default search action
Feng Bao 0001
Person information
- affiliation: Huawei Technologies Pte Ltd, Singapore
- affiliation (former): Institute for Infocomm Research, Cryptography & Security Department, Singapore
Other persons with the same name
- Feng Bao — disambiguation page
- Feng Bao 0002 — Tsinghua University, Department of Automation, Beijing, China
- Feng Bao 0003 — University of Auckland, Department of Electrical and Computer Engineering, New Zealand (and 1 more)
- Feng Bao 0004 — Gunma University, Kiryu, Japan
- Feng Bao 0005 — Florida State University, Department of Mathematics, Tallahassee, FL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [e17]Robert H. Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang:
Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings. Lecture Notes in Computer Science 13107, Springer 2021, ISBN 978-3-030-93206-0 [contents]
2010 – 2019
- 2018
- [p1]Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public Key-Based Lightweight Swarm Authentication. Cyber-Physical Systems Security 2018: 255-267 - 2017
- [j41]Javier López, Ruben Rios, Feng Bao, Guilin Wang:
Evolving privacy: From sensors to the Internet of Things. Future Gener. Comput. Syst. 75: 46-57 (2017) - 2016
- [c167]Vivy Suhendra, Yongdong Wu, Hendra Saputra, Zhigang Zhao, Feng Bao:
Lightweight Key Management Protocols for Smart Grids. iThings/GreenCom/CPSCom/SmartData 2016: 345-348 - [e16]Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 [contents] - [i11]Simon Cogliani, Feng Bao, Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Rodrigo Portella do Canto, Guilin Wang:
Public-Key Based Lightweight Swarm Authentication. IACR Cryptol. ePrint Arch. 2016: 750 (2016) - 2015
- [j40]Yongdong Wu, Zhigang Zhao, Feng Bao, Robert H. Deng:
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks. IEEE Trans. Inf. Forensics Secur. 10(1): 168-177 (2015) - [e15]Feng Bao, Steven Miller, Jianying Zhou, Gail-Joon Ahn:
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. ACM 2015, ISBN 978-1-4503-3245-3 [contents] - [e14]Feng Bao, Steven Miller, Sherman S. M. Chow, Danfeng Yao:
Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015. ACM 2015, ISBN 978-1-4503-3447-1 [contents] - 2014
- [j39]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Collaborative agglomerative document clustering with limited information disclosure. Secur. Commun. Networks 7(6): 964-978 (2014) - 2013
- [c166]Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou:
Launching Generic Attacks on iOS with Approved Third-Party Applications. ACNS 2013: 272-289 - [c165]Naoki Tanaka, Marianne Winslett, Adam J. Lee, David K. Y. Yau, Feng Bao:
Insured access: an approach to ad-hoc information sharing for virtual organizations. CODASPY 2013: 301-308 - 2012
- [j38]Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao:
Detecting node replication attacks in wireless sensor networks: A survey. J. Netw. Comput. Appl. 35(3): 1022-1034 (2012) - [j37]Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao:
Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Networks 5(5): 496-507 (2012) - [e13]Feng Bao, Pierangela Samarati, Jianying Zhou:
Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings. Lecture Notes in Computer Science 7341, Springer 2012, ISBN 978-3-642-31283-0 [contents] - 2011
- [j36]Kun Peng, Ed Dawson, Feng Bao:
Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency. Int. J. Inf. Sec. 10(1): 33-47 (2011) - [j35]Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao:
Secure localization with attack detection in wireless sensor networks. Int. J. Inf. Sec. 10(3): 155-171 (2011) - [j34]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. Secur. Commun. Networks 4(1): 11-22 (2011) - [j33]Huaqun Guo, Yongdong Wu, Feng Bao, Hongmei Chen, Maode Ma:
UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications. IEEE Trans. Smart Grid 2(4): 707-714 (2011) - [c164]Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. ACNS 2011: 201-219 - [c163]Kun Peng, Feng Bao:
