Feng Hao
Feng Hao
Reader in Security Engineering, Newcastle University
Verified email at ncl.ac.uk - Homepage
TitleCited byYear
Combining crypto with biometrics effectively
F Hao, R Anderson, J Daugman
IEEE transactions on computers 55 (9), 1081-1088, 2006
7222006
Private key generation from on-line handwritten signatures
H Feng, CC Wah
Information Management & Computer Security 10 (4), 159-164, 2002
2682002
Online signature verification using a new extreme points warping technique
H Feng, CC Wah
Pattern Recognition Letters 24 (16), 2943-2951, 2003
1442003
Combining cryptography with biometrics effectively
F Hao, R Anderson, J Daugman
University of Cambridge, Computer Laboratory, 2005
1132005
A fast search algorithm for a large fuzzy database
F Hao, J Daugman, P Zielinski
IEEE Transactions on Information Forensics and Security 3 (2), 203-212, 2008
1112008
J-PAKE: authenticated key exchange without PKI
F Hao, P Ryan
Transactions on computational science XI, 192-206, 2010
532010
Password authenticated key exchange by juggling
F Hao, PYA Ryan
International Workshop on Security Protocols, 159-171, 2008
512008
Anonymous voting by two-round public discussion
F Hao, PYA Ryan, P Zieliński
IET Information Security 4 (2), 62-67, 2010
492010
A 2-round anonymous veto protocol
F Hao, P Zieliński
International Workshop on Security Protocols, 202-211, 2006
492006
Kish's key exchange scheme is insecure
F Hao
IEE Proceedings-Information Security 153 (4), 141-142, 2006
402006
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
P McCorry, S F Shahandashti, F Hao
IACR Cryptology ePrint Archive, 110, 2017
302017
On the privacy of private browsing–a forensic approach
K Satvat, M Forshaw, F Hao, E Toreini
Data Privacy Management and Autonomous Spontaneous Security, 380-389, 2014
302014
On robust key agreement based on public key authentication
F Hao
International Conference on Financial Cryptography and Data Security, 383-390, 2010
292010
A fair and robust voting system by broadcast
D Khader, B Smyth, P Ryan, F Hao
Lecture Notes in Informatics (LNI), Proceedings-Series of the Gesellschaft …, 2012
252012
ID-Based group password-authenticated key exchange
X Yi, R Tso, E Okamoto
International Workshop on Security, 192-211, 2009
212009
Every vote counts: Ensuring integrity in large-scale electronic voting
F Hao, MN Kreeger, B Randell, D Clarke, SF Shahandashti, PHJ Lee
The USENIX Journal of Election Technology and Systems 1, 2014
192014
Security analysis of a multi-factor authenticated key exchange protocol
F Hao, D Clarke
International Conference on Applied Cryptography and Network Security, 1-11, 2012
192012
Touchsignatures: identification of user touch actions and pins based on mobile sensor data via javascript
M Mehrnezhad, E Toreini, SF Shahandashti, F Hao
Journal of Information Security and Applications 26, 23-38, 2016
162016
Stealing PINs via mobile sensors: actual risk versus user perception
M Mehrnezhad, E Toreini, S Shahandashti, F Hao
International Journal of Information Security, 1-23, 2017
152017
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception
M Mehrnezhad, E Toreini, S Shahandashti, F Hao
EuroUSEC 2016, 2016
152016
The system can't perform the operation now. Try again later.
Articles 1–20