Search the dblp DataBase
Feng Bao :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Feng Bao Cryptanalysis of a New Cellular Automata Cryptosystem. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:416-427 [Conf ] Feng Bao Analysis of a Conference Scheme Under Active and Passive Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:157-163 [Conf ] Feng Bao , Robert H. Deng , Peirong Feng , Yan Guo , Hongjun Wu Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:190-205 [Conf ] Feng Bao , Robert H. Deng , Yongfei Han , Albert B. Jeng Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:261-270 [Conf ] Feng Bao , Guilin Wang , Jianying Zhou , Huafei Zhu Analysis and Improvement of Micali's Fair Contract Signing Protocol. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:176-187 [Conf ] Hongjun Wu , Feng Bao Cryptanalysis of Stream Cipher COS(2, 128) Mode I. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:154-158 [Conf ] Jianying Zhou , Robert H. Deng , Feng Bao Evolution of Fair Non-repudiation with TTP. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:258-269 [Conf ] Huafei Zhu , Feng Bao More on Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:148-158 [Conf ] Huafei Zhu , Feng Bao Oblivious Scalar-Product Protocols. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:313-323 [Conf ] Yanjiang Yang , Feng Bao , Robert H. Deng Security Analysis and Improvement of the Global Key Recovery System. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:17-24 [Conf ] Yanjiang Yang , Feng Bao , Robert H. Deng Security Analysis and Fix of an Anonymous Credential System. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:537-547 [Conf ] Hongjun Wu , Feng Bao , Dingfeng Ye , Robert H. Deng Cryptanalysis of the m -Permutation Protection Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:97-111 [Conf ] Hongjun Wu , Feng Bao , Dingfeng Ye , Robert H. Deng Cryptanalysis of Polynominal Authentication and Signature Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:278-288 [Conf ] Bok-Min Goi , Raphael Chung-Wei Phan , Yanjiang Yang , Feng Bao , Robert H. Deng , M. U. Siddiqi Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:369-382 [Conf ] Gang Yao , Kui Ren , Feng Bao , Robert H. Deng , Dengguo Feng Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:343-356 [Conf ] Bin Zhang , Hongjun Wu , Dengguo Feng , Feng Bao Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:303-309 [Conf ] Feng Bao Introducing Decryption Authority into PKI. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:288-0 [Conf ] Chunhua Su , Feng Bao , Jianying Zhou , Tsuyoshi Takagi , Kouichi Sakurai Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:385-391 [Conf ] Feng Bao Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:417-429 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng , Qin-Zhong Ye Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:126-132 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng , Qin-Zhong Ye Improved Truncated Differential Attacks on SAFER. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:133-147 [Conf ] Yukihiro Hamada , Aohan Mei , Feng Bao , Yoshihide Igarashi Broadcasting in Star Graphs with Byzantine Failures. [Citation Graph (0, 0)][DBLP ] ASIAN, 1996, pp:162-171 [Conf ] Feng Bao An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:213-220 [Conf ] Robert H. Deng , Jianying Zhou , Feng Bao Defending against redirect attacks in mobile IP. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:59-67 [Conf ] Yanjiang Yang , Robert H. Deng , Feng Bao Fortifying password authentication in integrated healthcare delivery systems. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:255-265 [Conf ] Yanjiang Yang , Robert H. Deng , Feng Bao Practical private data matching deterrent to spoofing attacks. [Citation Graph (0, 0)][DBLP ] CIKM, 2006, pp:852-853 [Conf ] Yongdong Wu , Feng Bao Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:264-278 [Conf ] Huafei Zhu , Feng Bao , Tieyan Li Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:200-209 [Conf ] Huafei Zhu , Feng Bao , Jianwei Liu Computing of Trust in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2006, pp:1-11 [Conf ] Tatsuya Akutsu , Feng Bao Approximating Minimum Keys and Optimal Substructure Screens. [Citation Graph (0, 0)][DBLP ] COCOON, 1996, pp:290-299 [Conf ] Bin Zhang , Hongjun Wu , Dengguo Feng , Feng Bao A Fast Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2005, pp:72-86 [Conf ] Huafei Zhu , Feng Bao Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:159-173 [Conf ] Feng Bao , Robert H. Deng , Khanh Quoc Nguyen , Vijay Varadharajan Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1999, pp:858-863 [Conf ] Huafei Zhu , Feng Bao Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:222-230 [Conf ] Shuhong Wang , Xuhua Ding , Robert H. Deng , Feng Bao Private Information Retrieval Using Trusted Hardware. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:49-64 [Conf ] Feng Bao , Yoshihide Igarashi Reliable Broadcasting in Product Networks with Byzantine Faults. [Citation Graph (0, 0)][DBLP ] FTCS, 1996, pp:262-271 [Conf ] Bo Zhu , Tieyan Li , Huafei Zhu , Mohan S. Kankanhalli , Feng Bao , Robert H. Deng Trust Establishment in Large Scale Grid Settings. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:317-324 [Conf ] Feng Bao , Yoshihide Igarashi Break Finite Automata Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ICALP, 1995, pp:147-158 [Conf ] Helger Lipmaa , Guilin Wang , Feng Bao Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:459-471 [Conf ] Yukihiro Hamada , Feng Bao , Aohan Mei , Yoshihide Igarashi Fault-tolerant File Transmission by Information Dispersal Algorithm in Rotator Graphs. [Citation Graph (0, 0)][DBLP ] ICDCS, 1996, pp:19-25 [Conf ] Feng Bao , Robert H. Deng Privacy Protection for Transactions of Digital Goods. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:202-213 [Conf ] Feng Bao , Robert H. Deng , Huafei Zhu Variations of Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:301-312 [Conf ] Fang Qi , Weijia Jia , Feng Bao , Yongdong Wu Batching SSL/TLS Handshake Improved. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:402-413 [Conf ] Guilin Wang , Feng Bao Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:399-409 [Conf ] Shuhong Wang , Feng Bao , Robert H. Deng Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:53-60 [Conf ] Guilin Wang , Feng Bao , Kenji Imamoto , Kouichi Sakurai Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:40-52 [Conf ] Guilin Wang , Feng Bao , Jianying Zhou The Fairness of Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:435-451 [Conf ] Guilin Wang , Feng Bao , Jianying Zhou , Robert H. Deng Security Remarks on a Group Signature Scheme with Member Deletion. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:72-83 [Conf ] Khanh Quoc Nguyen , Feng Bao , Yi Mu , Vijay Varadharajan Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:103-118 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng An Efficient Known Plaintext Attack on FEA-M. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:84-87 [Conf ] Bin Zhang , Hongjun Wu , Dengguo Feng , Feng Bao Security Analysis of the Generalized Self-shrinking Generator. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:388-400 [Conf ] Jianying Zhou , Feng Bao , Robert H. Deng An Efficient Public-Key Framework. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:88-99 [Conf ] Huafei Zhu , Feng Bao , Robert H. Deng Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:207-219 [Conf ] Feng Bao , Robert H. Deng , Peirong Feng An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:162-170 [Conf ] Kisik Chang , Robert H. Deng , Feng Bao , Sangjin Lee , HyungJun Kim , Jongin Lim On Security Notions for Steganalysis. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:440-454 [Conf ] Guilin Wang , Feng Bao , Jianying Zhou , Robert H. Deng Security Analysis of Some Proxy Signatures. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:305-319 [Conf ] Marc Joye , Jean-Jacques Quisquater , Feng Bao , Robert H. Deng RSA-type Signatures in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1997, pp:155-160 [Conf ] Bin Zhang , Hongjun Wu , Dengguo Feng , Feng Bao Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:73-83 [Conf ] Guilin Wang , Feng Bao , Jianying Zhou On the Security of a Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:48-60 [Conf ] Feng Bao , Yoshihide Igarashi A Randomized Algorithm to Finite Automata Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ISAAC, 1994, pp:678-686 [Conf ] Yanjiang Yang , Zhenlan Wang , Feng Bao , Robert H. Deng Secure the image-based simulated telesurgery system. [Citation Graph (0, 0)][DBLP ] ISCAS (2), 2003, pp:596-599 [Conf ] Feng Bao , Yutaka Funyu , Yukihiro Hamada , Yoshihide Igarashi Reliable broadcasting and secure distributing in channel networks. [Citation Graph (0, 0)][DBLP ] ISPAN, 1997, pp:472-478 [Conf ] Fang Qi , Feng Bao , Tieyan Li , Weijia Jia , Yongdong Wu Preventing Web-Spoofing with Automatic Detecting Security Indicator. [Citation Graph (0, 0)][DBLP ] ISPEC, 2006, pp:112-122 [Conf ] Huafei Zhu , Feng Bao , Tieyan Li , Ying Qiu More on Shared-Scalar-Product Protocols. [Citation Graph (0, 0)][DBLP ] ISPEC, 2006, pp:142-152 [Conf ] Yanjiang Yang , Robert H. Deng , Feng Bao Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:177-192 [Conf ] Chunhua Su , Jianying Zhou , Feng Bao , Tsuyoshi Takagi , Kouichi Sakurai Two-Party Privacy-Preserving Agglomerative Document Clustering. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:193-208 [Conf ] Feng Bao Security Analysis of a Password Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:208-217 [Conf ] Feng Bao , Robert H. Deng , Xiang Gao , Yoshihide Igarashi Modified Finite Automata Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:82-95 [Conf ] Jianying Zhou , Feng Bao , Robert H. Deng Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:96-110 [Conf ] Kisik Chang , Robert H. Deng , Feng Bao , Sangjin Lee , HyungJun Kim On Security Notions of Steganographic Systems. [Citation Graph (0, 0)][DBLP ] IWDW, 2004, pp:137-151 [Conf ] Zhiguo Wan , Akkihebbal L. Ananda , Robert H. Deng , Feng Bao Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:328-335 [Conf ] Bo Zhu , Zhiguo Wan , Mohan S. Kankanhalli , Feng Bao , Robert H. Deng Anonymous Secure Routing in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] LCN, 2004, pp:102-108 [Conf ] Feng Bao Multimedia content protection by cryptography and watermarking in tamper-resistant hardware. [Citation Graph (0, 0)][DBLP ] ACM Multimedia Workshops, 2000, pp:139-142 [Conf ] Yongdong Wu , Feng Bao Collusion attack on a multi-key secure video proxy scheme. [Citation Graph (0, 0)][DBLP ] ACM Multimedia, 2004, pp:380-383 [Conf ] Feng Bao , Robert H. Deng A Signcryption Scheme with Signature Directly Verifiable by Public Key. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1998, pp:55-59 [Conf ] Feng Bao , Robert H. Deng A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:1-11 [Conf ] Feng Bao , Robert H. Deng , Willi Geiselmann , Claus-Peter Schnorr , Rainer Steinwandt , Hongjun Wu Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:153-164 [Conf ] Hongjun Wu , Feng Bao , Robert H. Deng Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:173-179 [Conf ] Jianying Zhou , Robert H. Deng , Feng Bao Some Remarks on a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2000, pp:46-57 [Conf ] Feng Bao , Robert H. Deng , Jianying Zhou Electronic Payment Systems with Fair On-line Verification. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:451-460 [Conf ] Yongdong Wu , Feng Bao , Robert H. Deng Secure Person-To-Person Communications Based on Biometrics Signals. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:205-222 [Conf ] Yanjiang Yang , Feng Bao , Robert H. Deng A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:95-112 [Conf ] Huafei Zhu , Tieyan Li , Feng Bao Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. [Citation Graph (0, 0)][DBLP ] SEC, 2006, pp:340-350 [Conf ] Feng Bao , Robert H. Deng , Yongfei Han , Albert B. Jeng , A. Desai Narasimhalu , Teow-Hin Ngair Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:115-124 [Conf ] Huafei Zhu , Feng Bao A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:266-273 [Conf ] Yanjiang Yang , Feng Bao , Robert H. Deng Flexible authentication of images. [Citation Graph (0, 0)][DBLP ] VCIP, 2003, pp:1905-1911 [Conf ] Yongdong Wu , Changsheng Xu , Feng Bao Counterfeiting Attack on a Lossless Authentication Watermarking Scheme. [Citation Graph (0, 0)][DBLP ] VIP, 2002, pp:109-112 [Conf ] Feng Bao , Yoshihide Igarashi , Keiko Katano Broadcasting in Hypercubes with Randomly Distributed Byzantine Faults. [Citation Graph (0, 0)][DBLP ] WDAG, 1995, pp:215-229 [Conf ] Aohan Mei , Feng Bao , Yukihiro Hamada , Yoshihide Igarashi Optimal Time Broadcasting in Faulty Star Networks. [Citation Graph (0, 0)][DBLP ] WDAG, 1996, pp:175-190 [Conf ] Robert H. Deng , Jian Hu , Feng Bao , A. Desai Narasimhalu A Ubiquitous Secure and Reliable Digital Data Depository System. [Citation Graph (0, 0)][DBLP ] WETICE, 1998, pp:354-358 [Conf ] Koji Obokata , Yukihiro Iwasaki , Feng Bao , Yoshihide Igarashi Independent Spanning Trees of Product Graphs. [Citation Graph (0, 0)][DBLP ] WG, 1996, pp:338-351 [Conf ] Feng Bao , Robert H. Deng Protocols that hide user's preferences in electronic transactions. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:48, n:4, pp:503-515 [Journal ] Kui Ren , Tieyan Li , Zhiguo Wan , Feng Bao , Robert H. Deng , Kwangjo Kim Highly reliable trust establishment scheme in ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:45, n:6, pp:687-699 [Journal ] Bo Zhu , Feng Bao , Robert H. Deng , Mohan S. Kankanhalli , Guilin Wang Efficient and robust key management for large mobile ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:48, n:4, pp:657-682 [Journal ] Kui Ren , Wenjing Lou , Kai Zeng , Feng Bao , Jianying Zhou , Robert H. Deng Routing optimization security in mobile IPv6. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2006, v:50, n:13, pp:2401-2419 [Journal ] Xinkai Wang , Robert H. Deng , Feng Bao Multicast Internet protocol. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:11, pp:1047-1054 [Journal ] Yanjiang Yang , Shuhong Wang , Feng Bao , Jie Wang , Robert H. Deng New efficient user identification and key distribution scheme providing enhanced security. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:8, pp:697-704 [Journal ] Feng Bao , Yoshihide Igarashi , Sabine R. Öhring Reliable broadcasting in product networks. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 1998, v:83, n:1-3, pp:3-20 [Journal ] Shen-Tat Goh , HweeHwa Pang , Robert H. Deng , Feng Bao Three architectures for trusted data dissemination in edge computing. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2006, v:58, n:3, pp:381-409 [Journal ] Jianying Zhou , Feng Bao , Robert H. Deng Minimizing TTP's involvement in signature validation. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2006, v:5, n:1, pp:37-47 [Journal ] Hongjun Wu , Feng Bao , Robert H. Deng Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal ] Feng Bao , Aohan Mei , Yoshihide Igarashi Average Competitive Ratios of On-Line Spanning Trees. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1997, v:62, n:4, pp:213-216 [Journal ] Feng Bao Cryptanalysis of a Partially Known Cellular Automata Cryptosystem. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2004, v:53, n:11, pp:1493-1497 [Journal ] Gui Liang Feng , Robert H. Deng , Feng Bao , Jia-Chen Shen New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2005, v:54, n:9, pp:1071-1080 [Journal ] Gui Liang Feng , Robert H. Deng , Feng Bao , Jia-Chen Shen New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2005, v:54, n:12, pp:1473-1483 [Journal ] Yanjiang Yang , Robert H. Deng , Feng Bao A Practical Password-Based Two-Server Authentication and Key Exchange System. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:2, pp:105-114 [Journal ] Feng Bao , Robert H. Deng , Beng Chin Ooi , Yanjiang Yang Tailored reversible watermarking schemes for authentication of electronic clinical atlas. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Technology in Biomedicine, 2005, v:9, n:4, pp:554-563 [Journal ] Yanjiang Yang , Xiaoxi Han , Feng Bao , Robert H. Deng A smart-card-enabled privacy preserving E-prescription system. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Technology in Biomedicine, 2004, v:8, n:1, pp:47-58 [Journal ] Guilin Wang , Feng Bao , Jianying Zhou , Robert H. Deng Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1309-1311 [Journal ] Feng Bao , Cheng-Chi Lee , Min-Shiang Hwang Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2006, v:172, n:2, pp:1195-1200 [Journal ] Yongdong Wu , Feng Bao , Robert H. Deng Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:171-183 [Conf ] Ying Qiu , Feng Bao , Jianying Zhou Firewall for Dynamic IP Address in Mobile IPv6. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:467-479 [Conf ] Zhiguo Wan , Robert H. Deng , Feng Bao , Bart Preneel n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:31-43 [Conf ] Guilin Wang , Joonsang Baek , Duncan S. Wong , Feng Bao On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:43-60 [Conf ] Bo Zhu , Guilin Wang , Zhiguo Wan , Mohan S. Kankanhalli , Feng Bao , Robert H. Deng Providing efficient certification services against active attacks in ad hoc networks. [Citation Graph (0, 0)][DBLP ] IPCCC, 2005, pp:285-292 [Conf ] Zhiguo Wan , Robert H. Deng , Feng Bao , Akkihebbal L. Ananda Access control protocols with two-layer architecture for wireless networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:3, pp:655-670 [Journal ] Guilin Wang , Feng Bao , Changshe Ma , Kefei Chen Efficient Authenticated Encryption Schemes with Public Verifiability [Citation Graph (0, 0)][DBLP ] CoRR, 2005, v:0, n:, pp:- [Journal ] A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. [Citation Graph (, )][DBLP ] Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property. [Citation Graph (, )][DBLP ] Enabling Use of Single Password over Multiple Servers in Two-Server Model. [Citation Graph (, )][DBLP ] Generic Constructions of Stateful Public Key Encryption and Their Applications. [Citation Graph (, )][DBLP ] A New Approach for Anonymous Password Authentication. [Citation Graph (, )][DBLP ] Practical ID-based encryption for wireless sensor network. [Citation Graph (, )][DBLP ] Batch ZK Proof and Verification of OR Logic. [Citation Graph (, )][DBLP ] Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. [Citation Graph (, )][DBLP ] Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. [Citation Graph (, )][DBLP ] A Secure RFID Ticket System for Public Transport. [Citation Graph (, )][DBLP ] Efficient Client-to-Client Password Authenticated Key Exchange. [Citation Graph (, )][DBLP ] Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. [Citation Graph (, )][DBLP ] Oblivious Keyword Search Protocols in the Public Database Model. [Citation Graph (, )][DBLP ] Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce. [Citation Graph (, )][DBLP ] Price Negotiation Systems for M-commerce. [Citation Graph (, )][DBLP ] Tracing Stateful Pirate Decoders. [Citation Graph (, )][DBLP ] A Lightweight Fast Handover Authentication Scheme in Mobile Networks. [Citation Graph (, )][DBLP ] Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Adaptive and Composable Oblivious Transfer Protocols (Short Paper). [Citation Graph (, )][DBLP ] Efficient Vote Validity Check in Homomorphic Electronic Voting. [Citation Graph (, )][DBLP ] Evaluating Ouda's Tamper-Localization Watermarking Scheme. [Citation Graph (, )][DBLP ] Optimizing the capacity of distortion-freewatermarking on palette images. [Citation Graph (, )][DBLP ] Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. [Citation Graph (, )][DBLP ] Private Query on Encrypted Data in Multi-user Settings. [Citation Graph (, )][DBLP ] Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. [Citation Graph (, )][DBLP ] An Efficient PIR Construction Using Trusted Hardware. [Citation Graph (, )][DBLP ] Private handshakes with optional accountability. [Citation Graph (, )][DBLP ] Improving a Digital Rights Management Scheme for Video Broadcast. [Citation Graph (, )][DBLP ] A Reversible Data Hiding Scheme for JPEG Images. [Citation Graph (, )][DBLP ] Security Remarks on a Convertible Nominative Signature Scheme. [Citation Graph (, )][DBLP ] Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. [Citation Graph (, )][DBLP ] Efficient and Practical Fair Exchange Protocols with Off-Line TTP. [Citation Graph (, )][DBLP ] Private Searching on MapReduce. [Citation Graph (, )][DBLP ] Efficiency Improvement of Homomorphic E-Auction. [Citation Graph (, )][DBLP ] Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. [Citation Graph (, )][DBLP ] Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. [Citation Graph (, )][DBLP ] Self-enforcing Private Inference Control. [Citation Graph (, )][DBLP ] Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. [Citation Graph (, )][DBLP ] A Design of Secure Preferential E-Voting. [Citation Graph (, )][DBLP ] Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. [Citation Graph (, )][DBLP ] Batch Range Proof for Practical Small Ranges. [Citation Graph (, )][DBLP ] Search in 0.075secs, Finished in 0.081secs