Analysing a Batch Range Proof to Address a Security Concern. CSE 2011: 68-72 - [c162]Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao:
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. ICICS 2011: 306-318 - [c161]Kun Zhang, Hong Zhang, Yongdong Wu, Feng Bao:
Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis. ICON 2011: 231-235 - [c160]Joseph K. Liu, Feng Bao, Jianying Zhou:
Short and Efficient Certificate-Based Signature. Networking Workshops 2011: 167-178 - [e12]Feng Bao, Moti Yung, Dongdai Lin, Jiwu Jing:
Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6151, Springer 2011, ISBN 978-3-642-16341-8 [contents] - [e11]Feng Bao, Jian Weng:
Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings. Lecture Notes in Computer Science 6672, Springer 2011, ISBN 978-3-642-21030-3 [contents] - [i10]Joseph K. Liu, Feng Bao, Jianying Zhou:
Short and Efficient Certificate-Based Signature. IACR Cryptol. ePrint Arch. 2011: 192 (2011) - 2010
- [j32]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53(3): 593-606 (2010) - [j31]Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao:
Time-Bound Hierarchical Key Assignment: An Overview. IEICE Trans. Inf. Syst. 93-D(5): 1044-1052 (2010) - [j30]Yanjiang Yang, Yingjiu Li, Robert H. Deng, Feng Bao:
Shifting Inference Control to User Side: Architecture and Protocol. IEEE Trans. Dependable Secur. Comput. 7(2): 189-202 (2010) - [c159]Yanjiang Yang, Feng Bao:
Enabling Use of Single Password over Multiple Servers in Two-Server Model. CIT 2010: 846-850 - [c158]Kun Peng, Feng Bao:
Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property. CIT 2010: 1044-1049 - [c157]Yanjiang Yang, Jianying Zhou, Jun Wen Wong, Feng Bao:
Towards practical anonymous password authentication. ACSAC 2010: 59-68 - [c156]Kun Peng, Feng Bao:
Batch Range Proof for Practical Small Ranges. AFRICACRYPT 2010: 114-130 - [c155]Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng:
Practical ID-based encryption for wireless sensor network. AsiaCCS 2010: 337-340 - [c154]Huafei Zhu, Feng Bao:
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity. Inscrypt 2010: 52-61 - [c153]Kun Peng, Feng Bao:
A Secure RFID Ticket System for Public Transport. DBSec 2010: 350-357 - [c152]Yongdong Wu, Zhigang Zhao, Ying Qiu, Feng Bao:
Blocking Foxy Phishing Emails with Historical Information. ICC 2010: 1-5 - [c151]Liang Gu, Yao Guo, Yanjiang Yang, Feng Bao, Hong Mei:
Modeling TCG-Based Secure Systems with Colored Petri Nets. INTRUST 2010: 67-86 - [c150]Yanjiang Yang, Liang Gu, Feng Bao:
Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing. INTRUST 2010: 189-199 - [c149]Kun Peng, Feng Bao:
Efficient Multiplicative Homomorphic E-Voting. ISC 2010: 381-393 - [c148]Kun Peng, Feng Bao:
Efficient Proof of Validity of Votes in Homomorphic E-Voting. NSS 2010: 17-23 - [c147]Qiming Li, Yongdong Wu, Feng Bao:
A Reversible Data Hiding Scheme for JPEG Images. PCM (1) 2010: 653-664 - [c146]Kun Peng, Feng Bao:
Formal and Precise Analysis of Soundness of Several Shuffling Schemes. ProvSec 2010: 133-143 - [c145]Kun Peng, Feng Bao:
Vulnerability of a Non-membership Proof Scheme. SECRYPT 2010: 419-422 - [c144]Kun Peng, Feng Bao:
A Shuffling Scheme with Strict and Strong Security. SECURWARE 2010: 201-206 - [c143]Kun Peng, Feng Bao:
An Efficient Range Proof Scheme. SocialCom/PASSAT 2010: 826-833 - [c142]Huafei Zhu, Feng Bao:
Private Searching on MapReduce. TrustBus 2010: 93-101 - [c141]Kun Peng, Feng Bao:
Efficiency Improvement of Homomorphic E-Auction. TrustBus 2010: 238-249 - [i9]Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng:
Practical ID-based Encryption for Wireless Sensor Network. IACR Cryptol. ePrint Arch. 2010: 2 (2010) - [i8]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 265 (2010)
2000 – 2009
- 2009
- [j29]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(4): 1246-1250 (2009) - [j28]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1868-1871 (2009) - [j27]Yanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng:
Multiuser private queries over encrypted databases. Int. J. Appl. Cryptogr. 1(4): 309-319 (2009) - [j26]Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel, Ming Gu:
