BibTeX records: Kun Peng

download as .bib file

@article{DBLP:journals/chb/PengZQL23,
  author       = {Kun Peng and
                  Yu Zheng and
                  Yuewei Qiu and
                  Qingrui Li},
  title        = {Rage of righteousness: Anger's role in promoting debunking effects
                  during the {COVID-19} pandemic},
  journal      = {Comput. Hum. Behav.},
  volume       = {148},
  pages        = {107896},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.chb.2023.107896},
  doi          = {10.1016/J.CHB.2023.107896},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/PengZQL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jits/ZhangPZK23,
  author       = {Licheng Zhang and
                  Kun Peng and
                  Xiangmo Zhao and
                  Asad J. Khattak},
  title        = {New fuel consumption model considering vehicular speed, acceleration,
                  and jerk},
  journal      = {J. Intell. Transp. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {174--186},
  year         = {2023},
  url          = {https://doi.org/10.1080/15472450.2021.2000406},
  doi          = {10.1080/15472450.2021.2000406},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jits/ZhangPZK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/Peng23,
  author       = {Kun Peng},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {How Secure Are The Main Real-World Mix Networks - Case Studies To
                  Explore Vulnerabilities And Usability},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {539--551},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3595785},
  doi          = {10.1145/3579856.3595785},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/Peng23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Peng23,
  author       = {Kun Peng},
  title        = {Receipt-Freeness By Flexible Usage Of Mix Network},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00013},
  doi          = {10.1109/ASIAJCIS60284.2023.00013},
  timestamp    = {Mon, 22 Jan 2024 19:57:57 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Peng23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pccnt/WeiHMPL23,
  author       = {Cheng Wei and
                  Fei Hui and
                  Kenan Mu and
                  Kun Peng and
                  Shanke Li},
  title        = {A Neural Network-Based Model with Conditional-Deactivation Structure
                  for Autonomous Vehicle Motivation Prediction at Intersections},
  booktitle    = {2023 International Conference on Power, Communication, Computing and
                  Networking Technologies, {PCCNT} 2023, Wuhan, China, September 24-25,
                  2023},
  pages        = {16:1--16:10},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3630138.3630428},
  doi          = {10.1145/3630138.3630428},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pccnt/WeiHMPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-11152,
  author       = {Kun Peng and
                  Lei Jiang and
                  Hao Peng and
                  Rui Liu and
                  Zhengtao Yu and
                  Jiaqian Ren and
                  Zhifeng Hao and
                  Philip S. Yu},
  title        = {Prompt Based Tri-Channel Graph Convolution Neural Network for Aspect
                  Sentiment Triplet Extraction},
  journal      = {CoRR},
  volume       = {abs/2312.11152},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.11152},
  doi          = {10.48550/ARXIV.2312.11152},
  eprinttype    = {arXiv},
  eprint       = {2312.11152},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-11152.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/PengS22,
  author       = {Kun Peng and
                  Pengjian Shang},
  title        = {Characterizing ordinal network of time series based on complexity-entropy
                  curve},
  journal      = {Pattern Recognit.},
  volume       = {124},
  pages        = {108464},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.patcog.2021.108464},
  doi          = {10.1016/J.PATCOG.2021.108464},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/PengS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ksem/PengSCLRJ22,
  author       = {Kun Peng and
                  Nannan Sun and
                  Jiahao Cao and
                  Rui Liu and
                  Jiaqian Ren and
                  Lei Jiang},
  editor       = {G{\'{e}}rard Memmi and
                  Baijian Yang and
                  Linghe Kong and
                  Tianwei Zhang and
                  Meikang Qiu},
  title        = {Prompt as a Knowledge Probe for Chinese Spelling Check},
  booktitle    = {Knowledge Science, Engineering and Management - 15th International
                  Conference, {KSEM} 2022, Singapore, August 6-8, 2022, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13370},
  pages        = {516--527},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10989-8\_41},
  doi          = {10.1007/978-3-031-10989-8\_41},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ksem/PengSCLRJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/Peng22,
  author       = {Kun Peng},
  title        = {Efficient Homomorphic E-Voting Based On Batch Proof Techniques - An
                  Improvement to Secure {MPC} Application},
  booktitle    = {19th Annual International Conference on Privacy, Security {\&}
                  Trust, {PST} 2022, Fredericton, NB, Canada, August 22-24, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/PST55820.2022.9851967},
  doi          = {10.1109/PST55820.2022.9851967},
  timestamp    = {Fri, 02 Sep 2022 18:51:56 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/Peng22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/Peng22,
  author       = {Kun Peng},
  editor       = {St{\'{e}}phane Devismes and
                  Franck Petit and
                  Karine Altisen and
                  Giuseppe Antonio Di Luna and
                  Antonio Fern{\'{a}}ndez Anta},
  title        = {Brief Announcement: Secure and Efficient Participant Authentication
                  - Application to Mobile E-Voting},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 24th
                  International Symposium, {SSS} 2022, Clermont-Ferrand, France, November
                  15-17, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13751},
  pages        = {364--369},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-21017-4\_28},
  doi          = {10.1007/978-3-031-21017-4\_28},
  timestamp    = {Fri, 11 Nov 2022 16:53:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sss/Peng22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ChenPSZYL21,
  author       = {Aiguo Chen and
                  Kun Peng and
                  Zexin Sha and
                  Xincen Zhou and
                  Zhen Yang and
                  Guoming Lu},
  title        = {ToAM: a task-oriented authentication model for UAVs based on blockchain},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2021},
