Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Feng
    Last name: Bao
    DBLP: 46/1953
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 234  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai.
    Collaborative agglomerative document clustering with limited information disclosure.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Naoki Tanaka, Marianne Winslett, Adam J. Lee, David K. Y. Yau, Feng Bao.
    Insured access: an approach to ad-hoc information sharing for virtual organizations.
    Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013 2013 (0) 2013
    Conference paper
    Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou.
    Launching Generic Attacks on iOS with Approved Third-Party Applications.
    Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Yunjie Liu, Feng Bao, Zongmin Li, Hua Li.
    3D model retrieval based on 3D fractional fourier transform.
    Int. Arab J. Inf. Technol. 2013, Volume 10 (0) 2013
    Conference paper
    Feng Deng, Changchun Bao, Feng Bao.
    A speech enhancement method by coupling speech detection and spectral amplitude estimation.
    INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association, Lyon, France, August 25-29, 2013 2013 (0) 2013
    Conference paper
    Na Li, Changchun Bao, Bingyin Xia, Feng Bao.
    Speech Intelligibility Improvement Using the Constraints on Speech Distortion and Noise Over-estimation.
    Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2013, Beijing, China, October 16-18, 2013 2013 (0) 2013
    Conference paper
    Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao.
    Detecting node replication attacks in wireless sensor networks: A survey.
    J. Network and Computer Applications 2012, Volume 35 (0) 2012
    Conference paper
    Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao.
    Detecting node replication attacks in mobile sensor networks: theory and approaches.
    Security and Communication Networks 2012, Volume 5 (0) 2012
    Journal article
    Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao.
    Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
    Security and Communication Networks 2011, Volume 4 (0) 2011
    Journal article
    Kun Peng, Ed Dawson, Feng Bao.
    Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Conference paper
    Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao.
    Hierarchical Identity-Based Chameleon Hash and Its Applications.
    Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao.
    Secure localization with attack detection in wireless sensor networks.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Conference paper
    Feng Bao, Fengzhi Zhao.
    Study on the E-government Call Center System Based on SOA.
    Computer and Information Science 2011, Volume 4 (0) 2011
    Conference paper
    Joseph K. Liu, Feng Bao, Jianying Zhou.
    Short and Efficient Certificate-Based Signature.
    NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011, Revised Selected Papers 2011 (0) 2011
    Conference paper
    Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao.
    Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.
    Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Kun Peng, Feng Bao.
    Analysing a Batch Range Proof to Address a Security Concern.
    14th IEEE International Conference on Computational Science and Engineering, CSE 2011, Dalian, China, August 24-26, 2011 2011 (0) 2011
    Conference paper
    Joseph K. Liu, Feng Bao, Jianying Zhou.
    Short and Efficient Certificate-Based Signature.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Journal article
    Huaqun Guo, Yongdong Wu, Feng Bao, Hongmei Chen, Maode Ma.
    UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications.
    IEEE Trans. Smart Grid 2011, Volume 2 (0) 2011
    Conference paper
    Xin Liu, Changchun Bao, Liyan Zhang, Xingtao Zhang, Feng Bao, Bing Bu.
    Nonlinear bandwidth extension of audio signals based on hidden Markov model.
    2011 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2011, Bilbao, Spain, December 14-17, 2011 2011 (0) 2011
    Conference paper
    Kun Zhang, Hong Zhang, Yongdong Wu, Feng Bao.
    Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis.
    Proceedings of the 17th IEEE International Conference on Networks, ICON 2011, Singapore, December 14-16, 2011 2011 (0) 2011
    Conference paper
    Kun Peng, Feng Bao.
    Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property.
    10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010 2010 (0) 2010
    Conference paper
    Yanjiang Yang, Feng Bao.
    Enabling Use of Single Password over Multiple Servers in Two-Server Model.
    10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010 2010 (0) 2010
    Conference paper
    Kun Peng, Feng Bao.
    A Secure RFID Ticket System for Public Transport.
    Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Huafei Zhu, Feng Bao.
    Private Searching on MapReduce.
    Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Kun Peng, Feng Bao.
    Efficiency Improvement of Homomorphic E-Auction.
    Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Qiming Li, Yongdong Wu, Feng Bao.
    A Reversible Data Hiding Scheme for JPEG Images.
    Advances in Multimedia Information Processing - PCM 2010 - 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 21-24, 2010, Proceedings, Part I 2010 (0) 2010
    Conference paper
    Kun Peng, Feng Bao.
    Formal and Precise Analysis of Soundness of Several Shuffling Schemes.
    Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings 2010 (0) 2010
    Journal article
    Wen-Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao.
    Time-Bound Hierarchical Key Assignment: An Overview.
    IEICE Transactions 2010, Volume 93 (0) 2010
    Conference paper
    Kun Peng, Feng Bao.
    An Efficient Range Proof Scheme.
    Proceedings of the 2010 IEEE Second International Conference on Social Computing, SocialCom / IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2010, Minneapolis, Minnesota, USA, August 20-22, 2010 2010 (0) 2010
    Conference paper
    Yanjiang Yang, Jianying Zhou, Jun Wen Wong, Feng Bao.
    Towards practical anonymous password authentication.
    Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010 2010 (0) 2010
    Conference paper
    Kun Peng, Feng Bao.
    Vulnerability of a Non-membership Proof Scheme.
    SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2010 (0) 2010
    Conference paper
    Kun Peng, Feng Bao.
    Efficient Multiplicative Homomorphic E-Voting.
    Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers 2011 (0) 2010
    Conference paper
    Yanjiang Yang, Yingjiu Li, Robert H. Deng, Feng Bao.
    Shifting Inference Control to User Side: Architecture and Protocol.
    IEEE Trans. Dependable Sec. Comput. 2010, Volume 7 (0) 2010
    Conference paper
    Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao.
    CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
    Science in China Series F: Information Sciences 2010, Volume 53 (0) 2010
    Conference paper
    Huafei Zhu, Feng Bao.
    Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity.
    Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers 2011 (0) 2010
    Conference paper
    Kun Peng, Feng Bao.
    Efficient Proof of Validity of Votes in Homomorphic E-Voting.
    Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010 2010 (0) 2010
    Conference paper
    Yongdong Wu, Zhigang Zhao, Ying Qiu, Feng Bao.
    Blocking Foxy Phishing Emails with Historical Information.
    Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010 2010 (0) 2010
    Journal article
    Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao.
    CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    Liang Gu, Yao Guo, Yanjiang Yang, Feng Bao, Hong Mei.
    Modeling TCG-Based Secure Systems with Colored Petri Nets.
    Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers 2011 (0) 2010
    Conference paper
    Yanjiang Yang, Liang Gu, Feng Bao.
    Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing.
    Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers 2011 (0) 2010
    Conference paper
    Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng.
    Practical ID-based Encryption for Wireless Sensor Network.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng.
    Practical ID-based encryption for wireless sensor network.
    Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010 2010 (0) 2010
    Conference paper
    Kun Peng, Feng Bao.
    Batch Range Proof for Practical Small Ranges.
    Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Yanjiang Yang, Feng Bao, Jian Weng.
    Private handshakes with optional accountability.
    The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings 2009 (0) 2009
    Conference paper
    Kun Peng, Feng Bao.
    Practicalization of a Range Test and Its Application to E-Auction.
    Public Key Infrastructures, Services and Applications - 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai.
    Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
    IEICE Transactions 2009, Volume 92 (0) 2009
    Conference paper
    Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao.
    Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
    Security and Privacy in Communication Networks - 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers 2009 (0) 2009
    Conference paper
    Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao.
    A New Approach for Anonymous Password Authentication.
    Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, 7-11 December 2009 2009 (0) 2009
    Conference paper
    Huafei Zhu, Feng Bao.
    Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems.
    Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao.
    Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security.
    Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Yongdong Wu, Feng Bao.
    Improving a Digital Rights Management Scheme for Video Broadcast.
