Toggle Main Menu Toggle Search

Open Access padlockePrints

Browsing publications by Professor Feng Hao.

Newcastle AuthorsTitleYearFull text
Patrick McCorry
Dr Maryam Mehrnezhad
Dr Ehsan Toreini
Professor Feng Hao
On Secure E-Voting over Blockchain2021
Professor Feng Hao
Dr Samiran Bag
Dr Maryam Mehrnezhad
Dr Ehsan Toreini
Dr Roberto Metere
et al.
End-to-End Verified E-Voting Trial for Polling Station Voting2020
Dr Samiran Bag
Professor Feng Hao
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecoms Spam2020
Mohammed Ali
Dr Muhammad Ajmal Azad
Mario Parreño Centeno
Professor Feng Hao
Professor Aad van Moorsel
et al.
Consumer-facing technology fraud: Economics, attack methods and potential solutions2019
Dr Ehsan Toreini
Dr Maryam Mehrnezhad
Professor Feng Hao
DOMtegrity: ensuring web page integrity against malicious browser extensions2019
Dr Samiran Bag
Dr Muhammad Azad
Professor Feng Hao
A Privacy-aware Decentralized and Personalized Reputation System2018
Professor Feng Hao
Roberto Metere
Dr Changyu Dong
Analysing and Patching SPEKE in ISO/IEC2018
Raffaello Perrotta
Professor Feng Hao
Botnet in the browser: Understanding threats caused by malicious browser extensions2018
Professor Feng Hao
Cryptanalyzing An Image Encryption Algorithm Based on Autoblocking and Electrocardiography2018
Dr Muhammad Azad
Dr Samiran Bag
Professor Feng Hao
M2M-REP: Reputation System for Machines in the Internet of Things2018
Dr Muhammad Azad
Dr Samiran Bag
Professor Feng Hao
PrivBox: Verifiable decentralized reputation system for online marketplaces2018
Dr Maryam Mehrnezhad
Ehsan Toreini
Professor Feng Hao
Stealing PINs via mobile sensors: actual risk versus user perception2018
Professor Feng Hao
Dr Dylan Clarke
Professor Brian Randell
Verifiable Classroom Voting in Practice2018
Dr Taha Ali
Patrick Mccorry
Dr Peter Lee
Professor Feng Hao
ZombieCoin 2.0: managing next-generation botnets using Bitcoin2018
Patrick McCorry
Professor Feng Hao
A smart contract for boardroom voting with maximum voter privacy2017
Patrick Mccorry
Professor Feng Hao
Refund Attacks on Bitcoin’s Payment Protocol2017
Ehsan Toreini
Professor Feng Hao
Texture to the rescue: Practical paper fingerprinting based on texture patterns2017
Maryam Mehrnezhad
Ehsan Toreini
Dr Siamak Fayyaz Shahandashti
Professor Feng Hao
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript2016
Professor Feng Hao
Dr Dylan Clarke
Dr Avelino Zorzo
Deleting Secret Data with Public Verifiability2016
Professor Feng Hao
DRE-i and self-enforcing e-voting2016
Dr Siamak Fayyaz Shahandashti
Professor Feng Hao
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities2016
Professor Feng Hao
Editorial of special issue on security and privacy in cloud computing2016
Professor Feng Hao
ID2S Password-Authenticated Key Exchange Protocols2016
Dr Maryam Mehrnezhad
Mohammed Ali
Professor Feng Hao
Professor Aad van Moorsel
NFC Payment Spy: A Privacy Attack on Contactless Payments2016
Professor Feng Hao
Professor Peter Ryan
Preface2016
Professor Feng Hao
Professor Peter Ryan
Real-World Electronic Voting: Design, Analysis and Deployment2016
Patrick Mccorry
Professor Feng Hao
Towards Bitcoin Payment Networks2016
Dr Ehsan Toreini
Professor Brian Randell
Professor Feng Hao
An Acoustic Side Channel Attack on Enigma2015
Patrick McCorry
Dr Siamak Fayyaz Shahandashti
Dr Dylan Clarke
Professor Feng Hao
Authenticated Key Exchange over Bitcoin2015
Patrick McCorry
Dr Siamak Fayyaz Shahandashti
Dr Dylan Clarke
Professor Feng Hao
Authenticated Key Exchange over Bitcoin2015
Dr Dylan Clarke
Ehsan Toreini
Professor Feng Hao
Determining User Passwords From Partial Information2015
Professor Feng Hao
On the Trust of Trusted Computing in the Post-Snowden Age2015
Professor Feng Hao
Practical Threshold Password-Authenticated Secret Sharing Protocol2015
Professor Feng Hao
Practical Threshold Password-Authenticated Secret Sharing Protocol2015
Dr Maryam Mehrnezhad
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment2015
Maryam Mehrnezhad
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment2015