n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords. J. Comput. Sci. Technol. 24(1): 138-151 (2009) - [j25]Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-preserving rental services using one-show anonymous credentials. Secur. Commun. Networks 2(6): 531-545 (2009) - [c140]Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao:
A New Approach for Anonymous Password Authentication. ACSAC 2009: 199-208 - [c139]Huafei Zhu, Feng Bao:
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions. AFRICACRYPT 2009: 323-333 - [c138]Kun Peng, Feng Bao:
Practicalization of a Range Test and Its Application to E-Auction. EuroPKI 2009: 179-194 - [c137]Ying Qiu, Feng Bao, Yongdong Wu, Yanjiang Yang:
A Lightweight Fast Handover Authentication Scheme in Mobile Networks. ICC 2009: 1-5 - [c136]Yongdong Wu, Feng Bao, Ying Qiu:
Tracing Stateful Pirate Decoders. ICC 2009: 1-5 - [c135]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. ICICS 2009: 135-149 - [c134]Huafei Zhu, Feng Bao:
Adaptive and Composable Oblivious Transfer Protocols (Short Paper). ICICS 2009: 483-492 - [c133]Huafei Zhu, Feng Bao:
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. INDOCRYPT 2009: 418-429 - [c132]Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ISC 2009: 151-166 - [c131]Yanjiang Yang, Feng Bao, Jian Weng:
Private handshakes with optional accountability. LCN 2009: 245-248 - [c130]Yongdong Wu, Feng Bao:
Improving a Digital Rights Management Scheme for Video Broadcast. PCM 2009: 708-718 - [c129]Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao:
Self-enforcing Private Inference Control. ProvSec 2009: 260-274 - [c128]Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. SecureComm 2009: 285-295 - [c127]Kun Peng, Feng Bao:
A Design of Secure Preferential E-Voting. VoteID 2009: 141-156 - [c126]Kun Peng, Feng Bao:
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. WISA 2009: 118-132 - [e10]Feng Bao, Hui Li, Guilin Wang:
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings. Lecture Notes in Computer Science 5451, Springer 2009, ISBN 978-3-642-00842-9 [contents] - 2008
- [j24]Kun Peng, Feng Bao, Ed Dawson:
Correct, Private, Flexible and Efficient Range Test. J. Res. Pract. Inf. Technol. 40(4): 275-289 (2008) - [c125]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119 - [c124]Joonsang Baek, Jianying Zhou, Feng Bao:
Generic Constructions of Stateful Public Key Encryption and Their Applications. ACNS 2008: 75-93 - [c123]Kun Peng, Feng Bao:
Batch ZK Proof and Verification of OR Logic. Inscrypt 2008: 141-156 - [c122]Kun Peng, Feng Bao:
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. Inscrypt 2008: 425-437 - [c121]Yanjiang Yang, Feng Bao, Robert H. Deng:
Efficient Client-to-Client Password Authenticated Key Exchange. EUC (2) 2008: 202-207 - [c120]Huafei Zhu, Feng Bao, Robert H. Deng:
Robust and Reliable Broadcast Protocols in the Stand-Alone and Simulation-Based Frameworks. ICC 2008: 1635-1641 - [c119]Kun Peng, Feng Bao:
Efficient Vote Validity Check in Homomorphic Electronic Voting. ICISC 2008: 202-217 - [c118]Yongdong Wu, Qiming Li, Feng Bao:
Optimizing the capacity of distortion-freewatermarking on palette images. ICME 2008: 205-208 - [c117]Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang:
Private Query on Encrypted Data in Multi-user Settings. ISPEC 2008: 71-85 - [c116]Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao:
An Efficient PIR Construction Using Trusted Hardware. ISC 2008: 64-79 - [c115]Yongdong Wu, Haixia Yao, Feng Bao:
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. SEC 2008: 47-61 - [e9]Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai:
Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings. Lecture Notes in Computer Science 5324, Springer 2008, ISBN 978-3-540-88732-4 [contents] - 2007
- [j23]Zhiguo Wan, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda:
Access control protocols with two-layer architecture for wireless networks. Comput. Networks 51(3): 655-670 (2007) - [c114]Yongdong Wu, Feng Bao, Robert H. Deng:
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. ACISP 2007: 171-183 - [c113]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391 - [c112]Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau:
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Inscrypt 2007: 472-481 - [c111]Feng Bao, Robert H. Deng:
Light-Weight Encryption Schemes for Multimedia Data and High-Speed Networks. GLOBECOM 2007: 188-192 - [c110]Huafei Zhu, Feng Bao:
Oblivious Keyword Search Protocols in the Public Database Model. ICC 2007: 1336-1341 - [c109]Huafei Zhu, Feng Bao:
Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce. ICC 2007: 1503-1508 - [c108]Huafei Zhu, Feng Bao, A. Lakshminarayanan:
Price Negotiation Systems for M-commerce. ICC 2007: 1521-1526 - [c107]Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel:
n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. ICICS 2007: 31-43 - [c106]Ying Qiu, Feng Bao, Jianying Zhou:
Firewall for Dynamic IP Address in Mobile IPv6. ICICS 2007: 467-479 - [c105]Yongdong Wu, Bo Qiu, Feng Bao:
Evaluating Ouda's Tamper-Localization Watermarking Scheme. ICME 2007: 843-846 - [c104]Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. ISPEC 2007: 177-192 - [c103]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208 - [c102]Huafei Zhu, Feng Bao:
Computing of Trust in Complex Environments. PIMRC 2007: 1-5 - [c101]Huafei Zhu, Ying Qiu, Feng Bao:
Securing Mobile Auctions in the Presence of Malicious Adversaries. PIMRC 2007: 1-5 - [c100]Huafei Zhu, Ying Qiu, Feng Bao:
Or-protocols for Anonymous Membership Proofs in Ad-hoc Networks. PIMRC 2007: 1-5 - [c99]Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Public Key Cryptography 2007: 43-60 - [c98]Guilin Wang, Feng Bao:
Security Remarks on a Convertible Nominative Signature Scheme. SEC 2007: 265-275 - [c97]Huafei Zhu, Feng Bao:
Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability. WCNC 2007: 2698-2702 - [c96]Huafei Zhu, Feng Bao:
Quantifying Trust Metrics of Recommendation Systems in Ad-Hoc Networks. WCNC 2007: 2904-2908 - [e8]Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing:
Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings. Lecture Notes in Computer Science 4856, Springer 2007, ISBN 978-3-540-76968-2 [contents] - [e7]Feng Bao, Steven Miller:
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007. ACM 2007, ISBN 1-59593-574-6 [contents] - 2006
- [j22]Feng Bao, Cheng-Chi Lee, Min-Shiang Hwang:
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Appl. Math. Comput. 172(2): 1195-1200 (2006) - [j21]Kui Ren, Wenjing Lou, Kai Zeng, Feng Bao, Jianying Zhou, Robert H. Deng:
Routing optimization security in mobile IPv6. Comput. Networks 50(13): 2401-2419 (2006) - [j20]Shen-Tat Goh, HweeHwa Pang, Robert H. Deng, Feng Bao:
Three architectures for trusted data dissemination in edge computing. Data Knowl. Eng. 58(3): 381-409 (2006) - [j19]Shuhong Wang, Feng Bao, Jie Wang:
A More Efficient Improvement of the Virtual Software Token Protocols. IEICE Trans. Commun. 89-B(3): 945-948 (2006) - [j18]Jianying Zhou, Feng Bao, Robert H. Deng:
Minimizing TTP's involvement in signature validation. Int. J. Inf. Sec. 5(1): 37-47 (2006) - [j17]Yanjiang Yang, Robert H. Deng, Feng Bao:
A Practical Password-Based Two-Server Authentication and Key Exchange System. IEEE Trans. Dependable Secur. Comput. 3(2): 105-114 (2006) - [j16]Zhiguo Wan, Feng Bao, Robert H. Deng, Akkihebbal L. Ananda:
Security analysis on a conference scheme for mobile communications. IEEE Trans. Wirel. Commun. 5(6): 1238-1240 (2006) - [j15]Feng Bao:
Analysis of a secure conference scheme for mobile communication. IEEE Trans. Wirel. Commun. 5(8): 1984-1986 (2006) - [c95]Huafei Zhu, Feng Bao:
More on Stand-Alone and Setup-Free Verifiably Committed Signatures. ACISP 2006: 148-158 - [c94]Huafei Zhu, Feng Bao:
Oblivious Scalar-Product Protocols. ACISP 2006: 313-323 - [c93]Yanjiang Yang, Robert H. Deng, Feng Bao:
Fortifying password authentication in integrated healthcare delivery systems. AsiaCCS 2006: 255-265 - [c92]Yanjiang Yang, Robert H. Deng, Feng Bao:
Practical private data matching deterrent to spoofing attacks. CIKM 2006: 852-853 - [c91]Yongdong Wu, Feng Bao:
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. Inscrypt 2006: 264-278 - [c90]Huafei Zhu, Feng Bao, Jianwei Liu:
Computing of Trust in Ad-Hoc Networks. Communications and Multimedia Security 2006: 1-11 - [c89]Huafei Zhu, Feng Bao:
Stand-Alone and Setup-Free Verifiably Committed Signatures. CT-RSA 2006: 159-173 - [c88]Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao:
Private Information Retrieval Using Trusted Hardware. ESORICS 2006: 49-64 - [c87]Guilin Wang, Feng Bao:
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. ICICS 2006: 399-409 - [c86]Guilin Wang, Feng Bao, Jianying Zhou:
The Fairness of Perfect Concurrent Signatures. ICICS 2006: 435-451 - [c85]Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu:
Preventing Web-Spoofing with Automatic Detecting Security Indicator. ISPEC 2006: 112-122 - [c84]Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu:
More on Shared-Scalar-Product Protocols. ISPEC 2006: 142-152 - [c83]Huafei Zhu, Tieyan Li, Feng Bao:
Privacy-Preserving Shared-Additive-Inverse Protocols and Their Applications. SEC 2006: 340-350 - [c82]Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks. SECON 2006: 70-79 - [c81]Ying Qiu, Jianying Zhou, Feng Bao, Robert H. Deng:
Using Certificate-based Binding Update Protocol to Hide the Movement of Mobile Nodes in MIPv6. VTC Spring 2006: 828-830 - [c80]Huafei Zhu, Feng Bao, Chunxiao Chigan:
Compact routing discovery protocol with lower communication complexity. WCNC 2006: 307-310 - [c79]Huafei Zhu, Chunxiao Chigan, Feng Bao:
Turing assessor: a new tool for cyber security quantification. WCNC 2006: 629-633 - [c78]Zhiguo Wan, Bo Zhu, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda:
Efficient key tree construction for group key agreement in ad hoc networks. WCNC 2006: 652-658 - [e6]Jianying Zhou, Moti Yung, Feng Bao:
Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings. Lecture Notes in Computer Science 3989, 2006, ISBN 3-540-34703-8 [contents] - [i7]Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao:
Private Information Retrieval Using Trusted Hardware. IACR Cryptol. ePrint Arch. 2006: 208 (2006) - [i6]Guilin Wang, Feng Bao, Jianying Zhou:
The Fairness of Perfect Concurrent Signatures. IACR Cryptol. ePrint Arch. 2006: 226 (2006) - 2005
- [j14]Feng Bao, Robert H. Deng:
Protocols that hide user's preferences in electronic transactions. Comput. Networks 48(4): 503-515 (2005) - [j13]Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang:
Efficient and robust key management for large mobile ad hoc networks. Comput. Networks 48(4): 657-682 (2005) - [j12]Shuhong Wang, Feng Bao, Jie Wang:
Security Analysis on an Improvement of RSA-Based Password Authenticated Key Exchange. IEICE Trans. Commun. 88-B(4): 1641-1646 (2005) - [j11]Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen:
New Efficient MDS Array Codes for RAID Part I: Reed-Solomon-Like Codes for Tolerating Three Disk Failures. IEEE Trans. Computers 54(9): 1071-1080 (2005) - [j10]Gui Liang Feng, Robert H. Deng, Feng Bao, Jia-Chen Shen:
New Efficient MDS Array Codes for RAID Part II: Rabin-Like Codes for Tolerating Multiple (greater than or equal to 4) Disk Failures. IEEE Trans. Computers 54(12): 1473-1483 (2005) - [j9]Feng Bao, Robert H. Deng, Beng Chin Ooi, Yanjiang Yang:
Tailored reversible watermarking schemes for authentication of electronic clinical atlas. IEEE Trans. Inf. Technol. Biomed. 9(4): 554-563 (2005) - [c77]Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Fix of an Anonymous Credential System. ACISP 2005: 537-547 - [c76]Huafei Zhu, Feng Bao, Tieyan Li:
Compact Stimulation Mechanism for Routing Discovery Protocols in Civilian Ad-Hoc Networks. Communications and Multimedia Security 2005: 200-209 - [c75]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
A Fast Correlation Attack on the Shrinking Generator. CT-RSA 2005: 72-86 - [c74]Huafei Zhu, Feng Bao:
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. ESORICS 2005: 222-230 - [c73]Helger Lipmaa, Guilin Wang, Feng Bao:
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. ICALP 2005: 459-471 - [c72]Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai:
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. ICICS 2005: 40-52 - [c71]Shuhong Wang, Feng Bao, Robert H. Deng:
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. ICICS 2005: 53-60 - [c70]Huafei Zhu, Feng Bao, Robert H. Deng:
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ICICS 2005: 207-219 - [c69]Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu:
Batching SSL/TLS Handshake Improved. ICICS 2005: 402-413 - [c68]Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292 - [c67]Zhiguo Wan, Akkihebbal L. Ananda, Robert H. Deng, Feng Bao:
Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks. LCN 2005: 328-335 - [c66]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
An efficient certified e-mail scheme suitable for wireless mobile environments. PIMRC 2005: 1994-1998 - [c65]Huafei Zhu, Feng Bao:
Provably secure public key management protocols for self-organized ad hoc networks. PIMRC 2005: 2691-2695 - [c64]Yanjiang Yang, Feng Bao, Robert H. Deng:
A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises. SEC 2005: 95-112 - [c63]Yongdong Wu, Feng Bao, Robert H. Deng:
Secure Person-To-Person Communications Based on Biometrics Signals. SEC 2005: 205-222 - [c62]Huafei Zhu, Feng Bao:
A Novel Construction of Two-Party Private Bidding Protocols from Yao's Millionaires Problem. TrustBus 2005: 266-273 - [c61]Zhiguo Wan, Bo Zhu, Robert H. Deng, Feng Bao, Akkihebbal L. Ananda:
DoS-resistant access control protocol with identity confidentiality for wireless networks. WCNC 2005: 1521-1526 - [c60]Huafei Zhu, Feng Bao, Tieyan Li, Yongdong Wu:
Sequential aggregate signatures for wireless routing protocols. WCNC 2005: 2436-2439 - [e5]Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou:
Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings. Lecture Notes in Computer Science 3439, Springer 2005, ISBN 3-540-25584-2 [contents] - [e4]Jianying Zhou, Javier López, Robert H. Deng, Feng Bao:
Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings. Lecture Notes in Computer Science 3650, Springer 2005, ISBN 3-540-29001-X [contents] - [e3]Jianying Zhou, Meng-Chow Kang, Feng Bao, HweeHwa Pang:
Applied Public Key Infrastructure - 4th International Workshop: IWAP 2005, Singapore, September 21-23, 2005. Frontiers in Artificial Intelligence and Applications 128, IOS Press 2005, ISBN 978-1-58603-550-1 [contents] - [i5]Guilin Wang, Feng Bao, Changshe Ma, Kefei Chen:
Efficient Authenticated Encryption Schemes with Public Verifiability. CoRR abs/cs/0504019 (2005) - 2004
- [j8]Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim:
Highly reliable trust establishment scheme in ad hoc networks. Comput. Networks 45(6): 687-699 (2004) - [j7]Yanjiang Yang, Shuhong Wang, Feng Bao, Jie Wang, Robert H. Deng:
New efficient user identification and key distribution scheme providing enhanced security. Comput. Secur. 23(8): 697-704 (2004) - [j6]Feng Bao:
Cryptanalysis of a Partially Known Cellular Automata Cryptosystem. IEEE Trans. Computers 53(11): 1493-1497 (2004) - [j5]Shuhong Wang, Feng Bao, Jie Wang:
Comments on yet another log-in authentication using n-dimensional construction. IEEE Trans. Consumer Electron. 50(2): 606-608 (2004) - [j4]Yanjiang Yang, Xiaoxi Han, Feng Bao, Robert H. Deng:
A smart-card-enabled privacy preserving E-prescription system. IEEE Trans. Inf. Technol. Biomed. 8(1): 47-58 (2004) - [j3]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem". IEEE Trans. Knowl. Data Eng. 16(10): 1309-1311 (2004) - [c59]Feng Bao:
Analysis of a Conference Scheme Under Active and Passive Attacks. ACISP 2004: 157-163 - [c58]Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu:
Analysis and Improvement of Micali's Fair Contract Signing Protocol. ACISP 2004: 176-187 - [c57]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. ACNS 2004: 303-309 - [c56]Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi:
