


Остановите войну!
for scientists:


default search action
Feng Bao 0001
Person information

- affiliation: Huawei Technologies Pte Ltd, Singapore
- affiliation (former): Institute for Infocomm Research, Cryptography & Security Department, Singapore
Other persons with the same name
- Feng Bao — disambiguation page
- Feng Bao 0002
— Tsinghua University, Department of Automation, Beijing, China
- Feng Bao 0003
— University of Auckland, Department of Electrical and Computer Engineering, New Zealand (and 1 more)
- Feng Bao 0004 — Gunma University, Kiryu, Japan
- Feng Bao 0005
— Florida State University, Department of Mathematics, Tallahassee, FL, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [e17]Robert H. Deng
, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang:
Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings. Lecture Notes in Computer Science 13107, Springer 2021, ISBN 978-3-030-93206-0 [contents]
2010 – 2019
- 2018
- [p1]Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud
, Diana Maimut
, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public Key-Based Lightweight Swarm Authentication. Cyber-Physical Systems Security 2018: 255-267 - 2017
- [j41]Javier López, Ruben Rios, Feng Bao, Guilin Wang:
Evolving privacy: From sensors to the Internet of Things. Future Gener. Comput. Syst. 75: 46-57 (2017) - 2016
- [c167]Vivy Suhendra, Yongdong Wu, Hendra Saputra, Zhigang Zhao, Feng Bao:
Lightweight Key Management Protocols for Smart Grids. iThings/GreenCom/CPSCom/SmartData 2016: 345-348 - [e16]Feng Bao, Liqun Chen, Robert H. Deng
, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 [contents] - [i11]Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public-Key Based Lightweight Swarm Authentication. IACR Cryptol. ePrint Arch. 2016: 750 (2016) - 2015
- [j40]Yongdong Wu, Zhigang Zhao, Feng Bao, Robert H. Deng
:
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks. IEEE Trans. Inf. Forensics Secur. 10(1): 168-177 (2015) - [e15]Feng Bao, Steven Miller, Jianying Zhou, Gail-Joon Ahn:
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. ACM 2015, ISBN 978-1-4503-3245-3 [contents] - [e14]Feng Bao, Steven Miller, Sherman S. M. Chow
, Danfeng Yao:
Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015. ACM 2015, ISBN 978-1-4503-3447-1 [contents] - 2014
- [j39]Chunhua Su, Jianying Zhou
, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Collaborative agglomerative document clustering with limited information disclosure. Secur. Commun. Networks 7(6): 964-978 (2014) - 2013
- [c166]Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng
, Debin Gao
, Yingjiu Li, Jianying Zhou
:
Launching Generic Attacks on iOS with Approved Third-Party Applications. ACNS 2013: 272-289 - [c165]Naoki Tanaka, Marianne Winslett, Adam J. Lee
, David K. Y. Yau, Feng Bao:
Insured access: an approach to ad-hoc information sharing for virtual organizations. CODASPY 2013: 301-308 - 2012
- [j38]Wen Tao Zhu, Jianying Zhou
, Robert H. Deng
, Feng Bao:
Detecting node replication attacks in wireless sensor networks: A survey. J. Netw. Comput. Appl. 35(3): 1022-1034 (2012) - [j37]Wen Tao Zhu, Jianying Zhou
, Robert H. Deng
, Feng Bao:
Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Networks 5(5): 496-507 (2012) - [e13]Feng Bao, Pierangela Samarati
, Jianying Zhou
:
Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings. Lecture Notes in Computer Science 7341, Springer 2012, ISBN 978-3-642-31283-0 [contents] - 2011
- [j36]Kun Peng, Ed Dawson
, Feng Bao:
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency. Int. J. Inf. Sec. 10(1): 33-47 (2011) - [j35]Wen Tao Zhu, Yang Xiang
, Jianying Zhou
, Robert H. Deng
, Feng Bao:
Secure localization with attack detection in wireless sensor networks. Int. J. Inf. Sec. 10(3): 155-171 (2011) - [j34]Yanjiang Yang, Jianying Zhou
, Robert H. Deng
, Feng Bao:
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. Secur. Commun. Networks 4(1): 11-22 (2011) - [j33]Huaqun Guo
, Yongdong Wu, Feng Bao, Hongmei Chen, Maode Ma:
UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications. IEEE Trans. Smart Grid 2(4): 707-714 (2011) - [c164]Feng Bao, Robert H. Deng
, Xuhua Ding
, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. ACNS 2011: 201-219 - [c163]Kun Peng, Feng Bao:
Analysing a Batch Range Proof to Address a Security Concern. CSE 2011: 68-72 - [c162]Wen Tao Zhu, Robert H. Deng
, Jianying Zhou
, Feng Bao:
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. ICICS 2011: 306-318 - [c161]Kun Zhang, Hong Zhang, Yongdong Wu, Feng Bao:
Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis. ICON 2011: 231-235 - [c160]Joseph K. Liu
, Feng Bao, Jianying Zhou
:
Short and Efficient Certificate-Based Signature. Networking Workshops 2011: 167-178 - [e12]Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing:
Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6151, Springer 2011, ISBN 978-3-642-16341-8 [contents] - [e11]Feng Bao, Jian Weng:
Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings. Lecture Notes in Computer Science 6672, Springer 2011, ISBN 978-3-642-21030-3 [contents] - [i10]Joseph K. Liu, Feng Bao, Jianying Zhou:
Short and Efficient Certificate-Based Signature. IACR Cryptol. ePrint Arch. 2011: 192 (2011) - 2010
- [j32]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng
, Kefei Chen, Feng Bao:
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53(3): 593-606 (2010) - [j31]Wen Tao Zhu, Robert H. Deng
, Jianying Zhou
, Feng Bao:
Time-Bound Hierarchical Key Assignment: An Overview. IEICE Trans. Inf. Syst. 93-D(5): 1044-1052 (2010) - [j30]Yanjiang Yang, Yingjiu Li, Robert H. Deng
, Feng Bao:
Shifting Inference Control to User Side: Architecture and Protocol. IEEE Trans. Dependable Secur. Comput. 7(2): 189-202 (2010) - [c159]Yanjiang Yang, Feng Bao:
Enabling Use of Single Password over Multiple Servers in Two-Server Model. CIT 2010: 846-850 - [c158]Kun Peng, Feng Bao:
Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property. CIT 2010: 1044-1049 - [c157]Yanjiang Yang, Jianying Zhou
, Jun Wen Wong, Feng Bao:
Towards practical anonymous password authentication. ACSAC 2010: 59-68 - [c156]Kun Peng, Feng Bao:
Batch Range Proof for Practical Small Ranges. AFRICACRYPT 2010: 114-130 - [c155]Cheng-Kang Chu, Joseph K. Liu
, Jianying Zhou
, Feng Bao, Robert H. Deng
:
Practical ID-based encryption for wireless sensor network. AsiaCCS 2010: 337-340 - [c154]Huafei Zhu, Feng Bao:
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity. Inscrypt 2010: 52-61 - [c153]Kun Peng, Feng Bao:
A Secure RFID Ticket System for Public Transport. DBSec 2010: 350-357 - [c152]Yongdong Wu, Zhigang Zhao, Ying Qiu, Feng Bao:
Blocking Foxy Phishing Emails with Historical Information. ICC 2010: 1-5 - [c151]Liang Gu, Yao Guo
, Yanjiang Yang, Feng Bao, Hong Mei:
Modeling TCG-Based Secure Systems with Colored Petri Nets. INTRUST 2010: 67-86 - [c150]Yanjiang Yang, Liang Gu, Feng Bao:
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing. INTRUST 2010: 189-199 - [c149]Kun Peng, Feng Bao:
Efficient Multiplicative Homomorphic E-Voting. ISC 2010: 381-393 - [c148]Kun Peng, Feng Bao:
Efficient Proof of Validity of Votes in Homomorphic E-Voting. NSS 2010: 17-23 - [c147]Qiming Li, Yongdong Wu, Feng Bao:
A Reversible Data Hiding Scheme for JPEG Images. PCM (1) 2010: 653-664 - [c146]Kun Peng, Feng Bao:
Formal and Precise Analysis of Soundness of Several Shuffling Schemes. ProvSec 2010: 133-143 - [c145]Kun Peng, Feng Bao:
Vulnerability of a Non-membership Proof Scheme. SECRYPT 2010: 419-422 - [c144]Kun Peng, Feng Bao:
A Shuffling Scheme with Strict and Strong Security. SECURWARE 2010: 201-206 - [c143]Kun Peng, Feng Bao:
An Efficient Range Proof Scheme. SocialCom/PASSAT 2010: 826-833 - [c142]Huafei Zhu, Feng Bao:
Private Searching on MapReduce. TrustBus 2010: 93-101 - [c141]Kun Peng, Feng Bao:
Efficiency Improvement of Homomorphic E-Auction. TrustBus 2010: 238-249 - [i9]Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng:
Practical ID-based Encryption for Wireless Sensor Network. IACR Cryptol. ePrint Arch. 2010: 2 (2010) - [i8]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 265 (2010)
2000 – 2009
- 2009
- [j29]Chunhua Su, Feng Bao, Jianying Zhou
, Tsuyoshi Takagi, Kouichi Sakurai:
Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(4): 1246-1250 (2009) - [j28]Chunhua Su, Feng Bao, Jianying Zhou
, Tsuyoshi Takagi, Kouichi Sakurai:
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1868-1871 (2009) - [j27]Yanjiang Yang, Feng Bao, Xuhua Ding
, Robert H. Deng
:
Multiuser private queries over encrypted databases. Int. J. Appl. Cryptogr. 1(4): 309-319 (2009) - [j26]Zhiguo Wan, Robert H. Deng
, Feng Bao, Bart Preneel
, Ming Gu:
n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords. J. Comput. Sci. Technol. 24(1): 138-151 (2009) - [j25]Yanjiang Yang, Robert H. Deng
, Feng Bao:
Privacy-preserving rental services using one-show anonymous credentials. Secur. Commun. Networks 2(6): 531-545 (2009) - [c140]Yanjiang Yang, Jianying Zhou
, Jian Weng, Feng Bao:
A New Approach for Anonymous Password Authentication. ACSAC 2009: 199-208 - [c139]Huafei Zhu, Feng Bao:
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. AFRICACRYPT 2009: 323-333 - [c138]Kun Peng, Feng Bao:
Practicalization of a Range Test and Its Application to E-Auction. EuroPKI 2009: 179-194 - [c137]Ying Qiu, Feng Bao, Yongdong Wu, Yanjiang Yang:
A Lightweight Fast Handover Authentication Scheme in Mobile Networks. ICC 2009: 1-5 - [c136]Yongdong Wu, Feng Bao, Ying Qiu:
Tracing Stateful Pirate Decoders. ICC 2009: 1-5 - [c135]Yanjiang Yang, Jianying Zhou
, Robert H. Deng
, Feng Bao:
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. ICICS 2009: 135-149 - [c134]Huafei Zhu, Feng Bao:
Adaptive and Composable Oblivious Transfer Protocols (Short Paper). ICICS 2009: 483-492 - [c133]Huafei Zhu, Feng Bao:
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. INDOCRYPT 2009: 418-429 - [c132]Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng
, Feng Bao:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ISC 2009: 151-166 - [c131]Yanjiang Yang, Feng Bao, Jian Weng:
Private handshakes with optional accountability. LCN 2009: 245-248 - [c130]Yongdong Wu, Feng Bao:
Improving a Digital Rights Management Scheme for Video Broadcast. PCM 2009: 708-718 - [c129]Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou
, Feng Bao:
Self-enforcing Private Inference Control. ProvSec 2009: 260-274 - [c128]Yanjiang Yang, Jianying Zhou
, Robert H. Deng
, Feng Bao:
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. SecureComm 2009: 285-295 - [c127]Kun Peng, Feng Bao:
A Design of Secure Preferential E-Voting. VoteID 2009: 141-156 - [c126]Kun Peng, Feng Bao:
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. WISA 2009: 118-132 - [e10]Feng Bao, Hui Li, Guilin Wang:
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings. Lecture Notes in Computer Science 5451, Springer 2009, ISBN 978-3-642-00842-9 [contents] - 2008
- [j24]Kun Peng, Feng Bao, Ed Dawson:
Correct, Private, Flexible and Efficient Range Test. J. Res. Pract. Inf. Technol. 40(4): 275-289 (2008) - [c125]Chunhua Su, Feng Bao, Jianying Zhou
, Tsuyoshi Takagi, Kouichi Sakurai:
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119 - [c124]Joonsang Baek
, Jianying Zhou
, Feng Bao:
Generic Constructions of Stateful Public Key Encryption and Their Applications. ACNS 2008: 75-93 - [c123]Kun Peng, Feng Bao:
Batch ZK Proof and Verification of OR Logic. Inscrypt 2008: 141-156 - [c122]Kun Peng, Feng Bao:
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. Inscrypt 2008: 425-437 - [c121]Yanjiang Yang, Feng Bao, Robert H. Deng
:
Efficient Client-to-Client Password Authenticated Key Exchange. EUC (2) 2008: 202-207 - [c120]Huafei Zhu, Feng Bao, Robert H. Deng
:
Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. ICC 2008: 1635-1641 - [c119]Kun Peng, Feng Bao:
Efficient Vote Validity Check in Homomorphic Electronic Voting. ICISC 2008: 202-217 - [c118]Yongdong Wu
, Qiming Li, Feng Bao:
Optimizing the capacity of distortion-freewatermarking on palette images. ICME 2008: 205-208 - [c117]Feng Bao, Robert H. Deng
, Xuhua Ding
, Yanjiang Yang:
Private Query on Encrypted Data in Multi-user Settings. ISPEC 2008: 71-85 - [c116]Yanjiang Yang, Xuhua Ding
, Robert H. Deng
, Feng Bao:
An Efficient PIR Construction Using Trusted Hardware. ISC 2008: 64-79 - [c115]Yongdong Wu, Haixia Yao, Feng Bao:
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. SEC 2008: 47-61 - [e9]Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings. Lecture Notes in Computer Science 5324, Springer 2008, ISBN 978-3-540-88732-4 [contents] - 2007
- [j23]Zhiguo Wan, Robert H. Deng
, Feng Bao, Akkihebbal L. Ananda:
Access control protocols with two-layer architecture for wireless networks. Comput. Networks 51(3): 655-670 (2007) - [c114]Yongdong Wu, Feng Bao, Robert H. Deng
:
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. ACISP 2007: 171-183 - [c113]Chunhua Su, Feng Bao, Jianying Zhou
, Tsuyoshi Takagi, Kouichi Sakurai:
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391 - [c112]Yongdong Wu, Feng Bao, Robert H. Deng
, Marc Mouffron, Frederic Rousseau:
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Inscrypt 2007: 472-481 - [c111]Feng Bao, Robert H. Deng
:
Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. GLOBECOM 2007: 188-192 - [c110]Huafei Zhu, Feng Bao:
Oblivious Keyword Search Protocols in the Public Database Model. ICC 2007: 1336-1341 - [c109]Huafei Zhu, Feng Bao:
Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce. ICC 2007: 1503-1508 - [c108]Huafei Zhu, Feng Bao, A. Lakshminarayanan:
Price Negotiation Systems for M-commerce. ICC 2007: 1521-1526 - [c107]Zhiguo Wan, Robert H. Deng
, Feng Bao, Bart Preneel:
n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. ICICS 2007: 31-43 - [c106]Ying Qiu, Feng Bao, Jianying Zhou:
Firewall for Dynamic IP Address in Mobile IPv6. ICICS 2007: 467-479 - [c105]Yongdong Wu, Bo Qiu, Feng Bao:
Evaluating Ouda's Tamper-Localization Watermarking Scheme. ICME 2007: 843-846 - [c104]Yanjiang Yang, Robert H. Deng
, Feng Bao:
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ISPEC 2007: 177-192 - [c103]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208 - [c102]Huafei Zhu, Feng Bao:
Computing of Trust in Complex Environments. PIMRC 2007: 1-5 - [c101]Huafei Zhu, Ying Qiu, Feng Bao:
Securing Mobile Auctions in the Presence of Malicious Adversaries. PIMRC 2007: 1-5 - [c100]Huafei Zhu, Ying Qiu, Feng Bao:
Or-protocols for Anonymous Membership Proofs in Ad-hoc Networks. PIMRC 2007: 1-5 - [c99]Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Public Key Cryptography 2007: 43-60 - [c98]Guilin Wang, Feng Bao:
Security Remarks on a Convertible Nominative Signature Scheme. SEC 2007: 265-275 - [c97]Huafei Zhu, Feng Bao:
Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability. WCNC 2007: 2698-2702 - [c96]Huafei Zhu, Feng Bao:
Quantifying Trust Metrics of Recommendation Systems in Ad-Hoc Networks. WCNC 2007: 2904-2908 - [e8]Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing:
Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings. Lecture Notes in Computer Science 4856, Springer 2007, ISBN 978-3-540-76968-2 [contents] - [e7]Feng Bao, Steven Miller:
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007. ACM 2007, ISBN 1-59593-574-6 [contents] - 2006
- [j22]Feng Bao, Cheng-Chi Lee
, Min-Shiang Hwang:
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Appl. Math. Comput. 172(2): 1195-1200 (2006) - [j21]Kui Ren
, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng
:
Routing optimization security in mobile IPv6. Comput. Networks 50(13): 2401-2419 (2006) - [j20]Shen-Tat Goh, HweeHwa Pang
, Robert H. Deng
, Feng Bao:
Three architectures for trusted data dissemination in edge computing. Data Knowl. Eng. 58(3): 381-409 (2006) - [j19]Shuhong Wang, Feng Bao, Jie Wang:
A More Efficient Improvement of the Virtual Software Token Protocols. IEICE Trans. Commun. 89-B(3): 945-948 (2006) - [j18]Jianying Zhou, Feng Bao, Robert H. Deng
:
Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006) - [j17]Yanjiang Yang, Robert H. Deng
, Feng Bao:
A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEE Trans. Dependable Secur. Comput. 3(2): 105-114 (2006) - [j16]Zhiguo Wan, Feng Bao, Robert H. Deng
, Akkihebbal L. Ananda:
Security analysis on a conference scheme for mobile communications. IEEE Trans. Wirel. Commun. 5(6): 1238-1240 (2006) - [j15]Feng Bao:
Analysis of a secure conference scheme for mobile communication. IEEE Trans. Wirel. Commun. 5(8): 1984-1986 (2006) - [c95]Huafei Zhu, Feng Bao:
More on Stand-Alone and Setup-Free Verifiably Committed Signatures. ACISP 2006: 148-158 - [c94]Huafei Zhu, Feng Bao:
Oblivious Scalar-Product Protocols. ACISP 2006: 313-323 - [c93]