Newcastle University
Toggle Main Menu
Toggle Search
Home
Browse
Latest
Policies
About
Home
Browse
Latest
Policies
About
ePrints
Browse by author
Browsing publications by
Professor Feng Hao.
Newcastle Authors
Title
Year
Full text
Patrick McCorry
Dr Maryam Mehrnezhad
Dr Ehsan Toreini
Professor Feng Hao
On Secure E-Voting over Blockchain
2021
Professor Feng Hao
Dr Samiran Bag
Dr Maryam Mehrnezhad
Dr Ehsan Toreini
Dr Roberto Metere
et al.
End-to-End Verified E-Voting Trial for Polling Station Voting
2020
Dr Samiran Bag
Professor Feng Hao
privy: Privacy Preserving Collaboration Across Multiple Service Providers to Combat Telecoms Spam
2020
Mohammed Ali
Dr Muhammad Ajmal Azad
Mario Parreño Centeno
Professor Feng Hao
Professor Aad van Moorsel
et al.
Consumer-facing technology fraud: Economics, attack methods and potential solutions
2019
Dr Ehsan Toreini
Dr Maryam Mehrnezhad
Professor Feng Hao
DOMtegrity: ensuring web page integrity against malicious browser extensions
2019
Dr Samiran Bag
Dr Muhammad Azad
Professor Feng Hao
A Privacy-aware Decentralized and Personalized Reputation System
2018
Professor Feng Hao
Roberto Metere
Dr Changyu Dong
Analysing and Patching SPEKE in ISO/IEC
2018
Raffaello Perrotta
Professor Feng Hao
Botnet in the browser: Understanding threats caused by malicious browser extensions
2018
Professor Feng Hao
Cryptanalyzing An Image Encryption Algorithm Based on Autoblocking and Electrocardiography
2018
Dr Muhammad Azad
Dr Samiran Bag
Professor Feng Hao
M2M-REP: Reputation System for Machines in the Internet of Things
2018
Dr Muhammad Azad
Dr Samiran Bag
Professor Feng Hao
PrivBox: Verifiable decentralized reputation system for online marketplaces
2018
Dr Maryam Mehrnezhad
Ehsan Toreini
Professor Feng Hao
Stealing PINs via mobile sensors: actual risk versus user perception
2018
Professor Feng Hao
Dr Dylan Clarke
Professor Brian Randell
Verifiable Classroom Voting in Practice
2018
Dr Taha Ali
Patrick Mccorry
Dr Peter Lee
Professor Feng Hao
ZombieCoin 2.0: managing next-generation botnets using Bitcoin
2018
Patrick McCorry
Professor Feng Hao
A smart contract for boardroom voting with maximum voter privacy
2017
Patrick Mccorry
Professor Feng Hao
Refund Attacks on Bitcoin’s Payment Protocol
2017
Ehsan Toreini
Professor Feng Hao
Texture to the rescue: Practical paper fingerprinting based on texture patterns
2017
Maryam Mehrnezhad
Ehsan Toreini
Dr Siamak Fayyaz Shahandashti
Professor Feng Hao
TouchSignatures
: Identification of user touch actions and PINs based on mobile sensor data via JavaScript
2016
Professor Feng Hao
Dr Dylan Clarke
Dr Avelino Zorzo
Deleting Secret Data with Public Verifiability
2016
Professor Feng Hao
DRE-i and self-enforcing e-voting
2016
Dr Siamak Fayyaz Shahandashti
Professor Feng Hao
DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities
2016
Professor Feng Hao
Editorial of special issue on security and privacy in cloud computing
2016
Professor Feng Hao
ID2S Password-Authenticated Key Exchange Protocols
2016
Dr Maryam Mehrnezhad
Mohammed Ali
Professor Feng Hao
Professor Aad van Moorsel
NFC Payment Spy: A Privacy Attack on Contactless Payments
2016
Professor Feng Hao
Professor Peter Ryan
Preface
2016
Professor Feng Hao
Professor Peter Ryan
Real-World Electronic Voting: Design, Analysis and Deployment
2016
Patrick Mccorry
Professor Feng Hao
Towards Bitcoin Payment Networks
2016
Dr Ehsan Toreini
Professor Brian Randell
Professor Feng Hao
An Acoustic Side Channel Attack on Enigma
2015
Patrick McCorry
Dr Siamak Fayyaz Shahandashti
Dr Dylan Clarke
Professor Feng Hao
Authenticated Key Exchange over Bitcoin
2015
Patrick McCorry
Dr Siamak Fayyaz Shahandashti
Dr Dylan Clarke
Professor Feng Hao
Authenticated Key Exchange over Bitcoin
2015
Dr Dylan Clarke
Ehsan Toreini
Professor Feng Hao
Determining User Passwords From Partial Information
2015
Professor Feng Hao
On the Trust of Trusted Computing in the Post-Snowden Age
2015
Professor Feng Hao
Practical Threshold Password-Authenticated Secret Sharing Protocol
2015
Professor Feng Hao
Practical Threshold Password-Authenticated Secret Sharing Protocol
2015
Dr Maryam Mehrnezhad
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment
2015
Maryam Mehrnezhad
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment
2015
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group
2015
Maryam Mehrnezhad
Ehsan Toreini
Dr Siamak Fayyaz Shahandashti
Professor Feng Hao
TouchSignatures: Identification of User Touch Actions based on Mobile Sensors via JavaScript
2015
Dr Taha Ali
Patrick McCorry
Professor Feng Hao
ZombieCoin: Powering Next-Generation Botnets with Bitcoin
2015
Dr Taha Ali
Patrick McCorry
Dr Peter Lee
Professor Feng Hao
ZombieCoin: Powering Next-Generation Botnets with Bitcoin
2015
Dr Dylan Clarke
Professor Feng Hao
Cryptanalysis of the Dragonfly key exchange protocol
2014
Professor Feng Hao
Professor Brian Randell
Dr Dylan Clarke
Dr Siamak Fayyaz Shahandashti
Dr Peter Lee
et al.
Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting
2014
Professor Feng Hao
Professor Brian Randell
Dr Dylan Clarke
Dr Peter Lee
Every vote counts: Ensuring integrity in large-scale electronic voting
2014
Professor Feng Hao
ID-Based Two-Server Password-Authenticated Key Exchange
2014
Professor Feng Hao
On robust key agreement based on public key authentication
2014
Dr Matthew Forshaw
Professor Feng Hao
Ehsan Toreini
On the Privacy of Private Browsing - A Forensic Approach
2014
Dr Matthew Forshaw
Professor Feng Hao
Ehsan Toreini
On the privacy of private browsing - A forensic approach
2014
Dr Matthew Forshaw
Professor Feng Hao
Dr Ehsan Toreini
On The Privacy Of Private Browsing - A Forensic Approach (short paper)
2014
Maryam Mehrnezhad
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
Tap-Tap and Pay (TTP): Preventing Man-In-The-Middle Attacks in NFC Payment Using Mobile Sensors
2014
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
The SPEKE Protocol Revisited
2014
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
The SPEKE Protocol Revisited
2014
Professor Feng Hao
Dr Siamak Fayyaz Shahandashti
The SPEKE Protocol Revisited
2014
Professor Feng Hao
The SPEKE protocol revisited
2014
Dr Dylan Clarke
Professor Feng Hao
Cryptanalysis of the Dragonfly Key Exchange Protocol
2013
Dr Matthew Forshaw
Professor Feng Hao
Ehsan Toreini
On the Privacy of Private Browsing - A Forensic Approach
2013
Professor Feng Hao
Dr Dylan Clarke
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy
2013
Professor Feng Hao
Verifiable classroom voting: Where cryptography meets pedagogy
2013
Professor Feng Hao
Dr Dylan Clarke
Dr Carlton Shepherd
Verifiable classroom voting: Where cryptography meets pedagogy
2013
Professor Feng Hao
Dr Dylan Clarke
How to Delete a Secret
2012
Professor Feng Hao
Dr Dylan Clarke
Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol
2012
Professor Feng Hao
Professor Brian Randell
Dr Dylan Clarke
Self-Enforcing Electronic Voting
2012
Professor Feng Hao
Professor Brian Randell
Dr Dylan Clarke
Self-Enforcing Electronic Voting
2012
Professor Feng Hao
Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting
2011
Professor Feng Hao
Professor Peter Ryan
How to Sync with Alice
2011
Professor Feng Hao
Professor Peter Ryan
How to Sync with Alice
2011
Professor Feng Hao
How to Sync with Alice (Transcript of Discussion)
2011
Professor Feng Hao
On Robust Key Agreement Based on Public Key Authentication
2011
Professor Feng Hao
Professor Peter Ryan
Anonymous voting by two-round public discussion
2010
Professor Feng Hao
Professor Peter Ryan
J-PAKE: Authenticated Key Exchange Without PKI
2010
Professor Feng Hao
On robust key agreement based on public key authentication (short paper)
2010
Professor Feng Hao
On Small Subgroup Non-confinement Attack
2010
Professor Feng Hao
A 2-Round Anonymous Veto Protocol
2009
Professor Feng Hao
A 2-Round Anonymous Veto Protocol (Transcript of Discussion)
2009
Professor Feng Hao
The Power of Anonymous Veto in Public Discussion
2009
Professor Feng Hao
A Fast Search Algorithm for a Large Fuzzy Database
2008
Professor Feng Hao
Professor Peter Ryan
Password Authenticated Key Exchange by Juggling
2008
Professor Feng Hao
Combining Crypto with Biometrics Effectively
2006
Professor Feng Hao
Kish's key exchange scheme is insecure
2006
Professor Feng Hao
Online signature verification using a new extreme points warping technique
2003
Professor Feng Hao
Private Key Generation from On-line Handwritten Signatures
2002