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ACNS 2004: 369-382 - [c55]Feng Bao:
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. ASIACRYPT 2004: 417-429 - [c54]Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324 - [c53]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Security Analysis of the Generalized Self-shrinking Generator. ICICS 2004: 388-400 - [c52]Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim:
On Security Notions for Steganalysis. ICISC 2004: 440-454 - [c51]Guilin Wang, Feng Bao, Jianying Zhou:
On the Security of a Certified E-Mail Scheme. INDOCRYPT 2004: 48-60 - [c50]Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao:
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers. INDOCRYPT 2004: 73-83 - [c49]Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim:
On Security Notions of Steganographic Systems. IWDW 2004: 137-151 - [c48]Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
Anonymous Secure Routing in Mobile Ad-Hoc Networks. LCN 2004: 102-108 - [c47]Yongdong Wu, Feng Bao:
Collusion attack on a multi-key secure video proxy scheme. ACM Multimedia 2004: 380-383 - [c46]Ying Qiu, Jianying Zhou, Feng Bao:
Mobile personal firewall. PIMRC 2004: 2866-2870 - [c45]Feng Bao:
A scheme of digital ticket for personal trusted device. PIMRC 2004: 3065-3069 - [c44]Ying Qiu, Jianying Zhou, Feng Bao:
Protecting all traffic channels in mobile IPv6 network. WCNC 2004: 160-165 - [e2]Feng Bao, Robert H. Deng, Jianying Zhou:
Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Lecture Notes in Computer Science 2947, Springer 2004, ISBN 3-540-21018-0 [contents] - [i4]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2004: 54 (2004) - 2003
- [c43]Feng Bao:
Cryptanalysis of a New Cellular Automata Cryptosystem. ACISP 2003: 416-427 - [c42]Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng:
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. ACNS 2003: 343-356 - [c41]Robert H. Deng, Feng Bao:
An improved personal CA for personal area networks. GLOBECOM 2003: 1486-1490 - [c40]Yanjiang Yang, Feng Bao:
An invertible watermarking scheme for authentication of Electronic Clinical Brain Atlas. ICASSP (3) 2003: 533-536 - [c39]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83 - [c38]Hongjun Wu, Feng Bao, Robert H. Deng:
An Efficient Known Plaintext Attack on FEA-M. ICICS 2003: 84-87 - [c37]Jianying Zhou, Feng Bao, Robert H. Deng:
An Efficient Public-Key Framework. ICICS 2003: 88-99 - [c36]Feng Bao, Robert H. Deng, Huafei Zhu:
Variations of Diffie-Hellman Problem. ICICS 2003: 301-312 - [c35]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Analysis of Some Proxy Signatures. ICISC 2003: 305-319 - [c34]Yongdong Wu, Feng Bao, Changsheng Xu:
The security flaws in some authentication watermarking schemes. ICME 2003: 493-496 - [c33]Yanjiang Yang, Zhenlan Wang, Feng Bao, Robert H. Deng:
Secure the image-based simulated telesurgery system. ISCAS (2) 2003: 596-599 - [c32]Jianying Zhou, Feng Bao, Robert H. Deng:
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. ISC 2003: 96-110 - [c31]Feng Bao:
Security Analysis of a Password Authenticated Key Exchange Protocol. ISC 2003: 208-217 - [c30]Yanjiang Yang, Feng Bao, Robert H. Deng:
Flexible authentication of images. VCIP 2003: 1905-1911 - [i3]Huafei Zhu, Feng Bao, Robert H. Deng:
Computing of Trust in Distributed Networks. IACR Cryptol. ePrint Arch. 2003: 56 (2003) - [i2]Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Analysis of Some Proxy Signatures. IACR Cryptol. ePrint Arch. 2003: 196 (2003) - 2002
- [j2]Hongjun Wu, Feng Bao, Robert H. Deng:
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes. Informatica (Slovenia) 26(3) (2002) - [c29]Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Improvement of the Global Key Recovery System. ACISP 2002: 17-24 - [c28]Hongjun Wu, Feng Bao:
Cryptanalysis of Stream Cipher COS(2, 128) Mode I. ACISP 2002: 154-158 - [c27]Robert H. Deng, Jianying Zhou, Feng Bao:
Defending against redirect attacks in mobile IP. CCS 2002: 59-67 - [c26]Yongdong Wu, Changsheng Xu, Feng Bao:
Counterfeiting Attack on a Lossless Authentication Watermarking Scheme. VIP 2002: 109-112 - [e1]Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou:
Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings. Lecture Notes in Computer Science 2513, Springer 2002, ISBN 3-540-00164-6 [contents] - [i1]Hongjun Wu, Feng Bao:
Cryptanalysis of Stream Cipher COS (2, 128) Mode I. IACR Cryptol. ePrint Arch. 2002: 5 (2002) - 2001
- [c25]Feng Bao, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu:
Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. ACISP 2001: 190-205 - [c24]Feng Bao, Robert H. Deng:
Privacy Protection for Transactions of Digital Goods. ICICS 2001: 202-213 - [c23]Feng Bao, Robert H. Deng, Willi Geiselmann, Claus-Peter Schnorr, Rainer Steinwandt, Hongjun Wu:
Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems. Public Key Cryptography 2001: 153-164 - [c22]Hongjun Wu, Feng Bao, Robert H. Deng:
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Public Key Cryptography 2001: 173-179 - 2000
- [j1]X.-K. Wang, Robert H. Deng, Feng Bao:
Multicast Internet protocol. Comput. Commun. 23(11): 1047-1054 (2000) - [c21]Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng:
Cryptanalysis of the m-Permutation Protection Schemes. ACISP 2000: 97-111 - [c20]Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng:
Cryptanalysis of Polynominal Authentication and Signature Scheme. ACISP 2000: 278-288 - [c19]Feng Bao:
Introducing Decryption Authority into PKI. ACSAC 2000: 288- - [c18]Feng Bao, Robert H. Deng, Peirong Feng:
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. ICISC 2000: 162-170 - [c17]Feng Bao:
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware. ACM Multimedia Workshops 2000: 139-142 - [c16]Jianying Zhou, Robert H. Deng, Feng Bao:
Some Remarks on a Fair Exchange Protocol. Public Key Cryptography 2000: 46-57 - [c15]Feng Bao, Robert H. Deng, Jianying Zhou:
Electronic Payment Systems with Fair On-line Verification. SEC 2000: 451-460
1990 – 1999
- 1999
- [c14]Jianying Zhou, Robert H. Deng, Feng Bao:
Evolution of Fair Non-repudiation with TTP. ACISP 1999: 258-269 - [c13]Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan:
Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999: 858-863 - [c12]Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan:
Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. ICICS 1999: 103-118 - [c11]Feng Bao, Robert H. Deng:
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. Public Key Cryptography 1999: 1-11 - 1998
- [c10]Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye:
Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. ASIACRYPT 1998: 126-132 - [c9]Hongjun Wu, Feng Bao, Robert H. Deng, Qin-Zhong Ye:
Improved Truncated Differential Attacks on SAFER. ASIACRYPT 1998: 133-147 - [c8]Feng Bao:
An Efficient Verifiable Encryption Scheme for Encryption of Discrete Logarithms. CARDIS 1998: 213-220 - [c7]Feng Bao, Robert H. Deng:
A Signcryption Scheme with Signature Directly Verifiable by Public Key. Public Key Cryptography 1998: 55-59 - [c6]Feng Bao, Robert H. Deng, Wenbo Mao:
Efficient and Practical Fair Exchange Protocols with Off-Line TTP. S&P 1998: 77-85 - [c5]Robert H. Deng, Jian Hu, Feng Bao, Arcot Desai Narasimhalu:
A Ubiquitous Secure and Reliable Digital Data Depository System. WETICE 1998: 354-358 - 1997
- [c4]Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng:
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow. ACISP 1997: 261-270 - [c3]Marc Joye, Jean-Jacques Quisquater, Feng Bao, Robert H. Deng:
RSA-type Signatures in the Presence of Transient Faults. IMACC 1997: 155-160 - [c2]Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi:
Modified Finite Automata Public Key Cryptosystem. ISW 1997: 82-95 - [c1]Feng Bao, Robert H. Deng, Yongfei Han, Albert B. Jeng, Arcot Desai Narasimhalu, Teow-Hin Ngair:
Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults. Security Protocols Workshop 1997: 115-124
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint