2009 | ||
---|---|---|
166 | Feng Bao, Hui Li, Guilin Wang: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings Springer 2009 | |
165 | Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao: A New Approach for Anonymous Password Authentication. ACSAC 2009: 199-208 | |
164 | Huafei Zhu, Feng Bao: Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. AFRICACRYPT 2009: 323-333 | |
163 | Ying Qiu, Feng Bao, Yongdong Wu, Yanjiang Yang: A Lightweight Fast Handover Authentication Scheme in Mobile Networks. ICC 2009: 1-5 | |
162 | Yongdong Wu, Feng Bao, Ying Qiu: Tracing Stateful Pirate Decoders. ICC 2009: 1-5 | |
161 | Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao: Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. ICICS 2009: 135-149 | |
160 | Huafei Zhu, Feng Bao: Adaptive and Composable Oblivious Transfer Protocols (Short Paper). ICICS 2009: 483-492 | |
159 | Huafei Zhu, Feng Bao: Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. INDOCRYPT 2009: 418-429 | |
158 | Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao: Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ISC 2009: 151-166 | |
157 | Yongdong Wu, Feng Bao: Improving a Digital Rights Management Scheme for Video Broadcast. PCM 2009: 708-718 | |
156 | Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao: Self-enforcing Private Inference Control. ProvSec 2009: 260-274 | |
155 | Kun Peng, Feng Bao: A Design of Secure Preferential E-Voting. VOTE-ID 2009: 141-156 | |
154 | Kun Peng, Feng Bao: Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. WISA 2009: 118-132 | |
153 | Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes. IEICE Transactions 92-A(4): 1246-1250 (2009) | |
152 | Yanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng: Multiuser private queries over encrypted databases. IJACT 1(4): 309-319 (2009) | |
151 | Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel, Ming Gu: n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords. J. Comput. Sci. Technol. 24(1): 138-151 (2009) | |
150 | Yanjiang Yang, Robert H. Deng, Feng Bao: Privacy-preserving rental services using one-show anonymous credentials. Security and Communication Networks 2(6): 531-545 (2009) | |
2008 | ||
149 | Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings Springer 2008 | |
148 | Joonsang Baek, Jianying Zhou, Feng Bao: Generic Constructions of Stateful Public Key Encryption and Their Applications. ACNS 2008: 75-93 | |
147 | Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119 | |
146 | Yanjiang Yang, Feng Bao, Robert H. Deng: Efficient Client-to-Client Password Authenticated Key Exchange. EUC (2) 2008: 202-207 | |
145 | Huafei Zhu, Feng Bao, Robert H. Deng: Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. ICC 2008: 1635-1641 | |
144 | Kun Peng, Feng Bao: Efficient Vote Validity Check in Homomorphic Electronic Voting. ICISC 2008: 202-217 | |
143 | Yongdong Wu, Qiming Li, Feng Bao: Optimizing the capacity of distortion-freewatermarking on palette images. ICME 2008: 205-208 | |
142 | Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao: An Efficient PIR Construction Using Trusted Hardware. ISC 2008: 64-79 | |
141 | Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang: Private Query on Encrypted Data in Multi-user Settings. ISPEC 2008: 71-85 | |
140 | Kun Peng, Feng Bao: Batch ZK Proof and Verification of OR Logic. Inscrypt 2008: 141-156 | |
139 | Kun Peng, Feng Bao: Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. Inscrypt 2008: 425-437 | |
138 | Yongdong Wu, Haixia Yao, Feng Bao: Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. SEC 2008: 47-61 | |
2007 | ||
137 | Feng Bao, Steven Miller: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007 ACM 2007 | |
136 | Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings Springer 2007 | |
135 | Yongdong Wu, Feng Bao, Robert H. Deng: Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. ACISP 2007: 171-183 | |
134 | Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391 | |
133 | Feng Bao, Robert H. Deng: Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. GLOBECOM 2007: 188-192 | |
132 | Huafei Zhu, Feng Bao: Oblivious Keyword Search Protocols in the Public Database Model. ICC 2007: 1336-1341 | |
131 | Huafei Zhu, Feng Bao: Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce. ICC 2007: 1503-1508 | |
130 | Huafei Zhu, Feng Bao, A. Lakshminarayanan: Price Negotiation Systems for M-commerce. ICC 2007: 1521-1526 | |
129 | Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel: n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. ICICS 2007: 31-43 | |
128 | Ying Qiu, Feng Bao, Jianying Zhou: Firewall for Dynamic IP Address in Mobile IPv6. ICICS 2007: 467-479 | |
127 | Yongdong Wu, Bo Qiu, Feng Bao: Evaluating Ouda's Tamper-Localization Watermarking Scheme. ICME 2007: 843-846 | |
126 | Yanjiang Yang, Robert H. Deng, Feng Bao: Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ISPEC 2007: 177-192 | |
125 | Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai: Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208 | |
124 | Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau: Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Inscrypt 2007: 472-481 | |
123 | Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao: On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Public Key Cryptography 2007: 43-60 | |
122 | Guilin Wang, Feng Bao: Security Remarks on a Convertible Nominative Signature Scheme. SEC 2007: 265-275 | |
121 | Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda: Access control protocols with two-layer architecture for wireless networks. Computer Networks 51(3): 655-670 (2007) | |
2006 | ||
120 | Jianying Zhou, Moti Yung, Feng Bao: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings ACNS 2006 | |
119 | Huafei Zhu, Feng Bao: More on Stand-Alone and Setup-Free Verifiably Committed Signatures. ACISP 2006: 148-158 | |
118 | Huafei Zhu, Feng Bao: Oblivious Scalar-Product Protocols. ACISP 2006: 313-323 | |
117 | Yanjiang Yang, Robert H. Deng, Feng Bao: Fortifying password authentication in integrated healthcare delivery systems. ASIACCS 2006: 255-265 | |
116 | Yanjiang Yang, Robert H. Deng, Feng Bao: Practical private data matching deterrent to spoofing attacks. CIKM 2006: 852-853 | |
115 | Huafei Zhu, Feng Bao: Stand-Alone and Setup-Free Verifiably Committed Signatures. CT-RSA 2006: 159-173 | |
114 | Huafei Zhu, Feng Bao, Jianwei Liu: Computing of Trust in Ad-Hoc Networks. Communications and Multimedia Security 2006: 1-11 | |
113 | Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao: Private Information Retrieval Using Trusted Hardware. ESORICS 2006: 49-64 | |
112 | Guilin Wang, Feng Bao: Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. ICICS 2006: 399-409 | |
111 | Guilin Wang, Feng Bao, Jianying Zhou: The Fairness of Perfect Concurrent Signatures. ICICS 2006: 435-451 | |
110 | Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu: Preventing Web-Spoofing with Automatic Detecting Security Indicator. ISPEC 2006: 112-122 | |
109 | Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu: More on Shared-Scalar-Product Protocols. ISPEC 2006: 142-152 | |
108 | Yongdong Wu, Feng Bao: Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. Inscrypt 2006: 264-278 | |
107 | Huafei Zhu, Tieyan Li, Feng Bao: Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. SEC 2006: 340-350 | |
106 | Ying Qiu, Jianying Zhou, Feng Bao, Robert H. Deng: Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. VTC Spring 2006: 828-830 | |
105 | Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang: Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Applied Mathematics and Computation 172(2): 1195-1200 (2006) | |
104 | Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng: Routing optimization security in mobile IPv6. Computer Networks 50(13): 2401-2419 (2006) | |
103 | Shen-Tat Goh, HweeHwa Pang, Robert H. Deng, Feng Bao: Three architectures for trusted data dissemination in edge computing. Data Knowl. Eng. 58(3): 381-409 (2006) | |
102 | Yanjiang Yang, Robert H. Deng, Feng Bao: A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEE Trans. Dependable Sec. Comput. 3(2): 105-114 (2006) | |
101 | Zhiguo Wan, Feng Bao, Robert H. Deng, Akkihebbal L. Ananda: Security analysis on a conference scheme for mobile communications. IEEE Transactions on Wireless Communications 5(6): 1238-1240 (2006) | |
100 | Feng Bao: Analysis of a secure conference scheme for mobile communication. IEEE Transactions on Wireless Communications 5(8): 1984-1986 (2006) | |
99 | Shuhong Wang, Feng Bao, Jie Wang: A More Efficient Improvement of the Virtual Software Token Protocols. IEICE Transactions 89-B(3): 945-948 (2006) | |
98 | Jianying Zhou, Feng Bao, Robert H. Deng: Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006) | |
2005 | ||
97 | Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings Springer 2005 | |
96 | Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings Springer 2005 | |
95 | Yanjiang Yang, Feng Bao, Robert H. Deng: Security Analysis and Fix of an Anonymous Credential System. ACISP 2005: 537-547 | |
94 | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: A Fast Correlation Attack on the Shrinking Generator. CT-RSA 2005: 72-86 | |
93 | Huafei Zhu, Feng Bao, Tieyan Li: Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. Communications and Multimedia Security 2005: 200-209 | |
92 | Huafei Zhu, Feng Bao: Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. ESORICS 2005: 222-230 | |
91 | Helger Lipmaa, Guilin Wang, Feng Bao: Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. ICALP 2005: 459-471 | |
90 | Huafei Zhu, Feng Bao, Robert H. Deng: Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ICICS 2005: 207-219 | |
89 | Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai: Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. ICICS 2005: 40-52 | |
88 | Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu: Batching SSL/TLS Handshake Improved. ICICS 2005: 402-413 | |
87 | Shuhong Wang, Feng Bao, Robert H. Deng: Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. ICICS 2005: 53-60 | |
86 | Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292 | |
85 | Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao: Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. LCN 2005: 328-335 | |
84 | Yongdong Wu, Feng Bao, Robert H. Deng: Secure Person-To-Person Communications Based on Biometrics Signals. SEC 2005: 205-222 | |
83 | Yanjiang Yang, Feng Bao, Robert H. Deng: A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. SEC 2005: 95-112 | |
82 | Huafei Zhu, Feng Bao: A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. TrustBus 2005: 266-273 | |
81 | Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen: Efficient Authenticated Encryption Schemes with Public Verifiability CoRR abs/cs/0504019: (2005) | |
80 | Feng Bao, Robert H. Deng: Protocols that hide user's preferences in electronic transactions. Computer Networks 48(4): 503-515 (2005) | |
79 | Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang: Efficient and robust key management for large mobile ad hoc networks. Computer Networks 48(4): 657-682 (2005) | |
78 | Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen: New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. IEEE Trans. Computers 54(12): 1473-1483 (2005) | |
77 | Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen: New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. IEEE Trans. Computers 54(9): 1071-1080 (2005) | |
76 | Feng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang: Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Transactions on Information Technology in Biomedicine 9(4): 554-563 (2005) | |
75 | Shuhong Wang, Feng Bao, Jie Wang: Security Analysis on an Improvement of RSA-Based Password Authenticated Key Exchange. IEICE Transactions 88-B(4): 1641-1646 (2005) | |
2004 | ||
74 | Feng Bao, Robert H. Deng, Jianying Zhou: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 Springer 2004 | |
73 | Feng Bao: Analysis of a Conference Scheme Under Active and Passive Attacks. ACISP 2004: 157-163 | |
72 | Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu: Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187 | |
71 | Yongdong Wu, Feng Bao: Collusion attack on a multi-key secure video proxy scheme. ACM Multimedia 2004: 380-383 | |
70 | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. ACNS 2004: 303-309 | |
69 | Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi: Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ACNS 2004: 369-382 | |
68 | Feng Bao: Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. ASIACRYPT 2004: 417-429 | |
67 | Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324 | |
66 | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400 | |
65 | Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim: On Security Notions for Steganalysis. ICISC 2004: 440-454 | |
64 | Guilin Wang, Feng Bao, Jianying Zhou: On the Security of a Certified E-Mail Scheme. INDOCRYPT 2004: 48-60 | |
63 | Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao: Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. INDOCRYPT 2004: 73-83 | |
62 | Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim: On Security Notions of Steganographic Systems. IWDW 2004: 137-151 | |
61 | Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Anonymous Secure Routing in Mobile Ad-Hoc Networks. LCN 2004: 102-108 | |
60 | Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim: Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 45(6): 687-699 (2004) | |
59 | Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng: New efficient user identification and key distribution scheme providing enhanced security. Computers & Security 23(8): 697-704 (2004) | |
58 | Feng Bao: Cryptanalysis of a Partially Known Cellular Automata Cryptosystem. IEEE Trans. Computers 53(11): 1493-1497 (2004) | |
57 | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004) | |
56 | Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng: A smart-card-enabled privacy preserving E-prescription system. IEEE Transactions on Information Technology in Biomedicine 8(1): 47-58 (2004) | |
2003 | ||
55 | Feng Bao: Cryptanalysis of a New Cellular Automata Cryptosystem. ACISP 2003: 416-427 | |
54 | Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng: Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356 | |
53 | Feng Bao, Robert H. Deng, Huafei Zhu: Variations of Diffie-Hellman Problem. ICICS 2003: 301-312 | |
52 | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83 | |
51 | Hongjun Wu, Feng Bao, Robert H. Deng: An Efficient Known Plaintext Attack on FEA-M. ICICS 2003: 84-87 | |
50 | Jianying Zhou, Feng Bao, Robert H. Deng: An Efficient Public-Key Framework. ICICS 2003: 88-99 | |
49 | Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng: Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319 | |
48 | Feng Bao: Security Analysis of a Password Authenticated Key Exchange Protocol. ISC 2003: 208-217 | |
47 | Jianying Zhou, Feng Bao, Robert H. Deng: Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ISC 2003: 96-110 | |
46 | Yanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng: Secure the image-based simulated telesurgery system. ISCAS (2) 2003: 596-599 | |
45 | Yanjiang Yang, Feng Bao, Robert H. Deng: Flexible authentication of images. VCIP 2003: 1905-1911 | |
2002 | ||
44 | Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings Springer 2002 | |
43 | Hongjun Wu, Feng Bao: Cryptanalysis of Stream Cipher COS(2, 128) Mode I. ACISP 2002: 154-158 | |
42 | Yanjiang Yang, Feng Bao, Robert H. Deng: Security Analysis and Improvement of the Global Key Recovery System. ACISP 2002: 17-24 | |
41 | Robert H. Deng, Jianying Zhou, Feng Bao: Defending against redirect attacks in mobile IP. ACM Conference on Computer and Communications Security 2002: 59-67 | |
40 | Yongdong Wu, Changsheng Xu, Feng Bao: Counterfeiting Attack on a Lossless Authentication Watermarking Scheme. VIP 2002: 109-112 | |
39 | Hongjun Wu, Feng Bao, Robert H. Deng: Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. Informatica (Slovenia) 26(3): (2002) | |
2001 | ||
38 | Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu: Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. ACISP 2001: 190-205 | |
37 | Feng Bao, Robert H. Deng: Privacy Protection for Transactions of Digital Goods. ICICS 2001: 202-213 | |
36 | Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu: Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Public Key Cryptography 2001: 153-164 | |
35 | Hongjun Wu, Feng Bao, Robert H. Deng: Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Public Key Cryptography 2001: 173-179 | |
2000 | ||
34 | Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng: Cryptanalysis of Polynominal Authentication and Signature Scheme. ACISP 2000: 278-288 | |
33 | Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng: Cryptanalysis of the m-Permutation Protection Schemes. ACISP 2000: 97-111 | |
32 | Feng Bao: Multimedia content protection by cryptography and watermarking in tamper-resistant hardware. ACM Multimedia Workshops 2000: 139-142 | |
31 | Feng Bao: Introducing Decryption Authority into PKI. ACSAC 2000: 288- | |
30 | Feng Bao, Robert H. Deng, Peirong Feng: An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. ICISC 2000: 162-170 | |
29 | Jianying Zhou, Robert H. Deng, Feng Bao: Some Remarks on a Fair Exchange Protocol. Public Key Cryptography 2000: 46-57 | |
28 | Feng Bao, Robert H. Deng, Jianying Zhou: Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460 | |
27 | Xinkai Wang, Robert H. Deng, Feng Bao: Multicast Internet protocol. Computer Communications 23(11): 1047-1054 (2000) | |
1999 | ||
26 | Jianying Zhou, Robert H. Deng, Feng Bao: Evolution of Fair Non-repudiation with TTP. ACISP 1999: 258-269 | |
25 | Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan: Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999: 858-863 | |
24 | Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan: Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. ICICS 1999: 103-118 | |
23 | Feng Bao, Robert H. Deng: A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. Public Key Cryptography 1999: 1-11 | |
1998 | ||
22 | Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye: Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. ASIACRYPT 1998: 126-132 | |
21 | Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye: Improved Truncated Differential Attacks on SAFER. ASIACRYPT 1998: 133-147 | |
20 | Feng Bao: An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms. CARDIS 1998: 213-220 | |
19 | Feng Bao, Robert H. Deng, Wenbo Mao: Efficient and Practical Fair Exchange Protocols with Off-Line TTP. IEEE Symposium on Security and Privacy 1998: 77-85 | |
18 | Feng Bao, Robert H. Deng: A Signcryption Scheme with Signature Directly Verifiable by Public Key. Public Key Cryptography 1998: 55-59 | |
17 | Robert H. Deng, Jian Hu, Feng Bao, A. Desai Narasimhalu: A Ubiquitous Secure and Reliable Digital Data Depository System. WETICE 1998: 354-358 | |
16 | Feng Bao, Yoshihide Igarashi, Sabine R. Öhring: Reliable broadcasting in product networks. Discrete Applied Mathematics 83(1-3): 3-20 (1998) | |
1997 | ||
15 | Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng: Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. ACISP 1997: 261-270 | |
14 | Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng: RSA-type Signatures in the Presence of Transient Faults. IMA Int. Conf. 1997: 155-160 | |
13 | Feng Bao, Yutaka Funyu, Yukihiro Hamada, Yoshihide Igarashi: Reliable broadcasting and secure distributing in channel networks. ISPAN 1997: 472-478 | |
12 | Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi: Modified Finite Automata Public Key Cryptosystem. ISW 1997: 82-95 | |
11 | Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, Teow-Hin Ngair: Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. Security Protocols Workshop 1997: 115-124 | |
10 | Feng Bao, Aohan Mei, Yoshihide Igarashi: Average Competitive Ratios of On-Line Spanning Trees. Inf. Process. Lett. 62(4): 213-216 (1997) | |
1996 | ||
9 | Yukihiro Hamada, Aohan Mei, Feng Bao, Yoshihide Igarashi: Broadcasting in Star Graphs with Byzantine Failures. ASIAN 1996: 162-171 | |
8 | Tatsuya Akutsu, Feng Bao: Approximating Minimum Keys and Optimal Substructure Screens. COCOON 1996: 290-299 | |
7 | Feng Bao, Yoshihide Igarashi: Reliable Broadcasting in Product Networks with Byzantine Faults. FTCS 1996: 262-271 | |
6 | Yukihiro Hamada, Feng Bao, Aohan Mei, Yoshihide Igarashi: Fault-tolerant File Transmission by Information Dispersal Algorithm in Rotator Graphs. ICDCS 1996: 19-25 | |
5 | Aohan Mei, Feng Bao, Yukihiro Hamada, Yoshihide Igarashi: Optimal Time Broadcasting in Faulty Star Networks. WDAG 1996: 175-190 | |
4 | Koji Obokata, Yukihiro Iwasaki, Feng Bao, Yoshihide Igarashi: Independent Spanning Trees of Product Graphs. WG 1996: 338-351 | |
1995 | ||
3 | Feng Bao, Yoshihide Igarashi: Break Finite Automata Public Key Cryptosystem. ICALP 1995: 147-158 | |
2 | Feng Bao, Yoshihide Igarashi, Keiko Katano: Broadcasting in Hypercubes with Randomly Distributed Byzantine Faults. WDAG 1995: 215-229 | |
1994 | ||
1 | Feng Bao, Yoshihide Igarashi: A Randomized Algorithm to Finite Automata Public Key Cryptosystem. ISAAC 1994: 678-686 |