


Остановите войну!
for scientists:


default search action
Feng Hao 0001
Person information

- affiliation: University of Warwick, Department of Computer Science, Conventry, UK
- affiliation (former): University of Cambridge, Computer Laboratory, UK
Other persons with the same name
- Feng Hao — disambiguation page
- Feng Hao 0002 — Qilu University of Technology, Jinan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j44]Shih-Chun You, Markus G. Kuhn, Sumanta Sarkar, Feng Hao:
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 344-366 (2023) - [c41]Samuel Herodotou
, Feng Hao
:
Spying on the Spy: Security Analysis of Hidden Cameras. NSS 2023: 345-362 - [c40]Mahshid Mehr Nezhad, Elliot Laidlaw, Feng Hao:
Security Analysis of Mobile Point-of-Sale Terminals. NSS 2023: 363-384 - [i32]Shen Wang, Mahshid Delavar, Muhammad Ajmal Azad, Farshad Nabizadeh, Steve Smith, Feng Hao:
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems. CoRR abs/2306.06198 (2023) - [i31]Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot:
Owl: An Augmented Password-Authenticated Key Exchange Scheme. IACR Cryptol. ePrint Arch. 2023: 768 (2023) - 2022
- [j43]Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
End-to-end verifiable cumulative voting without tallying authorities. Int. J. Appl. Cryptogr. 4(2): 85-103 (2022) - [j42]Liang Zhang
, Feiyang Qiu, Feng Hao
, Haibin Kan
:
1-Round Distributed Key Generation With Efficient Reconstruction Using Decentralized CP-ABE. IEEE Trans. Inf. Forensics Secur. 17: 894-907 (2022) - [c39]Feng Hao, Paul C. van Oorschot:
SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons. AsiaCCS 2022: 697-711 - [c38]Luke Harrison, Samiran Bag, Hang Luo
, Feng Hao:
VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities. AsiaCCS 2022: 1113-1125 - [c37]Samiran Bag, Indranil Ghosh Ray, Feng Hao:
A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search. SECRYPT 2022: 366-373 - 2021
- [j41]Muhammad Ajmal Azad, Samiran Bag, Farhan Ahmad, Feng Hao
:
Sharing is Caring: A collaborative framework for sharing security alerts. Comput. Commun. 165: 75-84 (2021) - [j40]Paolo Modesti
, Siamak F. Shahandashti
, Patrick McCorry, Feng Hao
:
Formal modelling and security analysis of bitcoin's payment protocol. Comput. Secur. 107: 102279 (2021) - [j39]Feng Hao
:
Prudent Practices in Security Standardization. IEEE Commun. Stand. Mag. 5(3): 40-47 (2021) - [j38]Muhammad Ajmal Azad, Charith Perera, Samiran Bag, Mahmoud Barhamgi, Feng Hao:
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks. ACM Trans. Cyber Phys. Syst. 5(1): 4:1-4:24 (2021) - [j37]Shen Wang
, Ehsan Toreini
, Feng Hao
:
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. IEEE Trans. Inf. Forensics Secur. 16: 2823-2835 (2021) - [c36]Mahshid Mehr Nezhad, Feng Hao
:
OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks. ACSAC 2021: 375-384 - [i30]Shen Wang, Ehsan Toreini, Feng Hao:
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting. CoRR abs/2103.06184 (2021) - [i29]Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng Hao:
Formal Modelling and Security Analysis of Bitcoin's Payment Protocol. CoRR abs/2103.08436 (2021) - [i28]Feng Hao:
Prudent Practices in Security Standardization. IACR Cryptol. ePrint Arch. 2021: 839 (2021) - [i27]Feng Hao, Paul C. van Oorschot:
SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons. IACR Cryptol. ePrint Arch. 2021: 1492 (2021) - 2020
- [j36]Feng Hao
, Shen Wang, Samiran Bag
, Rob Procter, Siamak F. Shahandashti
, Maryam Mehrnezhad, Ehsan Toreini
, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting. IEEE Secur. Priv. 18(6): 6-13 (2020) - [j35]Muhammad Ajmal Azad
, Samiran Bag
, Feng Hao
, Andrii Shalaginov:
Decentralized Self-Enforcing Trust Management System for Social Internet of Things. IEEE Internet Things J. 7(4): 2690-2703 (2020) - [j34]Somnath Panja
, Samiran Bag
, Feng Hao
, Bimal Kumar Roy:
A Smart Contract System for Decentralized Borda Count Voting. IEEE Trans. Engineering Management 67(4): 1323-1339 (2020) - [j33]Muhammad Ajmal Azad
, Samiran Bag
, Shazia Tabassum
, Feng Hao
:
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams. IEEE Trans. Emerg. Top. Comput. 8(2): 313-327 (2020) - [j32]Samiran Bag
, Feng Hao
, Siamak F. Shahandashti
, Indranil Ghosh Ray
:
SEAL: Sealed-Bid Auction Without Auctioneers. IEEE Trans. Inf. Forensics Secur. 15: 2042-2052 (2020) - [j31]Muhammad Ajmal Azad
, Samiran Bag
, Charith Perera
, Mahmoud Barhamgi
, Feng Hao
:
Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network. IEEE Trans. Ind. Informatics 16(5): 3606-3615 (2020) - [i26]Feng Hao, Shen Wang, Samiran Bag, Rob Procter, Siamak F. Shahandashti, Maryam Mehrnezhad, Ehsan Toreini, Roberto Metere, Lana Y. J. Liu:
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead. IACR Cryptol. ePrint Arch. 2020: 650 (2020)
2010 – 2019
- 2019
- [j30]Mohammed Aamir Ali, Muhammad Ajmal Azad, Mario Parreño Centeno, Feng Hao
, Aad van Moorsel:
Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Gener. Comput. Syst. 100: 408-427 (2019) - [j29]Samiran Bag
, Muhammad Ajmal Azad, Feng Hao
:
PriVeto: a fully private two-round veto protocol. IET Inf. Secur. 13(4): 311-320 (2019) - [j28]Ehsan Toreini
, Siamak F. Shahandashti, Maryam Mehrnezhad, Feng Hao
:
DOMtegrity: ensuring web page integrity against malicious browser extensions. Int. J. Inf. Sec. 18(6): 801-814 (2019) - [j27]Muhammad Ajmal Azad
, Samiran Bag, Simon Parkinson
, Feng Hao
:
TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks. IEEE Internet Things J. 6(4): 5878-5891 (2019) - [j26]Xun Yi, Zahir Tari
, Feng Hao
, Liqun Chen
, Joseph K. Liu, Xuechao Yang
, Kwok-Yan Lam
, Ibrahim Khalil
, Albert Y. Zomaya
:
Efficient threshold password-authenticated secret sharing protocols for cloud computing. J. Parallel Distributed Comput. 128: 57-70 (2019) - [c35]Samiran Bag, Muhammad Ajmal Azad, Feng Hao
:
E2E Verifiable Borda Count Voting System without Tallying Authorities. ARES 2019: 11:1-11:9 - [c34]Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao
:
SSR'19: The 5th Conference on Security Standardisation Research. CCS 2019: 2699-2700 - [c33]Samiran Bag, Feng Hao
:
E2E Verifiable Electronic Voting System for Shareholders. DSC 2019: 1-8 - [e2]Feng Hao, Sushmita Ruj, Sourav Sen Gupta
:
Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings. Lecture Notes in Computer Science 11898, Springer 2019, ISBN 978-3-030-35422-0 [contents] - [e1]Maryam Mehrnezhad, Thyla van der Merwe, Feng Hao:
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6832-2 [contents] - [i25]Ehsan Toreini, Maryam Mehrnezhad, Siamak F. Shahandashti, Feng Hao:
DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions. CoRR abs/1905.12951 (2019) - [i24]Samiran Bag, Feng Hao, Siamak F. Shahandashti, Indranil Ghosh Ray:
SEAL: Sealed-Bid Auction Without Auctioneers. IACR Cryptol. ePrint Arch. 2019: 1332 (2019) - 2018
- [j25]Chengqing Li
, Dongdong Lin, Bingbing Feng, Jinhu Lu, Feng Hao
:
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy. IEEE Access 6: 75834-75842 (2018) - [j24]Samiran Bag
, Muhammad Ajmal Azad, Feng Hao
:
A privacy-aware decentralized and personalized reputation system. Comput. Secur. 77: 514-530 (2018) - [j23]Muhammad Ajmal Azad, Samiran Bag, Feng Hao
, Khaled Salah:
M2M-REP: Reputation system for machines in the internet of things. Comput. Secur. 79: 1-16 (2018) - [j22]Muhammad Ajmal Azad, Samiran Bag, Feng Hao
:
PrivBox: Verifiable decentralized reputation system for online marketplaces. Future Gener. Comput. Syst. 89: 44-57 (2018) - [j21]Chengqing Li
, Dongdong Lin, Jinhu Lu, Feng Hao
:
Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography. IEEE Multim. 25(4): 46-56 (2018) - [j20]Feng Hao
, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. IEEE Secur. Priv. 16(1): 72-81 (2018) - [j19]Raffaello Perrotta, Feng Hao
:
Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions. IEEE Secur. Priv. 16(4): 66-81 (2018) - [j18]Maryam Mehrnezhad, Ehsan Toreini, Siamak F. Shahandashti
, Feng Hao
:
Stealing PINs via mobile sensors: actual risk versus user perception. Int. J. Inf. Sec. 17(3): 291-313 (2018) - [j17]Syed Taha Ali
, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao
:
ZombieCoin 2.0: managing next-generation botnets using Bitcoin. Int. J. Inf. Sec. 17(4): 411-422 (2018) - [j16]Feng Hao
, Roberto Metere, Siamak F. Shahandashti
, Changyu Dong
:
Analyzing and Patching SPEKE in ISO/IEC. IEEE Trans. Inf. Forensics Secur. 13(11): 2844-2855 (2018) - [i23]Feng Hao, Roberto Metere, Siamak F. Shahandashti, Changyu Dong:
Analysing and Patching SPEKE in ISO/IEC. CoRR abs/1802.04900 (2018) - [i22]Saulius Venskutonis, Feng Hao, Matthew Collison:
On legitimate mining of cryptocurrency in the browser - a feasibility study. CoRR abs/1812.04054 (2018) - 2017
- [j15]Kiavash Satvat, Matthew Forshaw
, Feng Hao
, Ehsan Toreini:
Erratum to "On the Privacy of Private Browsing - A Forensic Approach" [JISA 19/1(2014), 88-100]. J. Inf. Secur. Appl. 33: 66 (2017) - [j14]Ehsan Toreini, Siamak F. Shahandashti
, Feng Hao
:
Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns. ACM Trans. Priv. Secur. 20(3): 9:1-9:29 (2017) - [c32]Muhammad Ajmal Azad, Samiran Bag, Feng Hao
:
M2M-REP: Reputation of Machines in the Internet of Things. ARES 2017: 28:1-28:7 - [c31]Patrick McCorry, Siamak F. Shahandashti
, Feng Hao
:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. Financial Cryptography 2017: 357-375 - [i21]Ehsan Toreini, Siamak F. Shahandashti, Feng Hao:
Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns. CoRR abs/1705.02510 (2017) - [i20]Raffaello Perrotta, Feng Hao:
Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions. CoRR abs/1709.09577 (2017) - [i19]Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. IACR Cryptol. ePrint Arch. 2017: 56 (2017) - [i18]Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. IACR Cryptol. ePrint Arch. 2017: 110 (2017) - [i17]Feng Hao:
Schnorr Non-interactive Zero-Knowledge Proof. RFC 8235: 1-13 (2017) - [i16]Feng Hao:
J-PAKE: Password-Authenticated Key Exchange by Juggling. RFC 8236: 1-15 (2017) - 2016
- [j13]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti
, Feng Hao
:
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript. J. Inf. Secur. Appl. 26: 23-38 (2016) - [j12]Feng Hao
, Xun Yi
, Elisa Bertino:
Editorial of special issue on security and privacy in cloud computing. J. Inf. Secur. Appl. 27-28: 1-2 (2016) - [j11]Xun Yi
, Fang-Yu Rao, Zahir Tari
, Feng Hao
, Elisa Bertino, Ibrahim Khalil
, Albert Y. Zomaya
:
ID2S Password-Authenticated Key Exchange Protocols. IEEE Trans. Computers 65(12): 3687-3701 (2016) - [j10]Feng Hao
, Dylan Clarke, Avelino Francisco Zorzo:
Deleting Secret Data with Public Verifiability. IEEE Trans. Dependable Secur. Comput. 13(6): 617-629 (2016) - [c30]Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao
:
Towards Bitcoin Payment Networks. ACISP (1) 2016: 57-76 - [c29]Siamak F. Shahandashti
, Feng Hao
:
DRE-ip: A Verifiable E-Voting Scheme Without Tallying Authorities. ESORICS (2) 2016: 223-240 - [c28]Patrick McCorry, Siamak F. Shahandashti
, Feng Hao
:
Refund Attacks on Bitcoin's Payment Protocol. Financial Cryptography 2016: 581-599 - [c27]Maryam Mehrnezhad, Mohammed Aamir Ali, Feng Hao
, Aad P. A. van Moorsel:
NFC Payment Spy: A Privacy Attack on Contactless Payments. SSR 2016: 92-111 - [i15]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
TouchSignatures: Identification of User Touch Actions and PINs Based on Mobile Sensor Data via JavaScript. CoRR abs/1602.04115 (2016) - [i14]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti, Feng Hao:
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception. CoRR abs/1605.05549 (2016) - [i13]Patrick McCorry, Siamak Fayyaz Shahandashti, Feng Hao:
Refund attacks on Bitcoin's Payment Protocol. IACR Cryptol. ePrint Arch. 2016: 24 (2016) - [i12]Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao:
Towards Bitcoin Payment Networks. IACR Cryptol. ePrint Arch. 2016: 408 (2016) - [i11]Siamak Fayyaz Shahandashti, Feng Hao:
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities. IACR Cryptol. ePrint Arch. 2016: 670 (2016) - 2015
- [c26]Feng Hao
, Xun Yi, Liqun Chen
, Siamak Fayyaz Shahandashti
:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IoTPTS@AsiaCCS 2015: 27-34 - [c25]Maryam Mehrnezhad, Ehsan Toreini, Siamak Fayyaz Shahandashti
, Feng Hao
:
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript. AsiaCCS 2015: 673 - [c24]Xun Yi, Feng Hao
, Liqun Chen
, Joseph K. Liu:
Practical Threshold Password-Authenticated Secret Sharing Protocol. ESORICS (1) 2015: 347-365 - [c23]Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, Feng Hao
:
ZombieCoin: Powering Next-Generation Botnets with Bitcoin. Financial Cryptography Workshops 2015: 34-48 - [c22]Patrick McCorry, Siamak Fayyaz Shahandashti
, Dylan Clarke, Feng Hao
:
Authenticated Key Exchange over Bitcoin. SSR 2015: 3-20 - [c21]Maryam Mehrnezhad, Feng Hao
, Siamak Fayyaz Shahandashti
:
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment. SSR 2015: 21-39 - [i10]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IACR Cryptol. ePrint Arch. 2015: 80 (2015) - [i9]Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:
Authenticated Key Exchange over Bitcoin. IACR Cryptol. ePrint Arch. 2015: 308 (2015) - 2014
- [j9]Dylan Clarke, Feng Hao
:
Cryptanalysis of the dragonfly key exchange protocol. IET Inf. Secur. 8(6): 283-289 (2014) - [j8]Kiavash Satvat, Matthew Forshaw
, Feng Hao
, Ehsan Toreini:
On the privacy of private browsing - A forensic approach. J. Inf. Secur. Appl. 19(1): 88-100 (2014) - [c20]Xun Yi, Feng Hao
, Elisa Bertino:
ID-Based Two-Server Password-Authenticated Key Exchange. ESORICS (2) 2014: 257-276 - [c19]Feng Hao
, Siamak Fayyaz Shahandashti
:
The SPEKE Protocol Revisited. SSR 2014: 26-38 - [c18]Feng Hao, Matthew Nicolas Kreeger, Brian Randell, Dylan Clarke, Siamak Fayyaz Shahandashti, Peter Hyun-Jeen Lee:
Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting. EVT/WOTE 2014 - [i8]Feng Hao, Dylan Clarke, Avelino Francisco Zorzo:
Deleting Secret Data with Public Verifiability. IACR Cryptol. ePrint Arch. 2014: 364 (2014) - [i7]Feng Hao, Siamak Fayyaz Shahandashti:
The SPEKE Protocol Revisited. IACR Cryptol. ePrint Arch. 2014: 585 (2014) - 2013
- [c17]Kiavash Satvat, Matthew Forshaw
, Feng Hao
, Ehsan Toreini
:
On the Privacy of Private Browsing - A Forensic Approach. DPM/SETOP 2013: 380-389 - [c16]Feng Hao
, Dylan Clarke, Carlton Shepherd:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. Security Protocols Workshop 2013: 245-254 - [c15]Feng Hao
:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion). Security Protocols Workshop 2013: 255-264 - [i6]Dylan Clarke, Feng Hao:
Cryptanalysis of the Dragonfly Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2013: 58 (2013) - 2012
- [c14]Feng Hao
, Dylan Clarke:
Security Analysis of a Multi-factor Authenticated Key Exchange Protocol. ACNS 2012: 1-11 - [c13]Dalia Khader, Ben Smyth, Peter Y. A. Ryan, Feng Hao:
A Fair and Robust Voting System by Broadcast. Electronic Voting 2012: 285-299 - [c12]Feng Hao
, Brian Randell, Dylan Clarke:
Self-enforcing Electronic Voting. Security Protocols Workshop 2012: 23-31 - [c11]Feng Hao
:
Self-enforcing Electronic Voting (Transcript of Discussion). Security Protocols Workshop 2012: 32-40 - [c10]Dylan Clarke, Feng Hao
, Brian Randell:
Analysis of Issues and Challenges of E-Voting in the UK. Security Protocols Workshop 2012: 126-135 - [i5]Feng Hao, Dylan Clarke:
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2012: 39 (2012) - 2011
- [c9]Feng Hao
, Peter Y. A. Ryan
:
How to Sync with Alice. Security Protocols Workshop 2011: 170-178 - [c8]Feng Hao
:
How to Sync with Alice (Transcript of Discussion). Security Protocols Workshop 2011: 179-188 - 2010
- [j7]Feng Hao
, Peter Y. A. Ryan
, Piotr Zielinski
:
Anonymous voting by two-round public discussion. IET Inf. Secur. 4(2): 62-67 (2010) - [j6]Feng Hao
, Peter Y. A. Ryan
:
J-PAKE: Authenticated Key Exchange without PKI. Trans. Comput. Sci. 11: 192-206 (2010) - [c7]Feng Hao
:
On Small Subgroup Non-confinement Attack. CIT 2010: 1022-1025 - [c6]Feng Hao
:
On Robust Key Agreement Based on Public Key Authentication. Financial Cryptography 2010: 383-390 - [i4]Feng Hao:
On Robust Key Agreement Based on Public Key Authentication. IACR Cryptol. ePrint Arch. 2010: 136 (2010) - [i3]Feng Hao:
On Small Subgroup Non-confinement Attack. IACR Cryptol. ePrint Arch. 2010: 149 (2010) - [i2]Feng Hao, Peter Y. A. Ryan:
J-PAKE: Authenticated Key Exchange Without PKI. IACR Cryptol. ePrint Arch. 2010: 190 (2010) - [i1]Feng Hao, Matthew Nicolas Kreeger:
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting. IACR Cryptol. ePrint Arch. 2010: 452 (2010)
2000 – 2009
- 2009
- [j5]Feng Hao
, Piotr Zielinski:
The Power of Anonymous Veto in Public Discussion. Trans. Comput. Sci. 4: 41-52 (2009) - 2008
- [j4]Feng Hao
, John Daugman, Piotr Zielinski:
A Fast Search Algorithm for a Large Fuzzy Database. IEEE Trans. Inf. Forensics Secur. 3(2): 203-212 (2008) - [c5]Feng Hao
, Peter Y. A. Ryan
:
Password Authenticated Key Exchange by Juggling. Security Protocols Workshop 2008: 159-171 - [c4]Feng Hao
:
Password Authenticated Key Exchange by Juggling (Transcript of Discussion). Security Protocols Workshop 2008: 172-179 - 2007
- [b1]Feng Hao:
On using fuzzy data in security mechanisms. University of Cambridge, UK, 2007 - 2006
- [j3]Feng Hao
, Ross J. Anderson, John Daugman:
Combining Crypto with Biometrics Effectively. IEEE Trans. Computers 55(9): 1081-1088 (2006) - [c3]Feng Hao
, Piotr Zielinski:
A 2-Round Anonymous Veto Protocol. Security Protocols Workshop 2006: 202-211 - [c2]Feng Hao
:
A 2-Round Anonymous Veto Protocol. Security Protocols Workshop 2006: 212-214 - 2005
- [c1]Feng Hao
:
Combining Crypto with Biometrics: A New Human-Security Interface. Security Protocols Workshop 2005: 133-138 - 2003
- [j2]Feng Hao
, Chan Choong Wah:
Online signature verification using a new extreme points warping technique. Pattern Recognit. Lett. 24(16): 2943-2951 (2003) - 2002
- [j1]