  number       = {1},
  pages        = {166},
  year         = {2021},
  url          = {https://doi.org/10.1186/s13638-021-02039-6},
  doi          = {10.1186/S13638-021-02039-6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ChenPSZYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Peng21,
  author       = {Kun Peng},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Perfect {ZK} Argument of Knowledge of Discrete Logarithm in {A} Cyclic
                  Group with Unknown Order},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {33--40},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458287},
  doi          = {10.1145/3457338.3458287},
  timestamp    = {Wed, 16 Jun 2021 07:21:06 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Peng21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/Peng20,
  author       = {Kun Peng},
  title        = {To be attractive or to be authentic? How two competing motivations
                  influence self-presentation in online dating},
  journal      = {Internet Res.},
  volume       = {30},
  number       = {4},
  pages        = {1143--1165},
  year         = {2020},
  url          = {https://doi.org/10.1108/INTR-03-2019-0095},
  doi          = {10.1108/INTR-03-2019-0095},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/intr/Peng20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/Peng20,
  author       = {Kun Peng},
  editor       = {St{\'{e}}phane Devismes and
                  Neeraj Mittal},
  title        = {Brief Announcements: Verifiable Data Sharing in Distributed Computing},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 22nd
                  International Symposium, {SSS} 2020, Austin, TX, USA, November 18-21,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12514},
  pages        = {205--210},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64348-5\_16},
  doi          = {10.1007/978-3-030-64348-5\_16},
  timestamp    = {Wed, 25 Nov 2020 17:05:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sss/Peng20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Peng20,
  author       = {Kun Peng},
  editor       = {Ilsun You},
  title        = {Paid and Anonymous Usage of Cloud Software},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {308--320},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_23},
  doi          = {10.1007/978-3-030-65299-9\_23},
  timestamp    = {Sat, 12 Dec 2020 14:20:23 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Peng20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asicon/PengXS19,
  author       = {Kun Peng and
                  Yang Xu and
                  Mingqian Sun},
  title        = {Ultra-Low-Power {CMOS} Temperature Sensor for {UHF} {RFID} Systems},
  booktitle    = {13th {IEEE} International Conference on ASIC, {ASICON} 2019, Chongqing,
                  China, October 29 - November 1, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ASICON47005.2019.8983674},
  doi          = {10.1109/ASICON47005.2019.8983674},
  timestamp    = {Wed, 12 Feb 2020 16:13:42 +0100},
  biburl       = {https://dblp.org/rec/conf/asicon/PengXS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icls/MadaioPOC18,
  author       = {Michael Madaio and
                  Kun Peng and
                  Amy Ogan and
                  Justine Cassell},
  editor       = {Manolis Mavrikis and
                  Kaska Porayska{-}Pomsta},
  title        = {A Climate of Support: {A} Process-Oriented Analysis of the Impact
                  of Rapport on Peer Tutoring},
  booktitle    = {Rethinking learning in the digital age: Making the Learning Sciences
                  count - Proceedings of the 13th International Conference of the Learning
                  Sciences, {ICLS} 2018, London, UK, June 23-27, 2018},
  publisher    = {International Society of the Learning Sciences},
  year         = {2018},
  url          = {https://repository.isls.org/handle/1/909},
  timestamp    = {Thu, 06 May 2021 10:07:13 +0200},
  biburl       = {https://dblp.org/rec/conf/icls/MadaioPOC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wocc/PengLZKY16,
  author       = {Kun Peng and
                  Qing Li and
                  Min Zhang and
                  Xiaoyue Kong and
                  Youli Yuan},
  title        = {Fiber optic perimeter detection based on human engineering},
  booktitle    = {25th Wireless and Optical Communication Conference, {WOCC} 2016, Chengdu,
                  China, May 21-23, 2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/WOCC.2016.7506584},
  doi          = {10.1109/WOCC.2016.7506584},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wocc/PengLZKY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Peng14,
  author       = {Kun Peng},
  title        = {Assumptions and conditions for mix networks: analysis, clarification
                  and improvement},
  journal      = {Int. J. Secur. Networks},
  volume       = {9},
  number       = {3},
  pages        = {133--143},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJSN.2014.065719},
  doi          = {10.1504/IJSN.2014.065719},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Peng14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Peng14,
  author       = {Kun Peng},
  title        = {Efficient homomorphic sealed-bid auction free of bid validity check
                  and equality test},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {1},
  pages        = {64--76},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.549},
  doi          = {10.1002/SEC.549},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Peng14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Peng13,
  author       = {Kun Peng},
  title        = {Efficient proof of bid validity with untrusted verifier in homomorphic
                  e-auction},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {11--21},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0076},
  doi          = {10.1049/IET-IFS.2012.0076},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Peng13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Peng13,
  author       = {Kun Peng},
  title        = {A shuffle to achieve high efficiency through pre-computation and batch
                  verification},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {337--345},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0193-x},
  doi          = {10.1007/S10207-013-0193-X},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Peng13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/Peng13,
  author       = {Kun Peng},
  title        = {A Secure Network for Mobile Wireless Service},
  journal      = {J. Inf. Process. Syst.},
  volume       = {9},
  number       = {2},
  pages        = {247--258},
  year         = {2013},
  url          = {https://doi.org/10.3745/JIPS.2013.9.2.247},
  doi          = {10.3745/JIPS.2013.9.2.247},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/Peng13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/YingPHGKZ13,
  author       = {Xianghua Ying and
                  Kun Peng and
