The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Feng Bao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Feng Bao
    Cryptanalysis of a New Cellular Automata Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:416-427 [Conf]
  2. Feng Bao
    Analysis of a Conference Scheme Under Active and Passive Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:157-163 [Conf]
  3. Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu
    Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:190-205 [Conf]
  4. Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng
    Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:261-270 [Conf]
  5. Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu
    Analysis and Improvement of Micali's Fair Contract Signing Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:176-187 [Conf]
  6. Hongjun Wu, Feng Bao
    Cryptanalysis of Stream Cipher COS(2, 128) Mode I. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:154-158 [Conf]
  7. Jianying Zhou, Robert H. Deng, Feng Bao
    Evolution of Fair Non-repudiation with TTP. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:258-269 [Conf]
  8. Huafei Zhu, Feng Bao
    More on Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:148-158 [Conf]
  9. Huafei Zhu, Feng Bao
    Oblivious Scalar-Product Protocols. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:313-323 [Conf]
  10. Yanjiang Yang, Feng Bao, Robert H. Deng
    Security Analysis and Improvement of the Global Key Recovery System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:17-24 [Conf]
  11. Yanjiang Yang, Feng Bao, Robert H. Deng
    Security Analysis and Fix of an Anonymous Credential System. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:537-547 [Conf]
  12. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
    Cryptanalysis of the m-Permutation Protection Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:97-111 [Conf]
  13. Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
    Cryptanalysis of Polynominal Authentication and Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:278-288 [Conf]
  14. Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi
    Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:369-382 [Conf]
  15. Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng
    Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:343-356 [Conf]
  16. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:303-309 [Conf]
  17. Feng Bao
    Introducing Decryption Authority into PKI. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:288-0 [Conf]
  18. Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai
    Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:385-391 [Conf]
  19. Feng Bao
    Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:417-429 [Conf]
  20. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
    Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:126-132 [Conf]
  21. Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye
    Improved Truncated Differential Attacks on SAFER. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:133-147 [Conf]
  22. Yukihiro Hamada, Aohan Mei, Feng Bao, Yoshihide Igarashi
    Broadcasting in Star Graphs with Byzantine Failures. [Citation Graph (0, 0)][DBLP]
    ASIAN, 1996, pp:162-171 [Conf]
  23. Feng Bao
    An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:213-220 [Conf]
  24. Robert H. Deng, Jianying Zhou, Feng Bao
    Defending against redirect attacks in mobile IP. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:59-67 [Conf]
  25. Yanjiang Yang, Robert H. Deng, Feng Bao
    Fortifying password authentication in integrated healthcare delivery systems. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:255-265 [Conf]
  26. Yanjiang Yang, Robert H. Deng, Feng Bao
    Practical private data matching deterrent to spoofing attacks. [Citation Graph (0, 0)][DBLP]
    CIKM, 2006, pp:852-853 [Conf]
  27. Yongdong Wu, Feng Bao
    Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:264-278 [Conf]
  28. Huafei Zhu, Feng Bao, Tieyan Li
    Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:200-209 [Conf]
  29. Huafei Zhu, Feng Bao, Jianwei Liu
    Computing of Trust in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2006, pp:1-11 [Conf]
  30. Tatsuya Akutsu, Feng Bao
    Approximating Minimum Keys and Optimal Substructure Screens. [Citation Graph (0, 0)][DBLP]
    COCOON, 1996, pp:290-299 [Conf]
  31. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    A Fast Correlation Attack on the Shrinking Generator. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:72-86 [Conf]
  32. Huafei Zhu, Feng Bao
    Stand-Alone and Setup-Free Verifiably Committed Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:159-173 [Conf]
  33. Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan
    Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:858-863 [Conf]
  34. Huafei Zhu, Feng Bao
    Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:222-230 [Conf]
  35. Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
    Private Information Retrieval Using Trusted Hardware. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:49-64 [Conf]
  36. Feng Bao, Yoshihide Igarashi
    Reliable Broadcasting in Product Networks with Byzantine Faults. [Citation Graph (0, 0)][DBLP]
    FTCS, 1996, pp:262-271 [Conf]
  37. Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Trust Establishment in Large Scale Grid Settings. [Citation Graph (0, 0)][DBLP]
    GCC, 2004, pp:317-324 [Conf]
  38. Feng Bao, Yoshihide Igarashi
    Break Finite Automata Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ICALP, 1995, pp:147-158 [Conf]
  39. Helger Lipmaa, Guilin Wang, Feng Bao
    Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:459-471 [Conf]
  40. Yukihiro Hamada, Feng Bao, Aohan Mei, Yoshihide Igarashi
    Fault-tolerant File Transmission by Information Dispersal Algorithm in Rotator Graphs. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1996, pp:19-25 [Conf]
  41. Feng Bao, Robert H. Deng
    Privacy Protection for Transactions of Digital Goods. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:202-213 [Conf]
