Feng Hao
Orcid: 0000-0002-8664-5074Affiliations:
- University of Warwick, Department of Computer Science, Conventry, UK
- University of Cambridge, Computer Laboratory, UK (former)
According to our database1,
Feng Hao
authored at least 100 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ECF-IDS: An Enhanced Cuckoo Filter-Based Intrusion Detection System for In-Vehicle Network.
IEEE Trans. Netw. Serv. Manag., August, 2024
Spoofing Against Spoofing: Toward Caller ID Verification in Heterogeneous Telecommunication Systems.
ACM Trans. Priv. Secur., 2024
On the feasibility of E2E verifiable online voting - A case study from Durga Puja trial.
J. Inf. Secur. Appl., 2024
Comput. J., 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems.
CoRR, 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
1-Round Distributed Key Generation With Efficient Reconstruction Using Decentralized CP-ABE.
IEEE Trans. Inf. Forensics Secur., 2022
Int. J. Appl. Cryptogr., 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Privacy-preserving Crowd-sensed Trust Aggregation in the User-centeric Internet of People Networks.
ACM Trans. Cyber Phys. Syst., 2021
SoK: Password-Authenticated Key Exchange - Theory, Practice, Standardization and Real-World Lessons.
IACR Cryptol. ePrint Arch., 2021
Comput. Secur., 2021
Comput. Commun., 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecom Spams.
IEEE Trans. Emerg. Top. Comput., 2020
IEEE Trans. Engineering Management, 2020
IEEE Internet Things J., 2020
IEEE Secur. Priv., 2020
IACR Cryptol. ePrint Arch., 2020
2019
Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019
IEEE Internet Things J., 2019
Int. J. Inf. Sec., 2019
Future Gener. Comput. Syst., 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Int. J. Inf. Sec., 2018
Int. J. Inf. Sec., 2018
IEEE Secur. Priv., 2018
Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography.
IEEE Multim., 2018
Future Gener. Comput. Syst., 2018
CoRR, 2018
Comput. Secur., 2018
Comput. Secur., 2018
IEEE Access, 2018
2017
ACM Trans. Priv. Secur., 2017
Erratum to "On the Privacy of Private Browsing - A Forensic Approach" [JISA 19/1(2014), 88-100].
J. Inf. Secur. Appl., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript.
J. Inf. Secur. Appl., 2016
J. Inf. Secur. Appl., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security Standardisation Research - Third International Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Proceedings of the Security Protocols XXI, 2013
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
2011
Proceedings of the Security Protocols XIX, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
2009
2008
IEEE Trans. Inf. Forensics Secur., 2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Security Protocols XVI, 2008
2007
2006
2005
Proceedings of the Security Protocols, 2005
2003
Pattern Recognit. Lett., 2003
2002
Inf. Manag. Comput. Secur., 2002