What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Feng Bao
Google Scholar
75
publications in security and cryptology related venues
Year
Venue
Title
2015
journals/tifs
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks.
Yongdong Wu
Zhigang Zhao
Feng Bao
Robert H. Deng
2013
conf/acns
Launching Generic Attacks on iOS with Approved Third-Party Applications.
Jin Han
Su Mon Kywe
Qiang Yan
Feng Bao
Robert H. Deng
Debin Gao
Yingjiu Li
Jianying Zhou
2011
conf/acns
Hierarchical Identity-Based Chameleon Hash and Its Applications.
Feng Bao
Robert H. Deng
Xuhua Ding
Junzuo Lai
Yunlei Zhao
2011
conf/icics
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.
Wen Tao Zhu
Robert H. Deng
Jianying Zhou
Feng Bao
2010
conf/ccs
Practical ID-based encryption for wireless sensor network.
Cheng-Kang Chu
Joseph K. Liu
Jianying Zhou
Feng Bao
Robert H. Deng
2010
conf/provsec
Formal and Precise Analysis of Soundness of Several Shuffling Schemes.
Kun Peng
Feng Bao
2010
conf/acsac
Towards practical anonymous password authentication.
Yanjiang Yang
Jianying Zhou
Jun Wen Wong
Feng Bao
2010
conf/africacrypt
Batch Range Proof for Practical Small Ranges.
Kun Peng
Feng Bao
2009
conf/provsec
Self-enforcing Private Inference Control.
Yanjiang Yang
Yingjiu Li
Jian Weng
Jianying Zhou
Feng Bao
2009
conf/wisa
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy.
Kun Peng
Feng Bao
2009
conf/icics
Adaptive and Composable Oblivious Transfer Protocols (Short Paper).
Huafei Zhu
Feng Bao
2009
conf/icics
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Yanjiang Yang
Jianying Zhou
Robert H. Deng
Feng Bao
2009
conf/acsac
A New Approach for Anonymous Password Authentication.
Yanjiang Yang
Jianying Zhou
Jian Weng
Feng Bao
2009
conf/africacrypt
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions.
Huafei Zhu
Feng Bao
2008
conf/sec
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators.
Yongdong Wu
Haixia Yao
Feng Bao
2008
conf/acns
Generic Constructions of Stateful Public Key Encryption and Their Applications.
Joonsang Baek
Jianying Zhou
Feng Bao
2008
conf/icisc
Efficient Vote Validity Check in Homomorphic Electronic Voting.
Kun Peng
Feng Bao
2007
conf/sec
Security Remarks on a Convertible Nominative Signature Scheme.
Guilin Wang
Feng Bao
2007
conf/acisp
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.
Yongdong Wu
Feng Bao
Robert H. Deng
2007
conf/pkc
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Guilin Wang
Joonsang Baek
Duncan S. Wong
Feng Bao
2007
conf/icics
PAKE<sup> + </sup>: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
Zhiguo Wan
Robert H. Deng
Feng Bao
Bart Preneel
2007
conf/icics
Firewall for Dynamic IP Address in Mobile IPv6.
Ying Qiu
Feng Bao
Jianying Zhou
2006
conf/ccs
Fortifying password authentication in integrated healthcare delivery systems.
Yanjiang Yang
Robert H. Deng
Feng Bao
2006
conf/sec
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications.
Huafei Zhu
Tieyan Li
Feng Bao
2006
conf/acisp
More on Stand-Alone and Setup-Free Verifiably Committed Signatures.
Huafei Zhu
Feng Bao
2006
conf/acisp
Oblivious Scalar-Product Protocols.
Huafei Zhu
Feng Bao
2006
conf/esorics
Private Information Retrieval Using Trusted Hardware.
Shuhong Wang
Xuhua Ding
Robert H. Deng
Feng Bao
2006
conf/icics
The Fairness of Perfect Concurrent Signatures.
Guilin Wang
Feng Bao
Jianying Zhou
2006
conf/icics
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards.
Guilin Wang
Feng Bao
2006
conf/ctrsa
Stand-Alone and Setup-Free Verifiably Committed Signatures.
Huafei Zhu
Feng Bao
2005
conf/sec
Secure Person-To-Person Communications Based on Biometrics Signals.
Yongdong Wu
Feng Bao
Robert H. Deng
2005
conf/sec
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.
Yanjiang Yang
Feng Bao
Robert H. Deng
2005
conf/acisp
Security Analysis and Fix of an Anonymous Credential System.
Yanjiang Yang
Feng Bao
Robert H. Deng
2005
conf/esorics
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications.
Huafei Zhu
Feng Bao
2005
conf/icics
Batching SSL/TLS Handshake Improved.
Fang Qi
Weijia Jia
Feng Bao
Yongdong Wu
2005
conf/icics
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security.
Shuhong Wang
Feng Bao
Robert H. Deng
2005
conf/icics
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains.
Huafei Zhu
Feng Bao
Robert H. Deng
2005
conf/icics
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery.
Guilin Wang
Feng Bao
Kenji Imamoto
Kouichi Sakurai
2005
conf/ctrsa
A Fast Correlation Attack on the Shrinking Generator.
Bin Zhang
Hongjun Wu
Dengguo Feng
Feng Bao
2004
journals/compsec
New efficient user identification and key distribution scheme providing enhanced security.
Yanjiang Yang
Shuhong Wang
Feng Bao
Jie Wang
Robert H. Deng
2004
conf/acisp
Analysis and Improvement of Micali's Fair Contract Signing Protocol.
Feng Bao
Guilin Wang
Jianying Zhou
Huafei Zhu
2004
conf/acisp
Analysis of a Conference Scheme Under Active and Passive Attacks.
Feng Bao
2004
conf/acns
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Bok-Min Goi
Raphael Chung-Wei Phan
Yanjiang Yang
Feng Bao
Robert H. Deng
M. U. Siddiqi
2004
conf/acns
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem.
Bin Zhang
Hongjun Wu
Dengguo Feng
Feng Bao
2004
conf/icisc
On Security Notions for Steganalysis.
Kisik Chang
Robert H. Deng
Feng Bao
Sangjin Lee
HyungJun Kim
Jongin Lim
2004
conf/icics
Security Analysis of the Generalized Self-shrinking Generator.
Bin Zhang
Hongjun Wu
Dengguo Feng
Feng Bao
2004
conf/asiacrypt
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes.
Feng Bao
2003
conf/acisp
Cryptanalysis of a New Cellular Automata Cryptosystem.
Feng Bao
2003
conf/acns
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Gang Yao
Kui Ren
Feng Bao
Robert H. Deng
Dengguo Feng
2003
conf/icisc
Security Analysis of Some Proxy Signatures.
Guilin Wang
Feng Bao
Jianying Zhou
Robert H. Deng
2003
conf/icics
An Efficient Public-Key Framework.
Jianying Zhou
Feng Bao
Robert H. Deng
2003
conf/icics
Variations of Diffie-Hellman Problem.
Feng Bao
Robert H. Deng
Huafei Zhu
2003
conf/icics
An Efficient Known Plaintext Attack on FEA-M.
Hongjun Wu
Feng Bao
Robert H. Deng
2003
conf/icics
Security Remarks on a Group Signature Scheme with Member Deletion.
Guilin Wang
Feng Bao
Jianying Zhou
Robert H. Deng
2002
conf/ccs
Defending against redirect attacks in mobile IP.
Robert H. Deng
Jianying Zhou
Feng Bao
2002
conf/acisp
Cryptanalysis of Stream Cipher COS(2, 128) Mode I.
Hongjun Wu
Feng Bao
2002
conf/acisp
Security Analysis and Improvement of the Global Key Recovery System.
Yanjiang Yang
Feng Bao
Robert H. Deng
2001
conf/acisp
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues.
Feng Bao
Robert H. Deng
Peirong Feng
Yan Guo
Hongjun Wu
2001
conf/pkc
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems.
Feng Bao
Robert H. Deng
Willi Geiselmann
Claus-Peter Schnorr
Rainer Steinwandt
Hongjun Wu
2001
conf/pkc
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
Hongjun Wu
Feng Bao
Robert H. Deng
2001
conf/icics
Privacy Protection for Transactions of Digital Goods.
Feng Bao
Robert H. Deng
2000
conf/sec
Electronic Payment Systems with Fair On-line Verification.
Feng Bao
Robert H. Deng
Jianying Zhou
2000
conf/acisp
-Permutation Protection Schemes.
Hongjun Wu
Feng Bao
Dingfeng Ye
Robert H. Deng
2000
conf/acisp
Cryptanalysis of Polynominal Authentication and Signature Scheme.
Hongjun Wu
Feng Bao
Dingfeng Ye
Robert H. Deng
2000
conf/icisc
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods.
Feng Bao
Robert H. Deng
Peirong Feng
2000
conf/pkc
Some Remarks on a Fair Exchange Protocol.
Jianying Zhou
Robert H. Deng
Feng Bao
2000
conf/acsac
Introducing Decryption Authority into PKI.
Feng Bao
1999
conf/acisp
Evolution of Fair Non-repudiation with TTP.
Jianying Zhou
Robert H. Deng
Feng Bao
1999
conf/pkc
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation.
Feng Bao
Robert H. Deng
1999
conf/icics
Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.
Khanh Quoc Nguyen
Feng Bao
Yi Mu
Vijay Varadharajan
1998
conf/sp
Efficient and Practical Fair Exchange Protocols with Off-Line TTP.
Feng Bao
Robert H. Deng
Wenbo Mao
1998
conf/pkc
A Signcryption Scheme with Signature Directly Verifiable by Public Key.
Feng Bao
Robert H. Deng
1998
conf/asiacrypt
Improved Truncated Differential Attacks on SAFER.
Hongjun Wu
Feng Bao
Robert H. Deng
Qin-Zhong Ye
1998
conf/asiacrypt
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers.
Hongjun Wu
Feng Bao
Robert H. Deng
Qin-Zhong Ye
1997
conf/acisp
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow.
Feng Bao
Robert H. Deng
Yongfei Han
Albert B. Jeng
Coauthors
Albert B. Jeng
(1)
Bart Preneel
(1)
Bin Zhang
(3)
Bok-Min Goi
(1)
Cheng-Kang Chu
(1)
Claus-Peter Schnorr
(1)
Debin Gao
(1)
Dengguo Feng
(4)
Dingfeng Ye
(2)
Duncan S. Wong
(1)
Fang Qi
(1)
Feng Bao
(75)
Gang Yao
(1)
Guilin Wang
(8)
Haixia Yao
(1)
Hongjun Wu
(12)
Huafei Zhu
(10)
HyungJun Kim
(1)
Jian Weng
(2)
Jianying Zhou
(18)
Jie Wang
(1)
Jin Han
(1)
Jongin Lim
(1)
Joonsang Baek
(2)
Joseph K. Liu
(1)
Jun Wen Wong
(1)
Junzuo Lai
(1)
Kenji Imamoto
(1)
Khanh Quoc Nguyen
(1)
Kisik Chang
(1)
Kouichi Sakurai
(1)
Kui Ren
(1)
Kun Peng
(4)
M. U. Siddiqi
(1)
Peirong Feng
(2)
Qiang Yan
(1)
Qin-Zhong Ye
(2)
Rainer Steinwandt
(1)
Raphael Chung-Wei Phan
(1)
Robert H. Deng
(42)
Sangjin Lee
(1)
Shuhong Wang
(3)
Su Mon Kywe
(1)
Tieyan Li
(1)
Vijay Varadharajan
(1)
Weijia Jia
(1)
Wen Tao Zhu
(1)
Wenbo Mao
(1)
Willi Geiselmann
(1)
Xuhua Ding
(2)
Yan Guo
(1)
Yanjiang Yang
(10)
Yi Mu
(1)
Ying Qiu
(1)
Yingjiu Li
(2)
Yongdong Wu
(5)
Yongfei Han
(1)
Yunlei Zhao
(1)
Zhigang Zhao
(1)
Zhiguo Wan
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to