    Advances in Multimedia Information Processing - PCM 2009, 10th Pacific Rim Conference on Multimedia, Bangkok, Thailand, December 15-18, 2009 Proceedings 2009 (0) 2009
    Conference paper
    Kun Peng, Feng Bao.
    Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy.
    Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers 2009 (0) 2009
    Conference paper
    Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao.
    Self-enforcing Private Inference Control.
    Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Kun Peng, Feng Bao.
    A Design of Secure Preferential E-Voting.
    E-Voting and Identity, Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Huafei Zhu, Feng Bao.
    Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions.
    Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai.
    Security and Correctness Analysis on Privacy-Preserving
    IEICE Transactions 2009, Volume 92 (0) 2009
    Conference paper
    Yanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng.
    Multiuser private queries over encrypted databases.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao.
    Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks.
    Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Huafei Zhu, Feng Bao.
    Adaptive and Composable Oblivious Transfer Protocols (Short Paper).
    Information and Communications Security, 11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Yanjiang Yang, Robert H. Deng, Feng Bao.
    Privacy-preserving rental services using one-show anonymous credentials.
    Security and Communication Networks 2009, Volume 2 (0) 2009
    Conference paper
    Yongdong Wu, Feng Bao, Ying Qiu.
    Tracing Stateful Pirate Decoders.
    Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009 2009 (0) 2009
    Conference paper
    Ying Qiu, Feng Bao, Yongdong Wu, Yanjiang Yang.
    A Lightweight Fast Handover Authentication Scheme in Mobile Networks.
    Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009 2009 (0) 2009
    Journal article
    Fengzhi Zhao, Feng Bao.
    Application of Image Recognition Technology in Sports Competition.
    Computer and Information Science 2008, Volume 1 (0) 2008
    Journal article
    Kun Peng, Feng Bao, Ed Dawson.
    Correct, Private, Flexible and Efficient Range Test.
    Journal of Research and Practice in Information Technology 2008, Volume 40 (0) 2008
    Conference paper
    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai.
    A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
    Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain 2008 (0) 2008
    Conference paper
    Joonsang Baek, Jianying Zhou, Feng Bao.
    Generic Constructions of Stateful Public Key Encryption and Their Applications.
    Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Kun Peng, Feng Bao.
    Batch ZK Proof and Verification of OR Logic.
    Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers 2009 (0) 2008
    Conference paper
    Kun Peng, Feng Bao.
    Correction, Optimisation and Secure and Efficient Application of PBD Shuffling.
    Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers 2009 (0) 2008
    Conference paper
    Yanjiang Yang, Feng Bao, Robert H. Deng.
    Efficient Client-to-Client Password Authenticated Key Exchange.
    2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops 2008 (0) 2008
    Conference paper
    Huafei Zhu, Feng Bao, Robert H. Deng.
    Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks.
    Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008 2008 (0) 2008
    Conference paper
    Kun Peng, Feng Bao.
    Efficient Vote Validity Check in Homomorphic Electronic Voting.
    Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers 2009 (0) 2008
    Conference paper
    Yongdong Wu, Qiming Li, Feng Bao.
    Optimizing the capacity of distortion-freewatermarking on palette images.
    Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, ICME 2008, June 23-26 2008, Hannover, Germany 2008 (0) 2008
    Conference paper
    Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang.
    Private Query on Encrypted Data in Multi-user Settings.
    Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao.
    An Efficient PIR Construction Using Trusted Hardware.
    Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Yongdong Wu, Haixia Yao, Feng Bao.
    Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators.
    Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy 2008 (0) 2008
    Conference paper
    Huafei Zhu, Feng Bao.
    Quantifying Trust Metrics of Recommendation Systems in Ad-Hoc Networks.
    IEEE Wireless Communications and Networking Conference, WCNC 2007, Hong Kong, China, 11-15 March, 2007 2007 (0) 2007
    Conference paper
    Huafei Zhu, Feng Bao.
    Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability.
    IEEE Wireless Communications and Networking Conference, WCNC 2007, Hong Kong, China, 11-15 March, 2007 2007 (0) 2007
    Conference paper
    Huafei Zhu, Ying Qiu, Feng Bao.