                  Yongbo Hou and
                  Sheng Guan and
                  Jing Kong and
                  Hongbin Zha},
  title        = {Self-Calibration of Catadioptric Camera with Two Planar Mirrors from
                  Silhouettes},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {35},
  number       = {5},
  pages        = {1206--1220},
  year         = {2013},
  url          = {https://doi.org/10.1109/TPAMI.2012.195},
  doi          = {10.1109/TPAMI.2012.195},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pami/YingPHGKZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Peng13,
  author       = {Kun Peng},
  editor       = {Amr M. Youssef and
                  Abderrahmane Nitaj and
                  Aboul Ella Hassanien},
  title        = {Modification and Optimisation of an ElGamal-Based {PVSS} Scheme},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
                  on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7918},
  pages        = {311--327},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38553-7\_18},
  doi          = {10.1007/978-3-642-38553-7\_18},
  timestamp    = {Fri, 31 Jan 2020 16:14:16 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Peng13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/PengY13,
  author       = {Kun Peng and
                  Li Yi},
  editor       = {Amr M. Youssef and
                  Abderrahmane Nitaj and
                  Aboul Ella Hassanien},
  title        = {Studying a Range Proof Technique - Exception and Optimisation},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
                  on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7918},
  pages        = {328--341},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38553-7\_19},
  doi          = {10.1007/978-3-642-38553-7\_19},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/PengY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/PengH13,
  author       = {Kun Peng and
                  Matt Henricksen},
  editor       = {Lorenzo Cavallaro and
                  Dieter Gollmann},
  title        = {Multiplicative Homomorphic E-Auction with Formally Provable Security},
  booktitle    = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical
                  Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013,
                  Heraklion, Greece, May 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7886},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38530-8\_1},
  doi          = {10.1007/978-3-642-38530-8\_1},
  timestamp    = {Sat, 09 Apr 2022 12:44:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/PengH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cg/MaimoneBPF12,
  author       = {Andrew Maimone and
                  Jonathan Bidwell and
                  Kun Peng and
                  Henry Fuchs},
  title        = {Enhanced personal autostereoscopic telepresence system using commodity
                  depth cameras},
  journal      = {Comput. Graph.},
  volume       = {36},
  number       = {7},
  pages        = {791--807},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cag.2012.04.011},
  doi          = {10.1016/J.CAG.2012.04.011},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cg/MaimoneBPF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Peng12,
  author       = {Kun Peng},
  title        = {Attack against a batch zero-knowledge proof system},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--5},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0290},
  doi          = {10.1049/IET-IFS.2011.0290},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Peng12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Peng12a,
  author       = {Kun Peng},
  title        = {Critical survey of existing publicly verifiable secret sharing schemes},
  journal      = {{IET} Inf. Secur.},
  volume       = {6},
  number       = {4},
  pages        = {249--257},
  year         = {2012},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0201},
  doi          = {10.1049/IET-IFS.2011.0201},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Peng12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Peng12,
  author       = {Kun Peng},
  title        = {Threshold distributed access control with public verification: a practical
                  application of {PVSS}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {11},
  number       = {1},
  pages        = {23--31},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10207-011-0151-4},
  doi          = {10.1007/S10207-011-0151-4},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Peng12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/Peng12,
  author       = {Kun Peng},
  title        = {How to communicate anonymously in a network: study and optimisation
                  of efficiency and security of anonymous communication networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {7},
  number       = {3},
  pages        = {133--147},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJSN.2012.052525},
  doi          = {10.1504/IJSN.2012.052525},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/Peng12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/Peng12,
  author       = {Kun Peng},
  title        = {Attack and Correction: How to Design a Secure and Efficient Mix Network},
  journal      = {J. Inf. Process. Syst.},
  volume       = {8},
  number       = {1},
  pages        = {175},
  year         = {2012},
  url          = {https://doi.org/10.3745/JIPS.2012.8.1.175},
  doi          = {10.3745/JIPS.2012.8.1.175},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/Peng12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/Peng12a,
  author       = {Kun Peng},
  title        = {Efficient and General {PVSS} Based on ElGamal Encryption},
  journal      = {J. Inf. Process. Syst.},
  volume       = {8},
  number       = {2},
  pages        = {375},
  year         = {2012},
  url          = {https://doi.org/10.3745/JIPS.2012.8.2.375},
  doi          = {10.3745/JIPS.2012.8.2.375},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jips/Peng12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/LiPYZ12,
  author       = {Bo Li and
                  Kun Peng and
                  Xianghua Ying and
                  Hongbin Zha},
  title        = {Vanishing point detection using cascaded 1D Hough Transform from single
                  images},
  journal      = {Pattern Recognit. Lett.},
  volume       = {33},
  number       = {1},
  pages        = {1--8},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.patrec.2011.09.027},
  doi          = {10.1016/J.PATREC.2011.09.027},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/LiPYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengH12,
  author       = {Kun Peng and
                  Matt Henricksen},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {How to Fix Two RSA-Based {PVSS} Schemes - Exploration and Solution},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_17},
