr Nezhad, Elliot Laidlaw, Feng Hao:
Security Analysis of Mobile Point-of-Sale Terminals. NSS 2023: 363-384 - [i35]Samuel Herodotou, Feng Hao:
Spying on the Spy: Security Analysis of Hidden Cameras. CoRR abs/2306.00610 (2023) - [i34]Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao:
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems. CoRR abs/2306.06198 (2023) - [i33]Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot:
Owl: An Augmented Password-Authenticated Key Exchange Scheme. IACR Cryptol. ePrint Arch. 2023: 768 (2023) - [i32]Horia Druliac, Matthew Bardsley, Chris Riches, Christian Dunn, Luke Harrison, Bimal Roy, Feng Hao:
On the Feasibility of E2E Verifiable Online Voting - A Case Study From Durga Puja Trial. IACR Cryptol. ePrint Arch. 2023: 1770 (2023) - [i31]Luke Harrison, Samiran Bag, Feng Hao:
Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities. IACR Cryptol. ePrint Arch. 2023: 1920 (2023) - 2022
- [j43]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
End-to-end verifiable cumulative voting without tallying authorities. Int. J. Appl. Cryptogr. 4(2): 85-103 (2022) - [j42]Liang Zhang, Feiyang Qiu, Feng Hao, Haibin Kan:
1-Round Distributed Key Generation With Efficient Reconstruction Using Decentralized CP-ABE. IEEE Trans. Inf. Forensics Secur. 17: 894-907 (2022) - [c39]Feng Hao, Paul C. van Oorschot:
SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons. AsiaCCS 2022: 697-711 - [c38]Luke Harrison, Samiran Bag, Hang Luo, Feng Hao:
VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities. AsiaCCS 2022: 1113-1125 - [c37]Samiran Bag, Indranil Ghosh Ray, Feng Hao:
A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search. SECRYPT 2022: 366-373 - 2021
- [j41]Muhammad Ajmal Azad, Samiran Bag, Farhan Ahmad, Feng Hao:
Sharing is Caring: A collaborative framework for sharing security alerts. Comput. Commun. 165: 75-84 (2021) - [j40]Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng Hao:
Formal modelling and security analysis of bitcoin's payment protocol. Comput. Secur. 107: 102279 (2021) - [j39]Feng Hao:
Prudent Practices in Security Standardization. IEEE Commun. Stand. Mag. 5(3): 40-47 (2021) - [j38]Muhammad Ajmal Azad, Charith Perera, Samiran Bag, Mahmoud Barhamgi, Feng Hao:
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks. ACM Trans. Cyber Phys. Syst. 5(1): 4:1-4:24 (2021) - [j37]Shen Wang, Ehsan Toreini, Feng Hao:
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. IEEE Trans. Inf. Forensics Secur. 16: 2823-2835 (2021) - [c36]Mahshid Mehr Nezhad, Feng Hao:
OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks. ACSAC 2021: 375-384 - [i30]Shen Wang, Ehsan Toreini, Feng Hao:
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. CoRR abs/2103.06184 (2021) - [i29]Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng Hao:
Formal Modelling and Security Analysis of Bitcoin's Payment Protocol. CoRR abs/2103.08436 (2021) - [i28]Feng Hao:
Prudent Practices in Security Standardization. IACR Cryptol. ePrint Arch. 2021: 839 (2021) - [i27]Feng Hao, Paul C. van Oorschot:
SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons. IACR Cryptol. ePrint Arch. 2021: 1492 (2021) - 2020
- [j36]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting. IEEE Secur. Priv. 18(6): 6-13 (2020) - [j35]Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Andrii Shalaginov:
Decentralized Self-Enforcing Trust Management System for Social Internet of Things. IEEE Internet Things J. 7(4): 2690-2703 (2020) - [j34]Somnath Panja, Samiran Bag, Feng Hao, Bimal Kumar Roy:
A Smart Contract System for Decentralized Borda Count Voting. IEEE Trans. Engineering Management 67(4): 1323-1339 (2020) - [j33]Muhammad Ajmal Azad, Samiran Bag, Shazia Tabassum, Feng Hao:
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams. IEEE Trans. Emerg. Top. Comput. 8(2): 313-327 (2020) - [j32]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IEEE Trans. Inf. Forensics Secur. 15: 2042-2052 (2020) - [j31]Muhammad Ajmal Azad, Samiran Bag, Charith Perera, Mahmoud Barhamgi, Feng Hao:
Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network. IEEE Trans. Ind. Informatics 16(5): 3606-3615 (2020) - [i26]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. IACR Cryptol. ePrint Arch. 2020: 650 (2020)
2010 – 2019
- 2019
- [j30]Mohammed Aamir Ali, Muhammad Ajmal Azad, Mario Parreño Centeno, Feng Hao, Aad van Moorsel:
Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Gener. Comput. Syst. 100: 408-427 (2019) - [j29]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
PriVeto: a fully private two-round veto protocol. IET Inf. Secur. 13(4): 311-320 (2019) - [j28]Ehsan Toreini, Siamak F. Shahandashti, Maryam Mehrnezhad, Feng Hao:
DOMtegrity: ensuring web page integrity against malicious browser extensions. Int. J. Inf. Sec. 18(6): 801-814 (2019) - [j27]Muhammad Ajmal Azad, Samiran Bag, Simon Parkinson, Feng Hao:
TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks. IEEE Internet Things J. 6(4): 5878-5891 (2019) - [j26]Xun Yi, Zahir Tari, Feng Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan Lam, Ibrahim Khalil, Albert Y. Zomaya:
Efficient threshold password-authenticated secret sharing protocols for cloud computing. J. Parallel Distributed Comput. 128: 57-70 (2019) - [c35]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
E2E Verifiable Borda Count Voting System without Tallying Authorities. ARES 2019: 11:1-11:9 - [c34]Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao:
SSR'19: The 5th Conference on Security Standardisation Research. CCS 2019: 2699-2700 - [c33]Samiran Bag, Feng Hao:
E2E Verifiable Electronic Voting System for Shareholders. DSC 2019: 1-8 - [e2]Feng Hao, Sushmita Ruj, Sourav Sen Gupta:
Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings. Lecture Notes in Computer Science 11898, Springer 2019, ISBN 978-3-030-35422-0 [contents] - [e1]Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao:
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6832-2 [contents] - [i25]Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, Feng Hao:
DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions. CoRR abs/1905.12951 (2019) - [i24]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IACR Cryptol. ePrint Arch. 2019: 1332 (2019) - 2018
- [j25]Chengqing Li, Dongdong Lin, Bingbing Feng, Jinhu Lu, Feng Hao:
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy. IEEE Access 6: 75834-75842 (2018) - [j24]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
A privacy-aware decentralized and personalized reputation system. Comput. Secur. 77: 514-530 (2018) - [j23]Muhammad Ajmal Azad, Samiran Bag, Feng Hao, Khaled Salah:
M2M-REP: Reputation system for machines in the internet of things. Comput. Secur. 79: 1-16 (2018) - [j22]Muhammad Ajmal Azad, Samiran Bag, Feng Hao:
PrivBox: Verifiable decentralized reputation system for online marketplaces. Future Gener. Comput. Syst. 89: 44-57 (2018) - [j21]Chengqing Li, Dongdong Lin, Jinhu Lu, Feng Hao:
Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography. IEEE Multim. 25(4): 46-56 (2018) - [j20]Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. IEEE Secur. Priv. 16(1): 72-81 (2018) - [j19]Raffaello Perrotta, Feng Hao:
Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions. IEEE Secur. Priv. 16(4): 66-81 (2018) - [j18]Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Stealing PINs via mobile sensors: actual risk versus user perception. Int. J. Inf. Sec. 17(3): 291-313 (2018) - [j17]Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao:
