Patrick McCorry Dr Maryam Mehrnezhad Dr Ehsan Toreini Professor Feng Hao
| On Secure E-Voting over Blockchain | 2021 |
|
Professor Feng Hao Dr Samiran Bag Dr Maryam Mehrnezhad Dr Ehsan Toreini Dr Roberto Metere et al. | End-to-End Verified E-Voting Trial for Polling Station Voting | 2020 |
|
Dr Samiran Bag Professor Feng Hao
| privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecoms Spam | 2020 |
|
Mohammed Ali Dr Muhammad Ajmal Azad Mario Parreño Centeno Professor Feng Hao Professor Aad van Moorsel et al. | Consumer-facing technology fraud: Economics, attack methods and potential solutions | 2019 |
|
Dr Ehsan Toreini Dr Maryam Mehrnezhad Professor Feng Hao
| DOMtegrity: ensuring web page integrity against malicious browser extensions | 2019 |
|
Dr Samiran Bag Dr Muhammad Azad Professor Feng Hao
| A Privacy-aware Decentralized and Personalized Reputation System | 2018 |
|
Professor Feng Hao Roberto Metere Dr Changyu Dong
| Analysing and Patching SPEKE in ISO/IEC | 2018 |
|
Raffaello Perrotta Professor Feng Hao
| Botnet in the browser: Understanding threats caused by malicious browser extensions | 2018 |
|
Professor Feng Hao
| Cryptanalyzing An Image Encryption Algorithm Based on Autoblocking and Electrocardiography | 2018 |
|
Dr Muhammad Azad Dr Samiran Bag Professor Feng Hao
| M2M-REP: Reputation System for Machines in the Internet of Things | 2018 |
|
Dr Muhammad Azad Dr Samiran Bag Professor Feng Hao
| PrivBox: Verifiable decentralized reputation system for online marketplaces | 2018 |
|
Dr Maryam Mehrnezhad Ehsan Toreini Professor Feng Hao
| Stealing PINs via mobile sensors: actual risk versus user perception | 2018 |
|
Professor Feng Hao Dr Dylan Clarke Professor Brian Randell
| Verifiable Classroom Voting in Practice | 2018 |
|
Dr Taha Ali Patrick Mccorry Dr Peter Lee Professor Feng Hao
| ZombieCoin 2.0: managing next-generation botnets using Bitcoin | 2018 |
|
Patrick McCorry Professor Feng Hao
| A smart contract for boardroom voting with maximum voter privacy | 2017 |
|
Patrick Mccorry Professor Feng Hao
| Refund Attacks on Bitcoin’s Payment Protocol | 2017 |
|
Ehsan Toreini Professor Feng Hao
| Texture to the rescue: Practical paper fingerprinting based on texture patterns | 2017 |
|
Maryam Mehrnezhad Ehsan Toreini Dr Siamak Fayyaz Shahandashti Professor Feng Hao
| TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript | 2016 |
|
Professor Feng Hao Dr Dylan Clarke Dr Avelino Zorzo
| Deleting Secret Data with Public Verifiability | 2016 |
|
Professor Feng Hao
| DRE-i and self-enforcing e-voting | 2016 |
|
Dr Siamak Fayyaz Shahandashti Professor Feng Hao
| DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities | 2016 |
|
Professor Feng Hao
| Editorial of special issue on security and privacy in cloud computing | 2016 |
|
Professor Feng Hao
| ID2S Password-Authenticated Key Exchange Protocols | 2016 |
|
Dr Maryam Mehrnezhad Mohammed Ali Professor Feng Hao Professor Aad van Moorsel
| NFC Payment Spy: A Privacy Attack on Contactless Payments | 2016 |
|
Professor Feng Hao Professor Peter Ryan
| Preface | 2016 |
|
Professor Feng Hao Professor Peter Ryan
| Real-World Electronic Voting: Design, Analysis and Deployment | 2016 |
|
Patrick Mccorry Professor Feng Hao
| Towards Bitcoin Payment Networks | 2016 |
|
Dr Ehsan Toreini Professor Brian Randell Professor Feng Hao
| An Acoustic Side Channel Attack on Enigma | 2015 |
|
Patrick McCorry Dr Siamak Fayyaz Shahandashti Dr Dylan Clarke Professor Feng Hao
| Authenticated Key Exchange over Bitcoin | 2015 |
|
Patrick McCorry Dr Siamak Fayyaz Shahandashti Dr Dylan Clarke Professor Feng Hao
| Authenticated Key Exchange over Bitcoin | 2015 |
|
Dr Dylan Clarke Ehsan Toreini Professor Feng Hao
| Determining User Passwords From Partial Information | 2015 |
|
Professor Feng Hao
| On the Trust of Trusted Computing in the Post-Snowden Age | 2015 |
|
Professor Feng Hao
| Practical Threshold Password-Authenticated Secret Sharing Protocol | 2015 |
|
Professor Feng Hao
| Practical Threshold Password-Authenticated Secret Sharing Protocol | 2015 |
|
Dr Maryam Mehrnezhad Professor Feng Hao Dr Siamak Fayyaz Shahandashti
| Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment | 2015 |
|
Maryam Mehrnezhad Professor Feng Hao Dr Siamak Fayyaz Shahandashti
| Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment | 2015 |
|
Professor Feng Hao Dr Siamak Fayyaz Shahandashti
| The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group | 2015 |
