Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Feng
    Last name: Bao
    DBLP: 46/1953
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 233  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai.
    Collaborative agglomerative document clustering with limited information disclosure.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Naoki Tanaka, Marianne Winslett, Adam J. Lee, David K. Y. Yau, Feng Bao.
    Insured access: an approach to ad-hoc information sharing for virtual organizations.
    Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013 2013 (0) 2013
    Conference paper
    Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou.
    Launching Generic Attacks on iOS with Approved Third-Party Applications.
    Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Yunjie Liu, Feng Bao, Zongmin Li, Hua Li.
    3D model retrieval based on 3D fractional fourier transform.
    Int. Arab J. Inf. Technol. 2013, Volume 10 (0) 2013
    Conference paper
    Feng Deng, Changchun Bao, Feng Bao.
    A speech enhancement method by coupling speech detection and spectral amplitude estimation.
    INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association, Lyon, France, August 25-29, 2013 2013 (0) 2013
    Conference paper
    Na Li, Changchun Bao, Bingyin Xia, Feng Bao.
    Speech Intelligibility Improvement Using the Constraints on Speech Distortion and Noise Over-estimation.
    Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2013, Beijing, China, October 16-18, 2013 2013 (0) 2013
    Conference paper
    Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao.
    Detecting node replication attacks in wireless sensor networks: A survey.
    J. Network and Computer Applications 2012, Volume 35 (0) 2012
    Conference paper
    Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao.
    Detecting node replication attacks in mobile sensor networks: theory and approaches.
    Security and Communication Networks 2012, Volume 5 (0) 2012
    Journal article
    Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao.
    Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
    Security and Communication Networks 2011, Volume 4 (0) 2011
    Journal article
    Kun Peng, Ed Dawson, Feng Bao.
    Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Conference paper
    Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao.
    Hierarchical Identity-Based Chameleon Hash and Its Applications.
    Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao.
    Secure localization with attack detection in wireless sensor networks.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Conference paper
    Feng Bao, Fengzhi Zhao.
    Study on the E-government Call Center System Based on SOA.
    Computer and Information Science 2011, Volume 4 (0) 2011
    Conference paper
    Joseph K. Liu, Feng Bao, Jianying Zhou.
    Short and Efficient Certificate-Based Signature.
    NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011, Revised Selected Papers 2011 (0) 2011
    Conference paper
    Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao.
    Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.
    Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Kun Peng, Feng Bao.
    Analysing a Batch Range Proof to Address a Security Concern.
    14th IEEE International Conference on Computational Science and Engineering, CSE 2011, Dalian, China, August 24-26, 2011 2011 (0) 2011
    Conference paper
    Joseph K. Liu, Feng Bao, Jianying Zhou.
    Short and Efficient Certificate-Based Signature.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Journal article
    Huaqun Guo, Yongdong Wu, Feng Bao, Hongmei Chen, Maode Ma.
    UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications.
    IEEE Trans. Smart Grid 2011, Volume 2 (0) 2011
    Conference paper
    Xin Liu, Changchun Bao, Liyan Zhang, Xingtao Zhang, Feng Bao, Bing Bu.
    Nonlinear bandwidth extension of audio signals based on hidden Markov model.
    2011 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2011, Bilbao, Spain, December 14-17, 2011 2011 (0) 2011
    Conference paper
    Kun Zhang, Hong Zhang, Yongdong Wu, Feng Bao.
    Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis.
    Proceedings of the 17th IEEE International Conference on Networks, ICON 2011, Singapore, December 14-16, 2011 2011 (0) 2011
    Conference paper
    Kun Peng, Feng Bao.
    Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property.
    10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010 2010 (0) 2010
    Conference paper
    Yanjiang Yang, Feng Bao.
    Enabling Use of Single Password over Multiple Servers in Two-Server Model.
    10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010 2010 (0) 2010
    Conference paper
    Kun Peng, Feng Bao.
    A Secure RFID Ticket System for Public Transport.
    Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Huafei Zhu, Feng Bao.
    Private Searching on MapReduce.
    Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Kun Peng, Feng Bao.
    Efficiency Improvement of Homomorphic E-Auction.
    Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings 2010 (0) 2010
    Show item 1 to 25 of 233  

    Your query returned 233 matches in the database.