  42. Feng Bao, Robert H. Deng, Huafei Zhu
    Variations of Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:301-312 [Conf]
  43. Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu
    Batching SSL/TLS Handshake Improved. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:402-413 [Conf]
  44. Guilin Wang, Feng Bao
    Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:399-409 [Conf]
  45. Shuhong Wang, Feng Bao, Robert H. Deng
    Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:53-60 [Conf]
  46. Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai
    Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:40-52 [Conf]
  47. Guilin Wang, Feng Bao, Jianying Zhou
    The Fairness of Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:435-451 [Conf]
  48. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Security Remarks on a Group Signature Scheme with Member Deletion. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:72-83 [Conf]
  49. Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan
    Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:103-118 [Conf]
  50. Hongjun Wu, Feng Bao, Robert H. Deng
    An Efficient Known Plaintext Attack on FEA-M. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:84-87 [Conf]
  51. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Security Analysis of the Generalized Self-shrinking Generator. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:388-400 [Conf]
  52. Jianying Zhou, Feng Bao, Robert H. Deng
    An Efficient Public-Key Framework. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:88-99 [Conf]
  53. Huafei Zhu, Feng Bao, Robert H. Deng
    Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:207-219 [Conf]
  54. Feng Bao, Robert H. Deng, Peirong Feng
    An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:162-170 [Conf]
  55. Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim
    On Security Notions for Steganalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:440-454 [Conf]
  56. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Security Analysis of Some Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:305-319 [Conf]
  57. Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng
    RSA-type Signatures in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1997, pp:155-160 [Conf]
  58. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:73-83 [Conf]
  59. Guilin Wang, Feng Bao, Jianying Zhou
    On the Security of a Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:48-60 [Conf]
  60. Feng Bao, Yoshihide Igarashi
    A Randomized Algorithm to Finite Automata Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1994, pp:678-686 [Conf]
  61. Yanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng
    Secure the image-based simulated telesurgery system. [Citation Graph (0, 0)][DBLP]
    ISCAS (2), 2003, pp:596-599 [Conf]
  62. Feng Bao, Yutaka Funyu, Yukihiro Hamada, Yoshihide Igarashi
    Reliable broadcasting and secure distributing in channel networks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1997, pp:472-478 [Conf]
  63. Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu
    Preventing Web-Spoofing with Automatic Detecting Security Indicator. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:112-122 [Conf]
  64. Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu
    More on Shared-Scalar-Product Protocols. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:142-152 [Conf]
  65. Yanjiang Yang, Robert H. Deng, Feng Bao
    Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:177-192 [Conf]
  66. Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai
    Two-Party Privacy-Preserving Agglomerative Document Clustering. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:193-208 [Conf]
  67. Feng Bao
    Security Analysis of a Password Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:208-217 [Conf]
  68. Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi
    Modified Finite Automata Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:82-95 [Conf]
  69. Jianying Zhou, Feng Bao, Robert H. Deng
    Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:96-110 [Conf]
  70. Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim
    On Security Notions of Steganographic Systems. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:137-151 [Conf]
  71. Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao
    Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:328-335 [Conf]
  72. Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Anonymous Secure Routing in Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:102-108 [Conf]
  73. Feng Bao
    Multimedia content protection by cryptography and watermarking in tamper-resistant hardware. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia Workshops, 2000, pp:139-142 [Conf]
  74. Yongdong Wu, Feng Bao
    Collusion attack on a multi-key secure video proxy scheme. [Citation Graph (0, 0)][DBLP]
    ACM Multimedia, 2004, pp:380-383 [Conf]
  75. Feng Bao, Robert H. Deng
    A Signcryption Scheme with Signature Directly Verifiable by Public Key. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:55-59 [Conf]
  76. Feng Bao, Robert H. Deng
    A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:1-11 [Conf]
  77. Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu
    Cryptoanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:153-164 [Conf]
  78. Hongjun Wu, Feng Bao, Robert H. Deng
    Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:173-179 [Conf]
  79. Jianying Zhou, Robert H. Deng, Feng Bao
    Some Remarks on a Fair Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:46-57 [Conf]
  80. Feng Bao, Robert H. Deng, Jianying Zhou
    Electronic Payment Systems with Fair On-line Verification. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:451-460 [Conf]
  81. Yongdong Wu, Feng Bao, Robert H. Deng
    Secure Person-To-Person Communications Based on Biometrics Signals. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:205-222 [Conf]
  82. Yanjiang Yang, Feng Bao, Robert H. Deng
    A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:95-112 [Conf]
  83. Huafei Zhu, Tieyan Li, Feng Bao
    Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:340-350 [Conf]
  84. Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, A. Desai Narasimhalu, Teow-Hin Ngair
    Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:115-124 [Conf]
  85. Huafei Zhu, Feng Bao
    A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:266-273 [Conf]
  86. Yanjiang Yang, Feng Bao, Robert H. Deng
    Flexible authentication of images. [Citation Graph (0, 0)][DBLP]
    VCIP, 2003, pp:1905-1911 [Conf]
  87. Yongdong Wu, Changsheng Xu, Feng Bao
    Counterfeiting Attack on a Lossless Authentication Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    VIP, 2002, pp:109-112 [Conf]
  88. Feng Bao, Yoshihide Igarashi, Keiko Katano
    Broadcasting in Hypercubes with Randomly Distributed Byzantine Faults. [Citation Graph (0, 0)][DBLP]
    WDAG, 1995, pp:215-229 [Conf]
  89. Aohan Mei, Feng Bao, Yukihiro Hamada, Yoshihide Igarashi
    Optimal Time Broadcasting in Faulty Star Networks. [Citation Graph (0, 0)][DBLP]
    WDAG, 1996, pp:175-190 [Conf]
  90. Robert H. Deng, Jian Hu, Feng Bao, A. Desai Narasimhalu
    A Ubiquitous Secure and Reliable Digital Data Depository System. [Citation Graph (0, 0)][DBLP]
    WETICE, 1998, pp:354-358 [Conf]
  91. Koji Obokata, Yukihiro Iwasaki, Feng Bao, Yoshihide Igarashi
    Independent Spanning Trees of Product Graphs. [Citation Graph (0, 0)][DBLP]
    WG, 1996, pp:338-351 [Conf]
  92. Feng Bao, Robert H. Deng
    Protocols that hide user's preferences in electronic transactions. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:4, pp:503-515 [Journal]
  93. Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim
    Highly reliable trust establishment scheme in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:45, n:6, pp:687-699 [Journal]
  94. Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang
    Efficient and robust key management for large mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:4, pp:657-682 [Journal]
  95. Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng
    Routing optimization security in mobile IPv6. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:13, pp:2401-2419 [Journal]
  96. Xinkai Wang, Robert H. Deng, Feng Bao
    Multicast Internet protocol. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:11, pp:1047-1054 [Journal]
  97. Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng
    New efficient user identification and key distribution scheme providing enhanced security. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:697-704 [Journal]
  98. Feng Bao, Yoshihide Igarashi, Sabine R. Öhring
    Reliable broadcasting in product networks. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 1998, v:83, n:1-3, pp:3-20 [Journal]
  99. Shen-Tat Goh, HweeHwa Pang, Robert H. Deng, Feng Bao
    Three architectures for trusted data dissemination in edge computing. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2006, v:58, n:3, pp:381-409 [Journal]
  100. Jianying Zhou, Feng Bao, Robert H. Deng
    Minimizing TTP's involvement in signature validation. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:1, pp:37-47 [Journal]
  101. Hongjun Wu, Feng Bao, Robert H. Deng
    Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal]
  102. Feng Bao, Aohan Mei, Yoshihide Igarashi
    Average Competitive Ratios of On-Line Spanning Trees. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:62, n:4, pp:213-216 [Journal]
  103. Feng Bao
    Cryptanalysis of a Partially Known Cellular Automata Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:11, pp:1493-1497 [Journal]
  104. Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen
    New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:9, pp:1071-1080 [Journal]
  105. Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen
    New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:12, pp:1473-1483 [Journal]
  106. Yanjiang Yang, Robert H. Deng, Feng Bao
    A Practical Password-Based Two-Server Authentication and Key Exchange System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:2, pp:105-114 [Journal]
  107. Feng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang
    Tailored reversible watermarking schemes for authentication of electronic clinical atlas. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Technology in Biomedicine, 2005, v:9, n:4, pp:554-563 [Journal]
  108. Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng
    A smart-card-enabled privacy preserving E-prescription system. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Technology in Biomedicine, 2004, v:8, n:1, pp:47-58 [Journal]
  109. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1309-1311 [Journal]
  110. Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang
    Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2006, v:172, n:2, pp:1195-1200 [Journal]
  111. Yongdong Wu, Feng Bao, Robert H. Deng
    Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:171-183 [Conf]
  112. Ying Qiu, Feng Bao, Jianying Zhou
    Firewall for Dynamic IP Address in Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:467-479 [Conf]
  113. Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel
    n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:31-43 [Conf]
  114. Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao
    On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:43-60 [Conf]
  115. Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng
    Providing efficient certification services against active attacks in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:285-292 [Conf]
  116. Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda
    Access control protocols with two-layer architecture for wireless networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:655-670 [Journal]
  117. Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen
    Efficient Authenticated Encryption Schemes with Public Verifiability [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  118. A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. [Citation Graph (, )][DBLP]


