A Fair and Robust Voting System by Broadcast

Feng Hao , Ben Smyth , Peter Y. A. Ryan , Dalia Khader
Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) 205 285 -299

37
2012
Sharing is Caring: A collaborative framework for sharing security alerts

Muhammad Ajmal Azad , Samiran Bag , Farhan Ahmad , Feng Hao
Computer Communications 165 75 -84

2021
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy

Feng Hao , Dylan Clarke , Carlton Shepherd
Security Protocols XXI 245 -254

6
2013
ECF-IDS: An Enhanced Cuckoo Filter-based Intrusion Detection System for In-vehicle Network

Sifan Li , Yue Cao , Hassan Jalil Hadi , Feng Hao
IEEE Transactions on Network Service and Management

2024
End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead

Feng Hao , Shen Wang , Samiran Bag , Rob Procter
IEEE Security & Privacy

8
2020
Owl: An augmented password-authenticated key exchange scheme

Feng Hao , Samiran Bag , Liqun Chen , Paul C van Oorschot
Financial Cryptography 2024 (Cryptology ePrint)

2024
Stealing PINs via mobile sensors: actual risk versus user perception

Maryam Mehrnezhad , Ehsan Toreini , Siamak Shahandashti , Feng Hao
International Journal of Information Security 1 -23

88
2017
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecoms Spam

Muhammad Ajmal , Samiran Bag , Shazia Tabassum , Feng Hao
IEEE Transactions on Emerging Topics in Computing

28
2017
Combining Crypto with Biometrics Effectively

Ross Anderson , Feng Hao
IEEE Sept-2005

2
2018
Security Analysis of Mobile Point-of-Sale Terminals

Mahshid Mehr Nezhad , Elliot Laidlaw , Feng Hao
Network and System Security. NSS 2023 13983

2023
A Probability-based Strong Physical Unclonable Function with Strong Machine Learning Immunity

Zezhong Tu , Yongkang Xue , Pengpeng Ren , Feng Hao
IEEE Electron Device Letters 43 ( 1) 138 -141

2021
End-to-End Verified E-Voting Trial for Polling Station Voting

Feng Hao , Shen Wang , Samiran Bag , Rob Procter
IEEE Security & Privacy

2020
Analysis of Issues and Challenges of E-Voting in the UK.

Dylan Clarke , Feng Hao , Brian Randell
Security Protocols Workshop 126 -135

2012
Private key generation from on-line handwritten signatures

Hao Feng , Chan Choong Wah
Information Management & Computer Security 10 ( 4) 159 -164

315
2002
Online signature verification using a new extreme points warping technique

Hao Feng , Chan Choong Wah
Pattern Recognition Letters 24 ( 16) 2943 -2951

179
2003
Combining crypto with biometrics effectively

Hao Feng , R Anderson , J Daugman
IEEE TRANSACTIONS ON COMPUTERS C 55 ( 9) 1081 -1088

28
2006
A Fast Search Algorithm for a Large Fuzzy Database

Feng Hao , J. Daugman , P. Zielinski
IEEE Transactions on Information Forensics and Security 3 ( 2) 203 -212

154
2008