  doi          = {10.1007/978-3-642-31448-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdke/Peng12,
  author       = {Kun Peng},
  editor       = {Yang Xiang and
                  Mukaddim Pathan and
                  Xiaohui Tao and
                  Hua Wang},
  title        = {A Secure and Efficient Mix Network Especially Suitable for E-Voting},
  booktitle    = {Data and Knowledge Engineering - Third International Conference, {ICDKE}
                  2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7696},
  pages        = {161--174},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34679-8\_16},
  doi          = {10.1007/978-3-642-34679-8\_16},
  timestamp    = {Thu, 09 Mar 2023 09:06:09 +0100},
  biburl       = {https://dblp.org/rec/conf/icdke/Peng12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idcs/PengZ12,
  author       = {Kun Peng and
                  Yuexin Zhang},
  editor       = {Yang Xiang and
                  Mukaddim Pathan and
                  Xiaohui Tao and
                  Hua Wang},
  title        = {A Secure Mix Network with an Efficient Validity Verification Mechanism},
  booktitle    = {Internet and Distributed Computing Systems - 5th International Conference,
                  {IDCS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7646},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34883-9\_7},
  doi          = {10.1007/978-3-642-34883-9\_7},
  timestamp    = {Thu, 09 Mar 2023 09:06:05 +0100},
  biburl       = {https://dblp.org/rec/conf/idcs/PengZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/PengDB11,
  author       = {Kun Peng and
                  Ed Dawson and
                  Feng Bao},
  title        = {Modification and optimisation of a shuffling scheme: stronger security,
                  formal analysis and higher efficiency},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {1},
  pages        = {33--47},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-010-0117-y},
  doi          = {10.1007/S10207-010-0117-Y},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/PengDB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Peng11,
  author       = {Kun Peng},
  title        = {A general and efficient countermeasure to relation attacks in mix-based
                  e-voting},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {1},
  pages        = {49--60},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-010-0122-1},
  doi          = {10.1007/S10207-010-0122-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/Peng11,
  author       = {Kun Peng},
  title        = {Efficient Proof of Vote Validity Without Honest-Verifier Assumption
                  in Homomorphic E-Voting},
  journal      = {J. Inf. Process. Syst.},
  volume       = {7},
  number       = {3},
  pages        = {549--560},
  year         = {2011},
  url          = {https://doi.org/10.3745/JIPS.2011.7.3.549},
  doi          = {10.3745/JIPS.2011.7.3.549},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/Peng11,
  author       = {Kun Peng},
  title        = {Efficient {VSS} free of computational assumption},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {71},
  number       = {12},
  pages        = {1592--1597},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jpdc.2011.07.009},
  doi          = {10.1016/J.JPDC.2011.07.009},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/Peng11,
  author       = {Kun Peng},
  title        = {An efficient shuffling based eVoting scheme},
  journal      = {J. Syst. Softw.},
  volume       = {84},
  number       = {6},
  pages        = {906--922},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jss.2011.01.001},
  doi          = {10.1016/J.JSS.2011.01.001},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/Peng11,
  author       = {Kun Peng},
  title        = {Survey, analysis and re-evaluation - How efficient and secure a mix
                  network can be},
  booktitle    = {11th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2011, Pafos, Cyprus, 31 August-2 September 2011},
  pages        = {249--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CIT.2011.43},
  doi          = {10.1109/CIT.2011.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Peng11,
  author       = {Kun Peng},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Impracticality of Efficient {PVSS} in Real Life Security Standard
                  (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {451--455},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_34},
  doi          = {10.1007/978-3-642-22497-3\_34},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/PengB11,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Wenyu Qu and
                  Kai Lin and
                  Yanming Shen and
                  Weisong Shi and
                  D. Frank Hsu and
                  Xiaolong Jin and
                  Francis C. M. Lau and
                  Junfeng Xu},
  title        = {Analysing a Batch Range Proof to Address a Security Concern},
  booktitle    = {14th {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2011, Dalian, China, August 24-26, 2011},
  pages        = {68--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSE.2011.26},
  doi          = {10.1109/CSE.2011.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/PengB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Peng11,
  author       = {Kun Peng},
  editor       = {Aggelos Kiayias},
  title        = {A General, Flexible and Efficient Proof of Inclusion and Exclusion},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_3},
  doi          = {10.1007/978-3-642-19074-2\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Peng11,
  author       = {Kun Peng},
  editor       = {Yingjiu Li},
  title        = {Verifiable Secret Sharing with Comprehensive and Efficient Public
                  Verification},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {217--230},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_17},
  doi          = {10.1007/978-3-642-22348-8\_17},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/Peng11,
  author       = {Kun Peng},
  editor       = {Liqun Chen},
  title        = {A Secure and Efficient Proof of Integer in an Interval Range},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_7},
  doi          = {10.1007/978-3-642-25516-8\_7},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/Peng11,
  author       = {Kun Peng},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {A General, Flexible and Efficient Proof of Inclusion and Exclusion},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_12},
  doi          = {10.1007/978-3-642-32298-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/Peng11,
  author       = {Kun Peng},
  editor       = {Sang{-}Soo Yeo and
                  Binod Vaidya and
                  George A. Papadopoulos},
  title        = {Investigation and Survey of Secret Sharing in Verifiable Distributed
                  Systems},
  booktitle    = {12th International Conference on Parallel and Distributed Computing,
                  Applications and Technologies, {PDCAT} 2011, Gwangju, Korea, October
                  20-22, 2011},
  pages        = {342--347},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PDCAT.2011.47},
  doi          = {10.1109/PDCAT.2011.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/Peng11a,
  author       = {Kun Peng},
  editor       = {Sang{-}Soo Yeo and
                  Binod Vaidya and
                  George A. Papadopoulos},
  title        = {Secure E-Commerce Based on Distributed Processing},
  booktitle    = {12th International Conference on Parallel and Distributed Computing,
                  Applications and Technologies, {PDCAT} 2011, Gwangju, Korea, October
                  20-22, 2011},
  pages        = {406--411},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PDCAT.2011.74},
  doi          = {10.1109/PDCAT.2011.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/Peng11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/Peng11,
  author       = {Kun Peng},
  editor       = {Claudio A. Ardagna and
                  Jianying Zhou},
  title        = {Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless
                  Network},
  booktitle    = {Information Security Theory and Practice. Security and Privacy of
                  Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6633},
  pages        = {351--360},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21040-2\_25},
  doi          = {10.1007/978-3-642-21040-2\_25},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-5449,
  author       = {Kun Peng},
  title        = {Failure of {A} Mix Network},
  journal      = {CoRR},
  volume       = {abs/1101.5449},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.5449},
  eprinttype    = {arXiv},
  eprint       = {1101.5449},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-5449.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  title        = {Achieving High Efficiency in Membership Proof without Compromising
                  or Weakening any Security Property},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {1044--1049},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.191},
  doi          = {10.1109/CIT.2010.191},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Batch Range Proof for Practical Small Ranges},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {114--130},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_8},
  doi          = {10.1007/978-3-642-12678-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/YingPRZ10,
  author       = {Xianghua Ying and
                  Kun Peng and
                  Ren Ren and
                  Hongbin Zha},
  title        = {Geometric properties of multiple reflections in catadioptric camera
                  with two planar mirrors},
  booktitle    = {The Twenty-Third {IEEE} Conference on Computer Vision and Pattern
                  Recognition, {CVPR} 2010, San Francisco, CA, USA, 13-18 June 2010},
  pages        = {1126--1132},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CVPR.2010.5540088},
  doi          = {10.1109/CVPR.2010.5540088},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/YingPRZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {A Secure {RFID} Ticket System for Public Transport},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {350--357},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_27},
  doi          = {10.1007/978-3-642-13739-6\_27},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/PengHRYZ10,
  author       = {Kun Peng and
                  Lulu Hou and
                  Ren Ren and
                  Xianghua Ying and
                  Hongbin Zha},
  title        = {Single View Metrology Along Orthogonal Directions},
  booktitle    = {20th International Conference on Pattern Recognition, {ICPR} 2010,
                  Istanbul, Turkey, 23-26 August 2010},
  pages        = {1658--1661},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICPR.2010.410},
  doi          = {10.1109/ICPR.2010.410},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpr/PengHRYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvc/LiPYZ10,
  author       = {Bo Li and
                  Kun Peng and
                  Xianghua Ying and
                  Hongbin Zha},
  editor       = {George Bebis and
                  Richard D. Boyle and
                  Bahram Parvin and
                  Darko Koracin and
                  Ronald Chung and
                  Riad I. Hammoud and
                  Muhammad Hussain and
                  Kar{-}Han Tan and
                  Roger Crawfis and
                  Daniel Thalmann and
                  David L. Kao and
                  Lisa Avila},
  title        = {Simultaneous Vanishing Point Detection and Camera Calibration from
                  Single Images},
  booktitle    = {Advances in Visual Computing - 6th International Symposium, {ISVC}
                  2010, Las Vegas, NV, USA, November 29 - December 1, 2010, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6454},
  pages        = {151--160},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17274-8\_15},
  doi          = {10.1007/978-3-642-17274-8\_15},
  timestamp    = {Thu, 16 Mar 2023 20:00:32 +0100},
  biburl       = {https://dblp.org/rec/conf/isvc/LiPYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Efficient Multiplicative Homomorphic E-Voting},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {381--393},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_32},
  doi          = {10.1007/978-3-642-18178-8\_32},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Efficient Proof of Validity of Votes in Homomorphic E-Voting},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {17--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.25},
  doi          = {10.1109/NSS.2010.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Formal and Precise Analysis of Soundness of Several Shuffling Schemes},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {133--143},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_9},
  doi          = {10.1007/978-3-642-16280-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Vulnerability of a Non-membership Proof Scheme},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {419--422},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Reijo Savola and
                  Masaru Takesue and
                  Rainer Falk and
                  Manuela Popescu},
  title        = {A Shuffling Scheme with Strict and Strong Security},
  booktitle    = {Fourth International Conference on Emerging Security Information Systems
                  and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010},
  pages        = {201--206},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SECURWARE.2010.40},
  doi          = {10.1109/SECURWARE.2010.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securware/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {An Efficient Range Proof Scheme},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {826--833},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.125},