  119. Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property. [Citation Graph (, )][DBLP]


  120. Enabling Use of Single Password over Multiple Servers in Two-Server Model. [Citation Graph (, )][DBLP]


  121. Generic Constructions of Stateful Public Key Encryption and Their Applications. [Citation Graph (, )][DBLP]


  122. A New Approach for Anonymous Password Authentication. [Citation Graph (, )][DBLP]


  123. Practical ID-based encryption for wireless sensor network. [Citation Graph (, )][DBLP]


  124. Batch ZK Proof and Verification of OR Logic. [Citation Graph (, )][DBLP]


  125. Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. [Citation Graph (, )][DBLP]


  126. Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. [Citation Graph (, )][DBLP]


  127. A Secure RFID Ticket System for Public Transport. [Citation Graph (, )][DBLP]


  128. Efficient Client-to-Client Password Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  129. Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. [Citation Graph (, )][DBLP]


  130. Oblivious Keyword Search Protocols in the Public Database Model. [Citation Graph (, )][DBLP]


  131. Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce. [Citation Graph (, )][DBLP]


  132. Price Negotiation Systems for M-commerce. [Citation Graph (, )][DBLP]


  133. Tracing Stateful Pirate Decoders. [Citation Graph (, )][DBLP]


  134. A Lightweight Fast Handover Authentication Scheme in Mobile Networks. [Citation Graph (, )][DBLP]


  135. Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  136. Adaptive and Composable Oblivious Transfer Protocols (Short Paper). [Citation Graph (, )][DBLP]


  137. Efficient Vote Validity Check in Homomorphic Electronic Voting. [Citation Graph (, )][DBLP]


  138. Evaluating Ouda's Tamper-Localization Watermarking Scheme. [Citation Graph (, )][DBLP]


  139. Optimizing the capacity of distortion-freewatermarking on palette images. [Citation Graph (, )][DBLP]


  140. Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. [Citation Graph (, )][DBLP]


  141. Private Query on Encrypted Data in Multi-user Settings. [Citation Graph (, )][DBLP]


  142. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. [Citation Graph (, )][DBLP]


  143. An Efficient PIR Construction Using Trusted Hardware. [Citation Graph (, )][DBLP]


  144. Private handshakes with optional accountability. [Citation Graph (, )][DBLP]


  145. Improving a Digital Rights Management Scheme for Video Broadcast. [Citation Graph (, )][DBLP]


  146. A Reversible Data Hiding Scheme for JPEG Images. [Citation Graph (, )][DBLP]


  147. Security Remarks on a Convertible Nominative Signature Scheme. [Citation Graph (, )][DBLP]


  148. Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. [Citation Graph (, )][DBLP]


  149. Efficient and Practical Fair Exchange Protocols with Off-Line TTP. [Citation Graph (, )][DBLP]


  150. Private Searching on MapReduce. [Citation Graph (, )][DBLP]


  151. Efficiency Improvement of Homomorphic E-Auction. [Citation Graph (, )][DBLP]


  152. Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. [Citation Graph (, )][DBLP]


  153. Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. [Citation Graph (, )][DBLP]


  154. Self-enforcing Private Inference Control. [Citation Graph (, )][DBLP]


  155. Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. [Citation Graph (, )][DBLP]


  156. A Design of Secure Preferential E-Voting. [Citation Graph (, )][DBLP]


  157. Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. [Citation Graph (, )][DBLP]


  158. Batch Range Proof for Practical Small Ranges. [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.755secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002