Feng Bao
Feng Bao
Verified email at huawei.com
Title
Cited by
Cited by
Year
Efficient and practical fair exchange protocols with off-line TTP
F Bao, RH Deng, W Mao
Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998
4341998
Anonymous secure routing in mobile ad-hoc networks
B Zhu, Z Wan, MS Kankanhalli, F Bao, RH Deng
29th annual IEEE international conference on local computer networks, 102-108, 2004
3102004
Variations of diffie-hellman problem
F Bao, RH Deng, H Zhu
International conference on information and communications security, 301-312, 2003
3092003
A signcryption scheme with signature directly verifiable by public key
F Bao, RH Deng
International Workshop on Public Key Cryptography, 55-59, 1998
2951998
Private query on encrypted data in multi-user settings
F Bao, RH Deng, X Ding, Y Yang
International Conference on Information Security Practice and Experience, 71-85, 2008
2412008
Trust management for SOA-based IoT and its application to service composition
R Chen, J Guo, F Bao
IEEE Transactions on Services Computing 9 (3), 482-495, 2014
2242014
High-yield seedless synthesis of triangular gold nanoplates through oxidative etching
L Chen, F Ji, Y Xu, L He, Y Mi, F Bao, B Sun, X Zhang, Q Zhang
Nano letters 14 (12), 7201-7206, 2014
2082014
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults
F Bao, RH Deng, Y Han, A Jeng, AD Narasimhalu, T Ngair
International Workshop on Security Protocols, 115-124, 1997
1921997
Designated verifier signature schemes: attacks, new security notions and a new construction
H Lipmaa, G Wang, F Bao
International Colloquium on Automata, Languages, and Programming, 459-471, 2005
1612005
Highly reliable trust establishment scheme in ad hoc networks
K Ren, T Li, Z Wan, F Bao, RH Deng, K Kim
Computer Networks 45 (6), 687-699, 2004
1412004
Security analysis of some proxy signatures
G Wang, F Bao, J Zhou, RH Deng
International Conference on Information Security and Cryptology, 305-319, 2003
1252003
Facile, large-quantity synthesis of stable, tunable-color silicon nanoparticles and their application for long-term cellular imaging
Y Zhong, X Sun, S Wang, F Peng, F Bao, Y Su, Y Li, ST Lee, Y He
ACS nano 9 (6), 5958-5967, 2015
1232015
Some remarks on a fair exchange protocol
J Zhou, R Deng, F Bao
International Workshop on Public Key Cryptography, 46-57, 2000
1192000
Detecting node replication attacks in wireless sensor networks: a survey
WT Zhu, J Zhou, RH Deng, F Bao
Journal of Network and Computer Applications 35 (3), 1022-1034, 2012
1132012
Evolution of fair non-repudiation with TTP
J Zhou, R Deng, F Bao
Australasian Conference on Information Security and Privacy, 258-269, 1999
1091999
Efficient conditional proxy re-encryption with chosen-ciphertext security
J Weng, Y Yang, Q Tang, RH Deng, F Bao
International Conference on Information Security, 151-166, 2009
1022009
A practical password-based two-server authentication and key exchange system
Y Yang, RH Deng, F Bao
IEEE Transactions on Dependable and Secure Computing 3 (2), 105-114, 2006
1012006
Building-damage detection using pre-and post-seismic high-resolution satellite stereo imagery: A case study of the May 2008 Wenchuan earthquake
X Tong, Z Hong, S Liu, X Zhang, H Xie, Z Li, S Yang, W Wang, F Bao
ISPRS Journal of Photogrammetry and Remote Sensing 68, 13-27, 2012
972012
Private information retrieval using trusted hardware
S Wang, X Ding, RH Deng, F Bao
European Symposium on Research in Computer Security, 49-64, 2006
902006
New efficient user identification and key distribution scheme providing enhanced security
Y Yang, S Wang, F Bao, J Wang, RH Deng
Computers & Security 23 (8), 697-704, 2004
902004
The system can't perform the operation now. Try again later.
Articles 1–20