ZombieCoin 2.0: managing next-generation botnets using Bitcoin. Int. J. Inf. Sec. 17(4): 411-422 (2018) - [j16]Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong:
Analyzing and Patching SPEKE in ISO/IEC. IEEE Trans. Inf. Forensics Secur. 13(11): 2844-2855 (2018) - [i23]Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong:
Analysing and Patching SPEKE in ISO/IEC. CoRR abs/1802.04900 (2018) - [i22]Saulius Venskutonis, Feng Hao, Matthew Collison:
On legitimate mining of cryptocurrency in the browser - a feasibility study. CoRR abs/1812.04054 (2018) - 2017
- [j15]Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini:
Erratum to "On the Privacy of Private Browsing - A Forensic Approach" [JISA 19/1(2014), 88-100]. J. Inf. Secur. Appl. 33: 66 (2017) - [j14]Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns. ACM Trans. Priv. Secur. 20(3): 9:1-9:29 (2017) - [c32]Muhammad Ajmal Azad, Samiran Bag, Feng Hao:
M2M-REP: Reputation of Machines in the Internet of Things. ARES 2017: 28:1-28:7 - [c31]Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. Financial Cryptography 2017: 357-375 - [i21]Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns. CoRR abs/1705.02510 (2017) - [i20]Raffaello Perrotta, Feng Hao:
Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions. CoRR abs/1709.09577 (2017) - [i19]Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. IACR Cryptol. ePrint Arch. 2017: 56 (2017) - [i18]Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. IACR Cryptol. ePrint Arch. 2017: 110 (2017) - [i17]Feng Hao:
Schnorr Non-interactive Zero-Knowledge Proof. RFC 8235: 1-13 (2017) - [i16]Feng Hao:
J-PAKE: Password-Authenticated Key Exchange by Juggling. RFC 8236: 1-15 (2017) - 2016
- [j13]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript. J. Inf. Secur. Appl. 26: 23-38 (2016) - [j12]Feng Hao, Xun Yi, Elisa Bertino:
Editorial of special issue on security and privacy in cloud computing. J. Inf. Secur. Appl. 27-28: 1-2 (2016) - [j11]Xun Yi, Fang-Yu Rao, Zahir Tari, Feng Hao, Elisa Bertino, Ibrahim Khalil, Albert Y. Zomaya:
ID2S Password-Authenticated Key Exchange Protocols. IEEE Trans. Computers 65(12): 3687-3701 (2016) - [j10]Feng Hao, Dylan Clarke, Avelino Francisco Zorzo:
Deleting Secret Data with Public Verifiability. IEEE Trans. Dependable Secur. Comput. 13(6): 617-629 (2016) - [c30]Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao:
Towards Bitcoin Payment Networks. ACISP (1) 2016: 57-76 - [c29]Siamak F. Shahandashti, Feng Hao:
DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities. ESORICS (2) 2016: 223-240 - [c28]Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
Refund Attacks on Bitcoin's Payment Protocol. Financial Cryptography 2016: 581-599 - [c27]Maryam Mehrnezhad, Mohammed Aamir Ali, Feng Hao, Aad P. A. van Moorsel:
NFC Payment Spy: A Privacy Attack on Contactless Payments. SSR 2016: 92-111 - [i15]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript. CoRR abs/1602.04115 (2016) - [i14]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception. CoRR abs/1605.05549 (2016) - [i13]Patrick McCorry, Siamak Fayyaz Shahandashti, Feng Hao:
Refund attacks on Bitcoin's Payment Protocol. IACR Cryptol. ePrint Arch. 2016: 24 (2016) - [i12]Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao:
Towards Bitcoin Payment Networks. IACR Cryptol. ePrint Arch. 2016: 408 (2016) - [i11]Siamak Fayyaz Shahandashti, Feng Hao:
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities. IACR Cryptol. ePrint Arch. 2016: 670 (2016) - 2015
- [c26]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IoTPTS@AsiaCCS 2015: 27-34 - [c25]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript. AsiaCCS 2015: 673 - [c24]Xun Yi, Feng Hao, Liqun Chen, Joseph K. Liu:
Practical Threshold Password-Authenticated Secret Sharing Protocol. ESORICS (1) 2015: 347-365 - [c23]Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao:
ZombieCoin: Powering Next-Generation Botnets with Bitcoin. Financial Cryptography Workshops 2015: 34-48 - [c22]Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. SSR 2015: 3-20 - [c21]Maryam Mehrnezhad, Feng Hao, Siamak Fayyaz Shahandashti:
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment. SSR 2015: 21-39 - [i10]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IACR Cryptol. ePrint Arch. 2015: 80 (2015) - [i9]Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. IACR Cryptol. ePrint Arch. 2015: 308 (2015) - 2014
- [j9]Dylan Clarke, Feng Hao:
Cryptanalysis of the dragonfly key exchange protocol. IET Inf. Secur. 8(6): 283-289 (2014) - [j8]Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini:
On the privacy of private browsing - A forensic approach. J. Inf. Secur. Appl. 19(1): 88-100 (2014) - [c20]Xun Yi, Feng Hao, Elisa Bertino:
ID-Based Two-Server Password-Authenticated Key Exchange. ESORICS (2) 2014: 257-276 - [c19]Feng Hao, Siamak Fayyaz Shahandashti:
The SPEKE Protocol Revisited. SSR 2014: 26-38 - [c18]Feng Hao, Matthew Nicolas Kreeger, Brian Randell, Dylan Clarke, Siamak Fayyaz Shahandashti, Peter Hyun-Jeen Lee:
Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting. EVT/WOTE 2014 - [i8]Feng Hao, Dylan Clarke, Avelino Francisco Zorzo:
Deleting Secret Data with Public Verifiability. IACR Cryptol. ePrint Arch. 2014: 364 (2014) - [i7]Feng Hao, Siamak Fayyaz Shahandashti:
The SPEKE Protocol Revisited. IACR Cryptol. ePrint Arch. 2014: 585 (2014) - 2013
- [c17]Kiavash Satvat, Matthew Forshaw, Feng Hao, Ehsan Toreini:
On the Privacy of Private Browsing - A Forensic Approach. DPM/SETOP 2013: 380-389 - [c16]Feng Hao, Dylan Clarke, Carlton Shepherd:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. Security Protocols Workshop 2013: 245-254 - [c15]Feng Hao:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion). Security Protocols Workshop 2013: 255-264 - [i6]Dylan Clarke, Feng Hao:
Cryptanalysis of the Dragonfly Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2013: 58 (2013) - 2012
- [c14]Feng Hao, Dylan Clarke:
Security Analysis of a Multi-factor Authenticated Key Exchange Protocol. ACNS 2012: 1-11 - [c13]Dalia Khader, Ben Smyth, Peter Y. A. Ryan, Feng Hao:
A Fair and Robust Voting System by Broadcast. Electronic Voting 2012: 285-299 - [c12]Feng Hao, Brian Randell, Dylan Clarke:
Self-enforcing Electronic Voting. Security Protocols Workshop 2012: 23-31 - [c11]Feng Hao:
Self-enforcing Electronic Voting (Transcript of Discussion). Security Protocols Workshop 2012: 32-40 - [c10]Dylan Clarke, Feng Hao, Brian Randell:
Analysis of Issues and Challenges of E-Voting in the UK. Security Protocols Workshop 2012: 126-135 - [i5]Feng Hao, Dylan Clarke:
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2012: 39 (2012) - 2011
- [c9]Feng Hao, Peter Y. A. Ryan:
How to Sync with Alice. Security Protocols Workshop 2011: 170-178 - [c8]Feng Hao:
How to Sync with Alice (Transcript of Discussion). Security Protocols Workshop 2011: 179-188 - 2010
- [j7]Feng Hao, Peter Y. A. Ryan, Piotr Zielinski:
Anonymous voting by two-round public discussion. IET Inf. Secur. 4(2): 62-67 (2010) - [j6]Feng Hao, Peter Y. A. Ryan:
J-PAKE: Authenticated Key Exchange without PKI. Trans. Comput. Sci. 11: 192-206 (2010) - [c7]Feng Hao:
On Small Subgroup Non-confinement Attack. CIT 2010: 1022-1025 - [c6]Feng Hao:
On Robust Key Agreement Based on Public Key Authentication. Financial Cryptography 2010: 383-390 - [i4]Feng Hao:
On Robust Key Agreement Based on Public Key Authentication. IACR Cryptol. ePrint Arch. 2010: 136 (2010) - [i3]Feng Hao:
On Small Subgroup Non-confinement Attack. IACR Cryptol. ePrint Arch. 2010: 149 (2010) - [i2]