Combining crypto with biometrics effectively F Hao, R Anderson, J Daugman IEEE transactions on computers 55 (9), 1081-1088, 2006 | 950 | 2006 |
A Smart Contract for Boardroom Voting with Maximum Voter Privacy P McCorry, S F Shahandashti, F Hao IACR Cryptology ePrint Archive, 110, 2017 | 626 | 2017 |
Private key generation from on-line handwritten signatures H Feng, CC Wah Information Management & Computer Security 10 (4), 159-164, 2002 | 324 | 2002 |
Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography C Li, D Lin, J Lü, F Hao IEEE multimedia 25 (4), 46-56, 2018 | 253 | 2018 |
Cryptanalysis of a chaotic image encryption algorithm based on information entropy C Li, D Lin, B Feng, J Lü, F Hao Ieee Access 6, 75834-75842, 2018 | 238 | 2018 |
Anonymous voting by two-round public discussion F Hao, PYA Ryan, P Zieliński IET Information Security 4 (2), 62-67, 2010 | 194 | 2010 |
Online signature verification using a new extreme points warping technique H Feng, CC Wah Pattern Recognition Letters 24 (16), 2943-2951, 2003 | 187 | 2003 |
A fast search algorithm for a large fuzzy database F Hao, J Daugman, P Zielinski IEEE Transactions on Information Forensics and Security 3 (2), 203-212, 2008 | 151 | 2008 |
Combining cryptography with biometrics effectively F Hao, R Anderson, J Daugman University of Cambridge, Computer Laboratory, 2005 | 145 | 2005 |
A fair and robust voting system by broadcast D Khader, B Smyth, P Ryan, F Hao Lecture Notes in Informatics, 2012 | 122 | 2012 |
A 2-round anonymous veto protocol F Hao, P Zieliński International Workshop on Security Protocols, 202-211, 2006 | 122 | 2006 |
J-PAKE: authenticated key exchange without PKI F Hao, P Ryan Transactions on Computational Science XI: Special Issue on Security in …, 2010 | 112 | 2010 |
Towards bitcoin payment networks P McCorry, M Möser, SF Shahandasti, F Hao Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 108 | 2016 |
Real-world electronic voting: Design, analysis and deployment F Hao, PYA Ryan CRC Press, 2016 | 103 | 2016 |
Stealing PINs via mobile sensors: actual risk versus user perception M Mehrnezhad, E Toreini, S Shahandashti, F Hao International Journal of Information Security, 1-23, 2017 | 88 | 2017 |
Stealing PINs via Mobile Sensors: Actual Risk versus User Perception M Mehrnezhad, E Toreini, S Shahandashti, F Hao EuroUSEC 2016, 2016 | 88 | 2016 |
Password authenticated key exchange by juggling F Hao, PYA Ryan Security Protocols XVI: 16th International Workshop, Cambridge, UK, April 16 …, 2011 | 82 | 2011 |
Decentralized self-enforcing trust management system for social Internet of Things MA Azad, S Bag, F Hao, A Shalaginov IEEE Internet of Things Journal 7 (4), 2690-2703, 2020 | 74 | 2020 |
Consumer-facing technology fraud: Economics, attack methods and potential solutions MA Ali, MA Azad, MP Centeno, F Hao, A van Moorsel Future Generation Computer Systems 100, 408-427, 2019 | 74 | 2019 |
ZombieCoin 2.0: managing next-generation botnets using Bitcoin ST Ali, P McCorry, PHJ Lee, F Hao International Journal of Information Security, 1-12, 2017 | 74 | 2017 |