|
Maryam Mehrnezhad Ehsan Toreini Dr Siamak Fayyaz Shahandashti Professor Feng Hao
| TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript | 2015 |
|
Dr Taha Ali Patrick McCorry Professor Feng Hao
| ZombieCoin: Powering Next-Generation Botnets with Bitcoin | 2015 |
|
Dr Taha Ali Patrick McCorry Dr Peter Lee Professor Feng Hao
| ZombieCoin: Powering Next-Generation Botnets with Bitcoin | 2015 |
|
Dr Dylan Clarke Professor Feng Hao
| Cryptanalysis of the Dragonfly key exchange protocol | 2014 |
|
Professor Feng Hao Professor Brian Randell Dr Dylan Clarke Dr Siamak Fayyaz Shahandashti Dr Peter Lee et al. | Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting | 2014 |
|
Professor Feng Hao Professor Brian Randell Dr Dylan Clarke Dr Peter Lee
| Every vote counts: Ensuring integrity in large-scale electronic voting | 2014 |
|
Professor Feng Hao
| ID-Based Two-Server Password-Authenticated Key Exchange | 2014 |
|
Professor Feng Hao
| On robust key agreement based on public key authentication | 2014 |
|
Dr Matthew Forshaw Professor Feng Hao Ehsan Toreini
| On the Privacy of Private Browsing - A Forensic Approach | 2014 |
|
Dr Matthew Forshaw Professor Feng Hao Ehsan Toreini
| On the privacy of private browsing - A forensic approach | 2014 |
|
Dr Matthew Forshaw Professor Feng Hao Dr Ehsan Toreini
| On The Privacy Of Private Browsing - A Forensic Approach (short paper) | 2014 |
|
Maryam Mehrnezhad Professor Feng Hao Dr Siamak Fayyaz Shahandashti
| Tap-Tap and Pay (TTP): Preventing Man-In-The-Middle Attacks in NFC Payment Using Mobile Sensors | 2014 |
|
Professor Feng Hao Dr Siamak Fayyaz Shahandashti
| The SPEKE Protocol Revisited | 2014 |
|
Professor Feng Hao Dr Siamak Fayyaz Shahandashti
| The SPEKE Protocol Revisited | 2014 |
|
Professor Feng Hao Dr Siamak Fayyaz Shahandashti
| The SPEKE Protocol Revisited | 2014 |
|
Professor Feng Hao
| The SPEKE protocol revisited | 2014 |
|
Dr Dylan Clarke Professor Feng Hao
| Cryptanalysis of the Dragonfly Key Exchange Protocol | 2013 |
|
Dr Matthew Forshaw Professor Feng Hao Ehsan Toreini
| On the Privacy of Private Browsing - A Forensic Approach | 2013 |
|
Professor Feng Hao Dr Dylan Clarke
| Verifiable Classroom Voting: Where Cryptography Meets Pedagogy | 2013 |
|
Professor Feng Hao
| Verifiable classroom voting: Where cryptography meets pedagogy | 2013 |
|
Professor Feng Hao Dr Dylan Clarke Dr Carlton Shepherd
| Verifiable classroom voting: Where cryptography meets pedagogy | 2013 |
|
Professor Feng Hao Dr Dylan Clarke
| How to Delete a Secret | 2012 |
|
Professor Feng Hao Dr Dylan Clarke
| Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol | 2012 |
|
Professor Feng Hao Professor Brian Randell Dr Dylan Clarke
| Self-Enforcing Electronic Voting | 2012 |
|
Professor Feng Hao Professor Brian Randell Dr Dylan Clarke
| Self-Enforcing Electronic Voting | 2012 |
|
Professor Feng Hao
| Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting | 2011 |
|
Professor Feng Hao Professor Peter Ryan
| How to Sync with Alice | 2011 |
|
Professor Feng Hao Professor Peter Ryan
| How to Sync with Alice | 2011 |
|
Professor Feng Hao
| How to Sync with Alice (Transcript of Discussion) | 2011 |
|
Professor Feng Hao
| On Robust Key Agreement Based on Public Key Authentication | 2011 |
|
Professor Feng Hao Professor Peter Ryan
| Anonymous voting by two-round public discussion | 2010 |
|
Professor Feng Hao Professor Peter Ryan
| J-PAKE: Authenticated Key Exchange Without PKI | 2010 |
|
Professor Feng Hao
| On robust key agreement based on public key authentication (short paper) | 2010 |
|
Professor Feng Hao
| On Small Subgroup Non-confinement Attack | 2010 |
|
Professor Feng Hao
| A 2-Round Anonymous Veto Protocol | 2009 |
|
Professor Feng Hao
| A 2-Round Anonymous Veto Protocol (Transcript of Discussion) | 2009 |
|
Professor Feng Hao
| The Power of Anonymous Veto in Public Discussion | 2009 |
|
Professor Feng Hao
| A Fast Search Algorithm for a Large Fuzzy Database | 2008 |
|
Professor Feng Hao Professor Peter Ryan
| Password Authenticated Key Exchange by Juggling | 2008 |
|
Professor Feng Hao
| Combining Crypto with Biometrics Effectively | 2006 |
|
Professor Feng Hao
| Kish's key exchange scheme is insecure | 2006 |
|
Professor Feng Hao
| Online signature verification using a new extreme points warping technique | 2003 |
|
Professor Feng Hao
| Private Key Generation from On-line Handwritten Signatures | 2002 |
|