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group2015
Maryam Mehrnezhad
Ehsan Toreini
Dr Siamak Fayyaz Shahandashti
Professor Feng Hao
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript2015
Dr Taha Ali
Patrick McCorry
Professor Feng Hao
ZombieCoin: Powering Next-Generation Botnets with Bitcoin2015
Dr Taha Ali
Patrick McCorry
Dr Peter Lee
Professor Feng Hao
ZombieCoin: Powering Next-Generation Botnets with Bitcoin2015
Dr Dylan Clarke
Professor Feng Hao
Cryptanalysis of the Dragonfly key exchange protocol2014
Professor Feng Hao
Professor Brian Randell
Dr Dylan Clarke
Dr Siamak Fayyaz Shahandashti
Dr Peter Lee
et al.
Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting2014
Professor Feng Hao
Professor Brian Randell
Dr Dylan Clarke
Dr Peter Lee
Every vote counts: Ensuring integrity in large-scale electronic voting2014
Professor Feng Hao
ID-Based Two-Server Password-Authenticated Key Exchange2014
Professor Feng Hao
On robust key agreement based on public key authentication2014
Dr Matthew Forshaw
Professor Feng Hao
Ehsan Toreini
On the Privacy of Private Browsing - A Forensic Approach2014
Dr Matthew Forshaw
Professor Feng Hao
Ehsan Toreini
On the privacy of private browsing - A forensic approach2014
Dr Matthew Forshaw
Professor Feng Hao
Dr Ehsan Toreini
On The Privacy Of Private Browsing - A Forensic Approach (short paper)2014
Maryam Mehrnezhad
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
Tap-Tap and Pay (TTP): Preventing Man-In-The-Middle Attacks in NFC Payment Using Mobile Sensors2014
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
The SPEKE Protocol Revisited2014
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
The SPEKE Protocol Revisited2014
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
The SPEKE Protocol Revisited2014
Professor Feng Hao
The SPEKE protocol revisited2014
Dr Dylan Clarke
Professor Feng Hao
Cryptanalysis of the Dragonfly Key Exchange Protocol2013
Dr Matthew Forshaw
Professor Feng Hao
Ehsan Toreini
On the Privacy of Private Browsing - A Forensic Approach2013
Professor Feng Hao
Dr Dylan Clarke
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy2013
Professor Feng Hao
Verifiable classroom voting: Where cryptography meets pedagogy2013
Professor Feng Hao
Dr Dylan Clarke
Dr Carlton Shepherd
Verifiable classroom voting: Where cryptography meets pedagogy2013
Professor Feng Hao
Dr Dylan Clarke
How to Delete a Secret2012
Professor Feng Hao
Dr Dylan Clarke
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol2012
Professor Feng Hao
Professor Brian Randell
Dr Dylan Clarke
Self-Enforcing Electronic Voting2012
Professor Feng Hao
Professor Brian Randell
Dr Dylan Clarke
Self-Enforcing Electronic Voting2012
Professor Feng Hao
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting2011
Professor Feng Hao
Professor Peter Ryan
How to Sync with Alice2011
Professor Feng Hao
Professor Peter Ryan
How to Sync with Alice2011
Professor Feng Hao
How to Sync with Alice (Transcript of Discussion)2011
Professor Feng Hao
On Robust Key Agreement Based on Public Key Authentication2011
Professor Feng Hao
Professor Peter Ryan
Anonymous voting by two-round public discussion2010
Professor Feng Hao
Professor Peter Ryan
J-PAKE: Authenticated Key Exchange Without PKI2010
Professor Feng Hao
On robust key agreement based on public key authentication (short paper)2010
Professor Feng Hao
On Small Subgroup Non-confinement Attack2010
Professor Feng Hao
A 2-Round Anonymous Veto Protocol2009
Professor Feng Hao
A 2-Round Anonymous Veto Protocol (Transcript of Discussion)2009
Professor Feng Hao
The Power of Anonymous Veto in Public Discussion2009
Professor Feng Hao
A Fast Search Algorithm for a Large Fuzzy Database2008
Professor Feng Hao
Professor Peter Ryan
Password Authenticated Key Exchange by Juggling2008
Professor Feng Hao
Combining Crypto with Biometrics Effectively2006
Professor Feng Hao
Kish's key exchange scheme is insecure2006
Professor Feng Hao
Online signature verification using a new extreme points warping technique2003
Professor Feng Hao
Private Key Generation from On-line Handwritten Signatures2002