    Securing Mobile Auctions in the Presence of Malicious Adversaries.
    Proceedings of the IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2007, 3-7 September 2007, Athens, Greece 2007 (0) 2007
    Conference paper
    Huafei Zhu, Feng Bao.
    Computing of Trust in Complex Environments.
    Proceedings of the IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2007, 3-7 September 2007, Athens, Greece 2007 (0) 2007
    Conference paper
    Huafei Zhu, Ying Qiu, Feng Bao.
    Or-protocols for Anonymous Membership Proofs in Ad-hoc Networks.
    Proceedings of the IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2007, 3-7 September 2007, Athens, Greece 2007 (0) 2007
    Conference paper
    Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel.
    null
    Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings 2008 (0) 2007
    Conference paper
    Yongdong Wu, Feng Bao, Robert H. Deng.
    Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.
    Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai.
    Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation.
    21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada 2007 (0) 2007
    Conference paper
    Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau.
    Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM.
    Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers 2008 (0) 2007
    Conference paper
    Huafei Zhu, Feng Bao.
    Oblivious Keyword Search Protocols in the Public Database Model.
    Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, 24-28 June 2007 2007 (0) 2007
    Conference paper
    Huafei Zhu, Feng Bao.
    Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce.
    Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, 24-28 June 2007 2007 (0) 2007
    Conference paper
    Huafei Zhu, Feng Bao, A. Lakshminarayanan.
    Price Negotiation Systems for M-commerce.
    Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, 24-28 June 2007 2007 (0) 2007
    Conference paper
    Ying Qiu, Feng Bao, Jianying Zhou.
    Firewall for Dynamic IP Address in Mobile IPv6.
    Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings 2008 (0) 2007
    Conference paper
    Yongdong Wu, Bo Qiu, Feng Bao.
    Evaluating Ouda's Tamper-Localization Watermarking Scheme.
    Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China 2007 (0) 2007
    Conference paper
    Yanjiang Yang, Robert H. Deng, Feng Bao.
    Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers.
    Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai.
    Two-Party Privacy-Preserving Agglomerative Document Clustering.
    Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao.
    On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
    Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Guilin Wang, Feng Bao.
    Security Remarks on a Convertible Nominative Signature Scheme.
    New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa 2007 (0) 2007
    Conference paper
    Feng Bao, Robert H. Deng.
    Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks.
    Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007 2007 (0) 2007
    Conference paper
    Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda.
    Access control protocols with two-layer architecture for wireless networks.
    Computer Networks 2007, Volume 51 (0) 2007
    Conference paper
    Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao.
    Private Information Retrieval Using Trusted Hardware.
    IACR Cryptology ePrint Archive 2006, Volume 2006 (0) 2006
    Conference paper
    Guilin Wang, Feng Bao, Jianying Zhou.
    The Fairness of Perfect Concurrent Signatures.
    IACR Cryptology ePrint Archive 2006, Volume 2006 (0) 2006
    Conference paper
    Zhiguo Wan, Bo Zhu, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda.
    Efficient key tree construction for group key agreement in ad hoc networks.
    IEEE Wireless Communications and Networking Conference, WCNC 2006, 3-6 April 2006, Las Vegas, Nevada, USA 2006 (0) 2006
    Conference paper
    Huafei Zhu, Chunxiao Chigan, Feng Bao.
    Turing assessor: a new tool for cyber security quantification.
    IEEE Wireless Communications and Networking Conference, WCNC 2006, 3-6 April 2006, Las Vegas, Nevada, USA 2006 (0) 2006
    Conference paper
    Huafei Zhu, Feng Bao, Chunxiao Chigan.
    Compact routing discovery protocol with lower communication complexity.
    IEEE Wireless Communications and Networking Conference, WCNC 2006, 3-6 April 2006, Las Vegas, Nevada, USA 2006 (0) 2006
    Show item 1 to 100 of 234  

    Your query returned 234 matches in the database.