  doi          = {10.1109/SOCIALCOM.2010.125},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Miguel Soriano},
  title        = {Efficiency Improvement of Homomorphic E-Auction},
  booktitle    = {Trust, Privacy and Security in Digital Business, 7th International
                  Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6264},
  pages        = {238--249},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15152-1\_21},
  doi          = {10.1007/978-3-642-15152-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/PengB09,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Fabio Martinelli and
                  Bart Preneel},
  title        = {Practicalization of a Range Test and Its Application to E-Auction},
  booktitle    = {Public Key Infrastructures, Services and Applications - 6th European
                  Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6391},
  pages        = {179--194},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16441-5\_12},
  doi          = {10.1007/978-3-642-16441-5\_12},
  timestamp    = {Sat, 19 Oct 2019 19:58:51 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/PengB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Peng09,
  author       = {Kun Peng},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {A Hybrid E-Voting Scheme},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {195--206},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_18},
  doi          = {10.1007/978-3-642-00843-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Peng09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/robio/YingPZ09,
  author       = {Xianghua Ying and
                  Kun Peng and
                  Hongbin Zha},
  title        = {Walkthrough in large environments using concatenated panoramas},
  booktitle    = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO}
                  2009, December 19-13, 2009, Guilin, Guangxi, China},
  pages        = {286--291},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ROBIO.2009.5420659},
  doi          = {10.1109/ROBIO.2009.5420659},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/robio/YingPZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/PengB09,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Peter Y. A. Ryan and
                  Berry Schoenmakers},
  title        = {A Design of Secure Preferential E-Voting},
  booktitle    = {E-Voting and Identity, Second International Conference, VoteID 2009,
                  Luxembourg, September 7-8, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5767},
  pages        = {141--156},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04135-8\_9},
  doi          = {10.1007/978-3-642-04135-8\_9},
  timestamp    = {Thu, 27 Feb 2020 13:11:16 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/PengB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PengB09,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness
                  and {ZK} Privacy},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {118--132},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_10},
  doi          = {10.1007/978-3-642-10838-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PengB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acj/PengBD08,
  author       = {Kun Peng and
                  Feng Bao and
                  Ed Dawson},
  title        = {Correct, Private, Flexible and Efficient Range Test},
  journal      = {J. Res. Pract. Inf. Technol.},
  volume       = {40},
  number       = {4},
  pages        = {275--289},
  year         = {2008},
  url          = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.4.275.pdf},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acj/PengBD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PengB08,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Batch {ZK} Proof and Verification of {OR} Logic},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {141--156},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_13},
  doi          = {10.1007/978-3-642-01440-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/PengB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PengB08a,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Correction, Optimisation and Secure and Efficient Application of {PBD}
                  Shuffling},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {425--437},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_31},
  doi          = {10.1007/978-3-642-01440-6\_31},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/PengB08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengB08,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {Efficient Vote Validity Check in Homomorphic Electronic Voting},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {202--217},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_13},
  doi          = {10.1007/978-3-642-00730-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/PengBD07,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson},
  title        = {Batch zero-knowledge proof and verification and its applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {6},
  year         = {2007},
  url          = {https://doi.org/10.1145/1237500.1237502},
  doi          = {10.1145/1237500.1237502},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/PengBD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/PengD07,
  author       = {Kun Peng and
                  Ed Dawson},
  editor       = {Ljiljana Brankovic and
                  Paul D. Coddington and
                  John F. Roddick and
                  Chris Steketee and
                  James R. Warren and
                  Andrew L. Wendelborn},
  title        = {A Range Test Secure in the Active Adversary Model},
  booktitle    = {{ACSW} Frontiers 2007. Proceedings of the Fifth Australasian Symposium
                  on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian
                  Information Security Workshop (Privacy Enhancing Technologies) {(AISW}
                  2007), and the Australasian Workshop on Health Knowledge Management
                  and Discovery {(HKMD} 2007). Proceedings, Ballarat, Victoria, Australia,
                  January 30 - February 2, 2007},
  series       = {{CRPIT}},
  volume       = {68},
  pages        = {159--162},
  publisher    = {Australian Computer Society},
  year         = {2007},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV68Peng.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/PengD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Peng07,
  author       = {Kun Peng},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {Secure Multiparty Computation of {DNF}},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {254--268},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_20},
  doi          = {10.1007/978-3-540-77048-0\_20},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/Peng07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/PengD07,
  author       = {Kun Peng and
