[go: up one dir, main page]

Follow
Feng Hao
Feng Hao
Professor of Security Engineering, Department of Computer Science, University of Warwick
Verified email at warwick.ac.uk - Homepage
Title
Cited by
Cited by
Year
Combining crypto with biometrics effectively
F Hao, R Anderson, J Daugman
IEEE transactions on computers 55 (9), 1081-1088, 2006
9932006
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
P McCorry, S F Shahandashti, F Hao
IACR Cryptology ePrint Archive, 110, 2017
7382017
Private key generation from on-line handwritten signatures
H Feng, CC Wah
Information Management & Computer Security 10 (4), 159-164, 2002
3322002
Cryptanalysis of a chaotic image encryption algorithm based on information entropy
C Li, D Lin, B Feng, J Lü, F Hao
Ieee Access 6, 75834-75842, 2018
2712018
Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography
C Li, D Lin, J Lü, F Hao
IEEE multimedia 25 (4), 46-56, 2018
2682018
Anonymous voting by two-round public discussion
F Hao, PYA Ryan, P Zielinski
IET Information Security 4 (2), 62-67, 2010
2212010
Online signature verification using a new extreme points warping technique
H Feng, CC Wah
Pattern Recognition Letters 24 (16), 2943-2951, 2003
1882003
A fast search algorithm for a large fuzzy database
F Hao, J Daugman, P Zielinski
IEEE Transactions on Information Forensics and Security 3 (2), 203-212, 2008
1532008
Combining cryptography with biometrics effectively
F Hao, R Anderson, J Daugman
University of Cambridge, Computer Laboratory, 2005
1422005
A fair and robust voting system by broadcast
D Khader, B Smyth, P Ryan, F Hao
Lecture Notes in Informatics, 2012
1342012
A 2-round anonymous veto protocol
F Hao, P Zieliński
International Workshop on Security Protocols, 202-211, 2006
1332006
Towards bitcoin payment networks
P McCorry, M Möser, SF Shahandasti, F Hao
Australasian conference on information security and privacy, 57-76, 2016
1212016
Real-world electronic voting: Design, analysis and deployment
F Hao, PYA Ryan
CRC Press, 2016
1192016
J-PAKE: authenticated key exchange without PKI
F Hao, P Ryan
Transactions on Computational Science XI: Special Issue on Security in …, 2010
1182010
Consumer-facing technology fraud: Economics, attack methods and potential solutions
MA Ali, MA Azad, MP Centeno, F Hao, A van Moorsel
Future Generation Computer Systems 100, 408-427, 2019
1132019
Decentralized self-enforcing trust management system for social Internet of Things
MA Azad, S Bag, F Hao, A Shalaginov
IEEE Internet of Things Journal 7 (4), 2690-2703, 2020
982020
Password authenticated key exchange by juggling
F Hao, PYA Ryan
International Workshop on Security Protocols, 159-171, 2008
982008
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, S Shahandashti, F Hao
International Journal of Information Security, 1-23, 2017
952017
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception
M Mehrnezhad, E Toreini, S Shahandashti, F Hao
EuroUSEC 2016, 2016
952016
Schnorr Non-interactive Zero-Knowledge Proof
F Hao
https://tools.ietf.org/html/rfc8235, 2017
922017
The system can't perform the operation now. Try again later.
Articles 1–20