Feng Hao

Orcid: 0000-0002-8664-5074

Affiliations:
  • University of Warwick, Department of Computer Science, Conventry, UK
  • University of Cambridge, Computer Laboratory, UK (former)


According to our database1, Feng Hao authored at least 100 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ECF-IDS: An Enhanced Cuckoo Filter-Based Intrusion Detection System for In-Vehicle Network.
IEEE Trans. Netw. Serv. Manag., August, 2024

Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems.
ACM Trans. Priv. Secur., 2024

On the feasibility of E2E verifiable online voting - A case study from Durga Puja trial.
J. Inf. Secur. Appl., 2024

A Publicly Verifiable Optimistic Fair Exchange Protocol Using Decentralized CP-ABE.
Comput. J., 2024

2023
Low Trace-Count Template Attacks on 32-bit Implementations of ASCON AEAD.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Camel: E2E Verifiable Instant Runoff Voting without Tallying Authorities.
IACR Cryptol. ePrint Arch., 2023

Owl: An Augmented Password-Authenticated Key Exchange Scheme.
IACR Cryptol. ePrint Arch., 2023

Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems.
CoRR, 2023

Security Analysis of Mobile Point-of-Sale Terminals.
Proceedings of the Network and System Security - 17th International Conference, 2023

Spying on the Spy: Security Analysis of Hidden Cameras.
Proceedings of the Network and System Security - 17th International Conference, 2023

Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
1-Round Distributed Key Generation With Efficient Reconstruction Using Decentralized CP-ABE.
IEEE Trans. Inf. Forensics Secur., 2022

End-to-end verifiable cumulative voting without tallying authorities.
Int. J. Appl. Cryptogr., 2022

A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

VERICONDOR: End-to-End Verifiable Condorcet Voting without Tallying Authorities.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting.
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks.
ACM Trans. Cyber Phys. Syst., 2021

SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons.
IACR Cryptol. ePrint Arch., 2021

On Secure E-Voting over Blockchain.
DTRAP, 2021

Prudent Practices in Security Standardization.
IEEE Commun. Stand. Mag., 2021

Formal modelling and security analysis of bitcoin's payment protocol.
Comput. Secur., 2021

Sharing is Caring: A collaborative framework for sharing security alerts.
Comput. Commun., 2021

OPay: an Orientation-based Contactless Payment Solution Against Passive Attacks.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Authentic Caller: Self-Enforcing Authentication in a Next-Generation Network.
IEEE Trans. Ind. Informatics, 2020

SEAL: Sealed-Bid Auction Without Auctioneers.
IEEE Trans. Inf. Forensics Secur., 2020

privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams.
IEEE Trans. Emerg. Top. Comput., 2020

A Smart Contract System for Decentralized Borda Count Voting.
IEEE Trans. Engineering Management, 2020

Decentralized Self-Enforcing Trust Management System for Social Internet of Things.
IEEE Internet Things J., 2020

End-to-End Verifiable E-Voting Trial for Polling Station Voting.
IEEE Secur. Priv., 2020

End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead.
IACR Cryptol. ePrint Arch., 2020

2019
Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019

TrustVote: Privacy-Preserving Node Ranking in Vehicular Networks.
IEEE Internet Things J., 2019

DOMtegrity: ensuring web page integrity against malicious browser extensions.
Int. J. Inf. Sec., 2019

PriVeto: a fully private two-round veto protocol.
IET Inf. Secur., 2019

Consumer-facing technology fraud: Economics, attack methods and potential solutions.
Future Gener. Comput. Syst., 2019

E2E Verifiable Electronic Voting System for Shareholders.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

SSR'19: The 5th Conference on Security Standardisation Research.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

E2E Verifiable Borda Count Voting System without Tallying Authorities.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Analyzing and Patching SPEKE in ISO/IEC.
IEEE Trans. Inf. Forensics Secur., 2018

Stealing PINs via mobile sensors: actual risk versus user perception.
Int. J. Inf. Sec., 2018

ZombieCoin 2.0: managing next-generation botnets using Bitcoin.
Int. J. Inf. Sec., 2018

Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions.
IEEE Secur. Priv., 2018

Verifiable Classroom Voting in Practice.
IEEE Secur. Priv., 2018

Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography.
IEEE Multim., 2018

PrivBox: Verifiable decentralized reputation system for online marketplaces.
Future Gener. Comput. Syst., 2018

On legitimate mining of cryptocurrency in the browser - a feasibility study.
CoRR, 2018