                  Ed Dawson},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {209--224},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_17},
  doi          = {10.1007/978-3-540-72163-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/PengD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PengBD06,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson},
  title        = {Batch verification of validity of bids in homomorphic e-auction},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {15},
  pages        = {2798--2805},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2005.10.031},
  doi          = {10.1016/J.COMCOM.2005.10.031},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/PengBD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengBDO06,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Eiji Okamoto},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {A Novel Range Test},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {247--258},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_21},
  doi          = {10.1007/11780656\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengBDO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengNDD06,
  author       = {Kun Peng and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Yvo Desmedt and
                  Ed Dawson},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Klein Bottle Routing: An Alternative to Onion Routing and Mix Network},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {296--309},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_25},
  doi          = {10.1007/11927587\_25},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengNDD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PengBD06,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {Sealed-Bid Micro Auctions},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {246--257},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_21},
  doi          = {10.1007/0-387-33406-8\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PengBD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/PengCR06,
  author       = {Kun Peng and
                  Liming Chen and
                  Su Ruan},
  editor       = {Jianhua Ma and
                  Hai Jin and
                  Laurence Tianruo Yang and
                  Jeffrey J. P. Tsai},
  title        = {A Smart Identification Card System Using Facial Biometric: From Architecture
                  to Application},
  booktitle    = {Ubiquitous Intelligence and Computing, Third International Conference,
                  {UIC} 2006, Wuhan, China, September 3-6, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4159},
  pages        = {61--70},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11833529\_7},
  doi          = {10.1007/11833529\_7},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/PengCR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YaoPD05,
  author       = {Ming Yao and
                  Kun Peng and
                  Ed Dawson},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile
                  Agents},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {158--169},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_14},
  doi          = {10.1007/11506157\_14},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YaoPD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/avss/PengCR05,
  author       = {Kun Peng and
                  Liming Chen and
                  Su Ruan},
  title        = {A novel scheme of face verification using active appearance models},
  booktitle    = {Advanced Video and Signal Based Surveillance, 2005 {IEEE} International
                  Conference on Video and Signal Based Surveillance (AVSS'05), 15-16
                  September 2005, Como, Italy},
  pages        = {247--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/AVSS.2005.1577275},
  doi          = {10.1109/AVSS.2005.1577275},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/avss/PengCR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/PengDNOL05,
  author       = {Kun Peng and
                  Ed Dawson and
                  Juanma Gonz{\'{a}}lez Nieto and
                  Eiji Okamoto and
                  Javier L{\'{o}}pez},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {A Novel Method to Maintain Privacy in Mobile Agent Applications},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {247--260},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_21},
  doi          = {10.1007/11599371\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/PengDNOL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PengBD05,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Victor Shoup},
  title        = {Simple and Efficient Shuffling with Provable Correctness and {ZK}
                  Privacy},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {188--204},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_12},
  doi          = {10.1007/11535218\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PengBD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icapr/PengCRK05,
  author       = {Kun Peng and
                  Liming Chen and
                  Su Ruan and
                  Georgy Kukharev},
  editor       = {Peng Wang and
                  Maneesha Singh and
                  Chidanand Apt{\'{e}} and
                  Petra Perner},
  title        = {A Robust and Efficient Algorithm for Eye Detection on Gray Intensity
                  Face},
  booktitle    = {Pattern Recognition and Image Analysis, Third International Conference
                  on Advances in Pattern Recognition, {ICAPR} 2005, Bath, UK, August
                  22-25, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3687},
  pages        = {302--308},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552499\_34},
  doi          = {10.1007/11552499\_34},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icapr/PengCRK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PengBDL05,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Byoungcheon Lee},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {Ciphertext Comparison, a New Solution to the Millionaire Problem},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_8},
  doi          = {10.1007/11602897\_8},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/PengBDL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/PengBD05,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali
                  Encryption},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {374--388},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_27},
  doi          = {10.1007/11556992\_27},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/PengBD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/PengBD05,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic
                  Secret Sharing},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {84--98},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_7},
  doi          = {10.1007/11554868\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/PengBD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PengBD05,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson},
  title        = {Batch Verification of Validity of Bids in Homomorphic E-auction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PengBD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AdityaPBDL04,
  author       = {Riza Aditya and
                  Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Byoungcheon Lee},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Batch Verification for Equality of Discrete Logarithms and Threshold
                  Decryptions},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {494--508},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_36},
  doi          = {10.1007/978-3-540-24852-1\_36},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AdityaPBDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cau/PengABDL04,
  author       = {Kun Peng and
                  Riza Aditya and
                  Colin Boyd and
                  Ed Dawson and
                  Byoungcheon Lee},
  editor       = {Ed Dawson and
                  Wolfgang Klemm},
  title        = {A Secure and Efficient Mix-Network using Extended Binary Mixing Gate},
  booktitle    = {Cryptographic Algorithms and their Uses - 2004, International Workshop,
                  Gold Coast, Australia, July 5-6, 2004, Proceedings},
  pages        = {57--71},
  publisher    = {Queensland University of Technology},
  year         = {2004},
  timestamp    = {Fri, 16 Jul 2004 13:22:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cau/PengABDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/YaoPHFD04,
  author       = {Ming Yao and
                  Kun Peng and
                  Matthew Henricksen and
                  Ernest Foo and
                  Ed Dawson},
  editor       = {Kurt Bauknecht and
                  Martin Bichler and
                  Birgit Pr{\"{o}}ll},
  title        = {Using Recoverable Key Commitment to Defend Against Truncation Attacks
                  in Mobile Agents},
  booktitle    = {E-Commerce and Web Technologies, 5th International Conference, EC-Web
                  2004, Zaragoza, Spain, August 31-September 3, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3182},
  pages        = {164--173},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30077-9\_17},
  doi          = {10.1007/978-3-540-30077-9\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ecweb/YaoPHFD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengBDL04,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Byoungcheon Lee},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {An Efficient and Verifiable Solution to the Millionaire Problem},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {51--66},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_6},
  doi          = {10.1007/11496618\_6},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengBDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PengABDL04,
  author       = {Kun Peng and
                  Riza Aditya and
                  Colin Boyd and
                  Ed Dawson and
                  Byoungcheon Lee},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {Multiplicative Homomorphic E-Voting},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_6},
  doi          = {10.1007/978-3-540-30556-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PengABDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PengBDV04,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Kapalee Viswanathan},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {A Correct, Private, and Efficient Mix Network},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {439--454},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_32},
  doi          = {10.1007/978-3-540-24632-9\_32},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PengBDV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/PengBDV03,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Kapali Viswanathan},
  editor       = {Chris W. Johnson and
                  Paul Montague and
                  Chris Steketee},
  title        = {Five Sealed-bid Auction Models},
  booktitle    = {{ACSW} Frontiers 2003, 2003 {ACSW} Workshops - the Australasian Information
                  Security Workshop {(AISW)} and the Workshop on Wearable, Invisible,
                  Context-Aware, Ambient, Pervasive and Ubiquitous Computing (WICAPUC),
                  Adelaide, South Australia, February 2003},
  series       = {{CRPIT}},
  volume       = {21},
  pages        = {77--86},
  publisher    = {Australian Computer Society},
  year         = {2003},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV21APeng.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/PengBDV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PengBDV03,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Kapalee Viswanathan},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {244--256},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_19},
  doi          = {10.1007/978-3-540-24591-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PengBDV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YaoFPD03,
  author       = {Ming Yao and
                  Ernest Foo and
                  Kun Peng and
                  Ed Dawson},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {An Improved Forward Integrity Protocol for Mobile Agents},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {272--285},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_21},
  doi          = {10.1007/978-3-540-24591-9\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YaoFPD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PengBDV02,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Kapali Viswanathan},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {147--159},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_13},
  doi          = {10.1007/3-540-36159-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/PengBDV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengBDV02,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Kapali Viswanathan},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Non-interactive Auction Schemewith Strong Privacy},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {407--420},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_28},
  doi          = {10.1007/3-540-36552-4\_28},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengBDV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/PeiCP00,
  author       = {Pengjun Pei and
                  Guohua Cui and
                  Kun Peng},
  title        = {On a Session Key Compromise Problem in {[KC95]} protocol},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {34},
  number       = {3},
  pages        = {16--18},
  year         = {2000},
  url          = {https://doi.org/10.1145/506117.506120},
  doi          = {10.1145/506117.506120},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/PeiCP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics