Feng Bao
Affiliations:- Huawei Technologies Pte Ltd, Singapore
- Institute for Infocomm Research, Cryptography & Security Department, Singapore (former)
According to our database1,
Feng Bao
authored at least 213 papers
between 1997 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
Proceedings of the Cyber-Physical Systems Security., 2018
2017
Future Gener. Comput. Syst., 2017
2016
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
2014
Secur. Commun. Networks, 2014
2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Secur. Commun. Networks, 2012
J. Netw. Comput. Appl., 2012
2011
IEEE Trans. Smart Grid, 2011
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
Secur. Commun. Networks, 2011
Int. J. Inf. Sec., 2011
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency.
Int. J. Inf. Sec., 2011
Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis.
Proceedings of the 17th IEEE International Conference on Networks, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
IACR Cryptol. ePrint Arch., 2010
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
Sci. China Inf. Sci., 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Vulnerability of a Non-membership Proof Scheme.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing.
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Secur. Commun. Networks, 2009
<i>n</i> PAKE<sup>+</sup>: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
J. Comput. Sci. Technol., 2009
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Security and Correctness Analysis on Privacy-Preserving <i>k</i>-Means Clustering Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the E-Voting and Identity, Second International Conference, 2009
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Advances in Multimedia Information Processing, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions.
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
J. Res. Pract. Inf. Technol., 2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008
Proceedings of the Information Security and Cryptology, 2008
Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Comput. Networks, 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the New Approaches for Security, 2007
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Proceedings of the Public Key Cryptography, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
<i>n</i> PAKE<sup> + </sup>: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
IEEE Trans. Wirel. Commun., 2006
IEEE Trans. Wirel. Commun., 2006
IEEE Trans. Dependable Secur. Comput., 2006
IEICE Trans. Commun., 2006
IACR Cryptol. ePrint Arch., 2006
Data Knowl. Eng., 2006
Appl. Math. Comput., 2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006
An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Topics in Cryptology, 2006
Proceedings of the Communications and Multimedia Security, 2006
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Tailored reversible watermarking schemes for authentication of electronic clinical atlas.
IEEE Trans. Inf. Technol. Biomed., 2005
New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures.
IEEE Trans. Computers, 2005
New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures.
IEEE Trans. Computers, 2005
Security Analysis on an Improvement of RSA-Based Password Authenticated Key Exchange.
IEICE Trans. Commun., 2005
Comput. Networks, 2005
Comput. Networks, 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
DoS-resistant access control protocol with identity confidentiality for wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem.
Proceedings of the Trust, 2005
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Secure Person-To-Person Communications Based on Biometrics Signals.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the IEEE 16th International Symposium on Personal, 2005
Proceedings of the IEEE 16th International Symposium on Personal, 2005
Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Providing efficient certification services against active attacks in ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains.
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Computer Security, 2005
Proceedings of the Topics in Cryptology, 2005
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem".
IEEE Trans. Knowl. Data Eng., 2004
IEEE Trans. Inf. Technol. Biomed., 2004
IEEE Trans. Consumer Electron., 2004
IEEE Trans. Computers, 2004
IACR Cryptol. ePrint Arch., 2004
New efficient user identification and key distribution scheme providing enhanced security.
Comput. Secur., 2004
Comput. Networks, 2004
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
Proceedings of the IEEE 15th International Symposium on Personal, 2004
Proceedings of the IEEE 15th International Symposium on Personal, 2004
Proceedings of the 12th ACM International Conference on Multimedia, 2004
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Flexible authentication of images.
Proceedings of the Visual Communications and Image Processing 2003, 2003
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003
Proceedings of the Global Telecommunications Conference, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes.
Informatica (Slovenia), 2002
Proceedings of the Visualisation 2002, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Electronic Payment Systems with Fair On-line Verification.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Public Key Cryptography, 2000
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware.
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods.
Proceedings of the Information Security and Cryptology, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation.
Proceedings of the Public Key Cryptography, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Proceedings of the 10th International Workshop on Database & Expert Systems Applications, 1999
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999
1998
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998
Proceedings of the Security and Privacy, 1998
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults.
Proceedings of the Security Protocols, 1997
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Cryptography and Coding, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997