Analysing and Patching SPEKE in ISO/IEC.
CoRR, 2018

A privacy-aware decentralized and personalized reputation system.
Comput. Secur., 2018

M2M-REP: Reputation system for machines in the internet of things.
Comput. Secur., 2018

Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy.
IEEE Access, 2018

2017
J-PAKE: Password-Authenticated Key Exchange by Juggling.
RFC, September, 2017

Schnorr Non-interactive Zero-Knowledge Proof.
RFC, September, 2017

Texture to the Rescue: Practical Paper Fingerprinting Based on Texture Patterns.
ACM Trans. Priv. Secur., 2017

Erratum to "On the Privacy of Private Browsing - A Forensic Approach" [JISA 19/1(2014), 88-100].
J. Inf. Secur. Appl., 2017

A Smart Contract for Boardroom Voting with Maximum Voter Privacy.
IACR Cryptol. ePrint Arch., 2017

M2M-REP: Reputation of Machines in the Internet of Things.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Deleting Secret Data with Public Verifiability.
IEEE Trans. Dependable Secur. Comput., 2016

ID2S Password-Authenticated Key Exchange Protocols.
IEEE Trans. Computers, 2016

TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript.
J. Inf. Secur. Appl., 2016

Editorial of special issue on security and privacy in cloud computing.
J. Inf. Secur. Appl., 2016

DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities.
IACR Cryptol. ePrint Arch., 2016

Refund attacks on Bitcoin's Payment Protocol.
IACR Cryptol. ePrint Arch., 2016

Towards Bitcoin Payment Networks.
IACR Cryptol. ePrint Arch., 2016

NFC Payment Spy: A Privacy Attack on Contactless Payments.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

2015
Authenticated Key Exchange over Bitcoin.
IACR Cryptol. ePrint Arch., 2015

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group.
IACR Cryptol. ePrint Arch., 2015

Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

ZombieCoin: Powering Next-Generation Botnets with Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2015

Practical Threshold Password-Authenticated Secret Sharing Protocol.
Proceedings of the Computer Security - ESORICS 2015, 2015

TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
On the privacy of private browsing - A forensic approach.
J. Inf. Secur. Appl., 2014

Cryptanalysis of the dragonfly key exchange protocol.
IET Inf. Secur., 2014

The SPEKE Protocol Revisited.
IACR Cryptol. ePrint Arch., 2014

Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

ID-Based Two-Server Password-Authenticated Key Exchange.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy.
Proceedings of the Security Protocols XXI, 2013

Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

2012
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2012

Self-enforcing Electronic Voting.
Proceedings of the Security Protocols XX, 2012

Self-enforcing Electronic Voting (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Analysis of Issues and Challenges of E-Voting in the UK.
Proceedings of the Security Protocols XX, 2012

A Fair and Robust Voting System by Broadcast.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
How to Sync with Alice.
Proceedings of the Security Protocols XIX, 2011

How to Sync with Alice (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

2010
J-PAKE: Authenticated Key Exchange without PKI.
Trans. Comput. Sci., 2010

Anonymous voting by two-round public discussion.
IET Inf. Secur., 2010

Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting.
IACR Cryptol. ePrint Arch., 2010

On Small Subgroup Non-confinement Attack.
IACR Cryptol. ePrint Arch., 2010

On Robust Key Agreement Based on Public Key Authentication.
IACR Cryptol. ePrint Arch., 2010

2009
The Power of Anonymous Veto in Public Discussion.
Trans. Comput. Sci., 2009

2008
A Fast Search Algorithm for a Large Fuzzy Database.
IEEE Trans. Inf. Forensics Secur., 2008

Password Authenticated Key Exchange by Juggling.
Proceedings of the Security Protocols XVI, 2008

Password Authenticated Key Exchange by Juggling (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

2007
On using fuzzy data in security mechanisms.
PhD thesis, 2007

2006
Combining Crypto with Biometrics Effectively.
IEEE Trans. Computers, 2006

A 2-Round Anonymous Veto Protocol.
Proceedings of the Security Protocols, 2006

A 2-Round Anonymous Veto Protocol.
Proceedings of the Security Protocols, 2006

2005
Combining Crypto with Biometrics: A New Human-Security Interface.
Proceedings of the Security Protocols, 2005

2003
Online signature verification using a new extreme points warping technique.
Pattern Recognit. Lett., 2003

2002
Private key generation from on-line handwritten signatures.
Inf. Manag. Comput. Secur., 2002


  Loading...