Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kun Peng
@article{DBLP:journals/chb/PengZQL23, author = {Kun Peng and Yu Zheng and Yuewei Qiu and Qingrui Li}, title = {Rage of righteousness: Anger's role in promoting debunking effects during the {COVID-19} pandemic}, journal = {Comput. Hum. Behav.}, volume = {148}, pages = {107896}, year = {2023}, url = {https://doi.org/10.1016/j.chb.2023.107896}, doi = {10.1016/J.CHB.2023.107896}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/PengZQL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jits/ZhangPZK23, author = {Licheng Zhang and Kun Peng and Xiangmo Zhao and Asad J. Khattak}, title = {New fuel consumption model considering vehicular speed, acceleration, and jerk}, journal = {J. Intell. Transp. Syst.}, volume = {27}, number = {2}, pages = {174--186}, year = {2023}, url = {https://doi.org/10.1080/15472450.2021.2000406}, doi = {10.1080/15472450.2021.2000406}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jits/ZhangPZK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/Peng23, author = {Kun Peng}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {539--551}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3595785}, doi = {10.1145/3579856.3595785}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/Peng23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Peng23, author = {Kun Peng}, title = {Receipt-Freeness By Flexible Usage Of Mix Network}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {9--16}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00013}, doi = {10.1109/ASIAJCIS60284.2023.00013}, timestamp = {Mon, 22 Jan 2024 19:57:57 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Peng23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pccnt/WeiHMPL23, author = {Cheng Wei and Fei Hui and Kenan Mu and Kun Peng and Shanke Li}, title = {A Neural Network-Based Model with Conditional-Deactivation Structure for Autonomous Vehicle Motivation Prediction at Intersections}, booktitle = {2023 International Conference on Power, Communication, Computing and Networking Technologies, {PCCNT} 2023, Wuhan, China, September 24-25, 2023}, pages = {16:1--16:10}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3630138.3630428}, doi = {10.1145/3630138.3630428}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pccnt/WeiHMPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-11152, author = {Kun Peng and Lei Jiang and Hao Peng and Rui Liu and Zhengtao Yu and Jiaqian Ren and Zhifeng Hao and Philip S. Yu}, title = {Prompt Based Tri-Channel Graph Convolution Neural Network for Aspect Sentiment Triplet Extraction}, journal = {CoRR}, volume = {abs/2312.11152}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.11152}, doi = {10.48550/ARXIV.2312.11152}, eprinttype = {arXiv}, eprint = {2312.11152}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-11152.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/PengS22, author = {Kun Peng and Pengjian Shang}, title = {Characterizing ordinal network of time series based on complexity-entropy curve}, journal = {Pattern Recognit.}, volume = {124}, pages = {108464}, year = {2022}, url = {https://doi.org/10.1016/j.patcog.2021.108464}, doi = {10.1016/J.PATCOG.2021.108464}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/PengS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ksem/PengSCLRJ22, author = {Kun Peng and Nannan Sun and Jiahao Cao and Rui Liu and Jiaqian Ren and Lei Jiang}, editor = {G{\'{e}}rard Memmi and Baijian Yang and Linghe Kong and Tianwei Zhang and Meikang Qiu}, title = {Prompt as a Knowledge Probe for Chinese Spelling Check}, booktitle = {Knowledge Science, Engineering and Management - 15th International Conference, {KSEM} 2022, Singapore, August 6-8, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13370}, pages = {516--527}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10989-8\_41}, doi = {10.1007/978-3-031-10989-8\_41}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ksem/PengSCLRJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/Peng22, author = {Kun Peng}, title = {Efficient Homomorphic E-Voting Based On Batch Proof Techniques - An Improvement to Secure {MPC} Application}, booktitle = {19th Annual International Conference on Privacy, Security {\&} Trust, {PST} 2022, Fredericton, NB, Canada, August 22-24, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/PST55820.2022.9851967}, doi = {10.1109/PST55820.2022.9851967}, timestamp = {Fri, 02 Sep 2022 18:51:56 +0200}, biburl = {https://dblp.org/rec/conf/pst/Peng22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/Peng22, author = {Kun Peng}, editor = {St{\'{e}}phane Devismes and Franck Petit and Karine Altisen and Giuseppe Antonio Di Luna and Antonio Fern{\'{a}}ndez Anta}, title = {Brief Announcement: Secure and Efficient Participant Authentication - Application to Mobile E-Voting}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 24th International Symposium, {SSS} 2022, Clermont-Ferrand, France, November 15-17, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13751}, pages = {364--369}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-21017-4\_28}, doi = {10.1007/978-3-031-21017-4\_28}, timestamp = {Fri, 11 Nov 2022 16:53:16 +0100}, biburl = {https://dblp.org/rec/conf/sss/Peng22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ChenPSZYL21, author = {Aiguo Chen and Kun Peng and Zexin Sha and Xincen Zhou and Zhen Yang and Guoming Lu}, title = {ToAM: a task-oriented authentication model for UAVs based on blockchain}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2021}, number = {1}, pages = {166}, year = {2021}, url = {https://doi.org/10.1186/s13638-021-02039-6}, doi = {10.1186/S13638-021-02039-6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ChenPSZYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Peng21, author = {Kun Peng}, editor = {Keita Emura and Yuntao Wang}, title = {Perfect {ZK} Argument of Knowledge of Discrete Logarithm in {A} Cyclic Group with Unknown Order}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {33--40}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458287}, doi = {10.1145/3457338.3458287}, timestamp = {Wed, 16 Jun 2021 07:21:06 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Peng21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/Peng20, author = {Kun Peng}, title = {To be attractive or to be authentic? How two competing motivations influence self-presentation in online dating}, journal = {Internet Res.}, volume = {30}, number = {4}, pages = {1143--1165}, year = {2020}, url = {https://doi.org/10.1108/INTR-03-2019-0095}, doi = {10.1108/INTR-03-2019-0095}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/intr/Peng20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/Peng20, author = {Kun Peng}, editor = {St{\'{e}}phane Devismes and Neeraj Mittal}, title = {Brief Announcements: Verifiable Data Sharing in Distributed Computing}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 22nd International Symposium, {SSS} 2020, Austin, TX, USA, November 18-21, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12514}, pages = {205--210}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64348-5\_16}, doi = {10.1007/978-3-030-64348-5\_16}, timestamp = {Wed, 25 Nov 2020 17:05:58 +0100}, biburl = {https://dblp.org/rec/conf/sss/Peng20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Peng20, author = {Kun Peng}, editor = {Ilsun You}, title = {Paid and Anonymous Usage of Cloud Software}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {308--320}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_23}, doi = {10.1007/978-3-030-65299-9\_23}, timestamp = {Sat, 12 Dec 2020 14:20:23 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Peng20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asicon/PengXS19, author = {Kun Peng and Yang Xu and Mingqian Sun}, title = {Ultra-Low-Power {CMOS} Temperature Sensor for {UHF} {RFID} Systems}, booktitle = {13th {IEEE} International Conference on ASIC, {ASICON} 2019, Chongqing, China, October 29 - November 1, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ASICON47005.2019.8983674}, doi = {10.1109/ASICON47005.2019.8983674}, timestamp = {Wed, 12 Feb 2020 16:13:42 +0100}, biburl = {https://dblp.org/rec/conf/asicon/PengXS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icls/MadaioPOC18, author = {Michael Madaio and Kun Peng and Amy Ogan and Justine Cassell}, editor = {Manolis Mavrikis and Kaska Porayska{-}Pomsta}, title = {A Climate of Support: {A} Process-Oriented Analysis of the Impact of Rapport on Peer Tutoring}, booktitle = {Rethinking learning in the digital age: Making the Learning Sciences count - Proceedings of the 13th International Conference of the Learning Sciences, {ICLS} 2018, London, UK, June 23-27, 2018}, publisher = {International Society of the Learning Sciences}, year = {2018}, url = {https://repository.isls.org/handle/1/909}, timestamp = {Thu, 06 May 2021 10:07:13 +0200}, biburl = {https://dblp.org/rec/conf/icls/MadaioPOC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocc/PengLZKY16, author = {Kun Peng and Qing Li and Min Zhang and Xiaoyue Kong and Youli Yuan}, title = {Fiber optic perimeter detection based on human engineering}, booktitle = {25th Wireless and Optical Communication Conference, {WOCC} 2016, Chengdu, China, May 21-23, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/WOCC.2016.7506584}, doi = {10.1109/WOCC.2016.7506584}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wocc/PengLZKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Peng14, author = {Kun Peng}, title = {Assumptions and conditions for mix networks: analysis, clarification and improvement}, journal = {Int. J. Secur. Networks}, volume = {9}, number = {3}, pages = {133--143}, year = {2014}, url = {https://doi.org/10.1504/IJSN.2014.065719}, doi = {10.1504/IJSN.2014.065719}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Peng14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Peng14, author = {Kun Peng}, title = {Efficient homomorphic sealed-bid auction free of bid validity check and equality test}, journal = {Secur. Commun. Networks}, volume = {7}, number = {1}, pages = {64--76}, year = {2014}, url = {https://doi.org/10.1002/sec.549}, doi = {10.1002/SEC.549}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Peng14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Peng13, author = {Kun Peng}, title = {Efficient proof of bid validity with untrusted verifier in homomorphic e-auction}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {1}, pages = {11--21}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0076}, doi = {10.1049/IET-IFS.2012.0076}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Peng13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Peng13, author = {Kun Peng}, title = {A shuffle to achieve high efficiency through pre-computation and batch verification}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {337--345}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0193-x}, doi = {10.1007/S10207-013-0193-X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Peng13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/Peng13, author = {Kun Peng}, title = {A Secure Network for Mobile Wireless Service}, journal = {J. Inf. Process. Syst.}, volume = {9}, number = {2}, pages = {247--258}, year = {2013}, url = {https://doi.org/10.3745/JIPS.2013.9.2.247}, doi = {10.3745/JIPS.2013.9.2.247}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/Peng13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/YingPHGKZ13, author = {Xianghua Ying and Kun Peng and Yongbo Hou and Sheng Guan and Jing Kong and Hongbin Zha}, title = {Self-Calibration of Catadioptric Camera with Two Planar Mirrors from Silhouettes}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {35}, number = {5}, pages = {1206--1220}, year = {2013}, url = {https://doi.org/10.1109/TPAMI.2012.195}, doi = {10.1109/TPAMI.2012.195}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pami/YingPHGKZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Peng13, author = {Kun Peng}, editor = {Amr M. Youssef and Abderrahmane Nitaj and Aboul Ella Hassanien}, title = {Modification and Optimisation of an ElGamal-Based {PVSS} Scheme}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7918}, pages = {311--327}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38553-7\_18}, doi = {10.1007/978-3-642-38553-7\_18}, timestamp = {Fri, 31 Jan 2020 16:14:16 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/Peng13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/PengY13, author = {Kun Peng and Li Yi}, editor = {Amr M. Youssef and Abderrahmane Nitaj and Aboul Ella Hassanien}, title = {Studying a Range Proof Technique - Exception and Optimisation}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7918}, pages = {328--341}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38553-7\_19}, doi = {10.1007/978-3-642-38553-7\_19}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/PengY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/PengH13, author = {Kun Peng and Matt Henricksen}, editor = {Lorenzo Cavallaro and Dieter Gollmann}, title = {Multiplicative Homomorphic E-Auction with Formally Provable Security}, booktitle = {Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 7th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2013, Heraklion, Greece, May 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7886}, pages = {1--17}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38530-8\_1}, doi = {10.1007/978-3-642-38530-8\_1}, timestamp = {Sat, 09 Apr 2022 12:44:35 +0200}, biburl = {https://dblp.org/rec/conf/wistp/PengH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cg/MaimoneBPF12, author = {Andrew Maimone and Jonathan Bidwell and Kun Peng and Henry Fuchs}, title = {Enhanced personal autostereoscopic telepresence system using commodity depth cameras}, journal = {Comput. Graph.}, volume = {36}, number = {7}, pages = {791--807}, year = {2012}, url = {https://doi.org/10.1016/j.cag.2012.04.011}, doi = {10.1016/J.CAG.2012.04.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cg/MaimoneBPF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Peng12, author = {Kun Peng}, title = {Attack against a batch zero-knowledge proof system}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {1}, pages = {1--5}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0290}, doi = {10.1049/IET-IFS.2011.0290}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Peng12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Peng12a, author = {Kun Peng}, title = {Critical survey of existing publicly verifiable secret sharing schemes}, journal = {{IET} Inf. Secur.}, volume = {6}, number = {4}, pages = {249--257}, year = {2012}, url = {https://doi.org/10.1049/iet-ifs.2011.0201}, doi = {10.1049/IET-IFS.2011.0201}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Peng12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Peng12, author = {Kun Peng}, title = {Threshold distributed access control with public verification: a practical application of {PVSS}}, journal = {Int. J. Inf. Sec.}, volume = {11}, number = {1}, pages = {23--31}, year = {2012}, url = {https://doi.org/10.1007/s10207-011-0151-4}, doi = {10.1007/S10207-011-0151-4}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Peng12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Peng12, author = {Kun Peng}, title = {How to communicate anonymously in a network: study and optimisation of efficiency and security of anonymous communication networks}, journal = {Int. J. Secur. Networks}, volume = {7}, number = {3}, pages = {133--147}, year = {2012}, url = {https://doi.org/10.1504/IJSN.2012.052525}, doi = {10.1504/IJSN.2012.052525}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Peng12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/Peng12, author = {Kun Peng}, title = {Attack and Correction: How to Design a Secure and Efficient Mix Network}, journal = {J. Inf. Process. Syst.}, volume = {8}, number = {1}, pages = {175}, year = {2012}, url = {https://doi.org/10.3745/JIPS.2012.8.1.175}, doi = {10.3745/JIPS.2012.8.1.175}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/Peng12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/Peng12a, author = {Kun Peng}, title = {Efficient and General {PVSS} Based on ElGamal Encryption}, journal = {J. Inf. Process. Syst.}, volume = {8}, number = {2}, pages = {375}, year = {2012}, url = {https://doi.org/10.3745/JIPS.2012.8.2.375}, doi = {10.3745/JIPS.2012.8.2.375}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jips/Peng12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/LiPYZ12, author = {Bo Li and Kun Peng and Xianghua Ying and Hongbin Zha}, title = {Vanishing point detection using cascaded 1D Hough Transform from single images}, journal = {Pattern Recognit. Lett.}, volume = {33}, number = {1}, pages = {1--8}, year = {2012}, url = {https://doi.org/10.1016/j.patrec.2011.09.027}, doi = {10.1016/J.PATREC.2011.09.027}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/LiPYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengH12, author = {Kun Peng and Matt Henricksen}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {How to Fix Two RSA-Based {PVSS} Schemes - Exploration and Solution}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {223--234}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_17}, doi = {10.1007/978-3-642-31448-3\_17}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdke/Peng12, author = {Kun Peng}, editor = {Yang Xiang and Mukaddim Pathan and Xiaohui Tao and Hua Wang}, title = {A Secure and Efficient Mix Network Especially Suitable for E-Voting}, booktitle = {Data and Knowledge Engineering - Third International Conference, {ICDKE} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7696}, pages = {161--174}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34679-8\_16}, doi = {10.1007/978-3-642-34679-8\_16}, timestamp = {Thu, 09 Mar 2023 09:06:09 +0100}, biburl = {https://dblp.org/rec/conf/icdke/Peng12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idcs/PengZ12, author = {Kun Peng and Yuexin Zhang}, editor = {Yang Xiang and Mukaddim Pathan and Xiaohui Tao and Hua Wang}, title = {A Secure Mix Network with an Efficient Validity Verification Mechanism}, booktitle = {Internet and Distributed Computing Systems - 5th International Conference, {IDCS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7646}, pages = {85--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34883-9\_7}, doi = {10.1007/978-3-642-34883-9\_7}, timestamp = {Thu, 09 Mar 2023 09:06:05 +0100}, biburl = {https://dblp.org/rec/conf/idcs/PengZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/PengDB11, author = {Kun Peng and Ed Dawson and Feng Bao}, title = {Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {1}, pages = {33--47}, year = {2011}, url = {https://doi.org/10.1007/s10207-010-0117-y}, doi = {10.1007/S10207-010-0117-Y}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/PengDB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Peng11, author = {Kun Peng}, title = {A general and efficient countermeasure to relation attacks in mix-based e-voting}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {1}, pages = {49--60}, year = {2011}, url = {https://doi.org/10.1007/s10207-010-0122-1}, doi = {10.1007/S10207-010-0122-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/Peng11, author = {Kun Peng}, title = {Efficient Proof of Vote Validity Without Honest-Verifier Assumption in Homomorphic E-Voting}, journal = {J. Inf. Process. Syst.}, volume = {7}, number = {3}, pages = {549--560}, year = {2011}, url = {https://doi.org/10.3745/JIPS.2011.7.3.549}, doi = {10.3745/JIPS.2011.7.3.549}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/Peng11, author = {Kun Peng}, title = {Efficient {VSS} free of computational assumption}, journal = {J. Parallel Distributed Comput.}, volume = {71}, number = {12}, pages = {1592--1597}, year = {2011}, url = {https://doi.org/10.1016/j.jpdc.2011.07.009}, doi = {10.1016/J.JPDC.2011.07.009}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/Peng11, author = {Kun Peng}, title = {An efficient shuffling based eVoting scheme}, journal = {J. Syst. Softw.}, volume = {84}, number = {6}, pages = {906--922}, year = {2011}, url = {https://doi.org/10.1016/j.jss.2011.01.001}, doi = {10.1016/J.JSS.2011.01.001}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/Peng11, author = {Kun Peng}, title = {Survey, analysis and re-evaluation - How efficient and secure a mix network can be}, booktitle = {11th {IEEE} International Conference on Computer and Information Technology, {CIT} 2011, Pafos, Cyprus, 31 August-2 September 2011}, pages = {249--254}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CIT.2011.43}, doi = {10.1109/CIT.2011.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Peng11, author = {Kun Peng}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Impracticality of Efficient {PVSS} in Real Life Security Standard (Poster)}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {451--455}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_34}, doi = {10.1007/978-3-642-22497-3\_34}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/PengB11, author = {Kun Peng and Feng Bao}, editor = {Wenyu Qu and Kai Lin and Yanming Shen and Weisong Shi and D. Frank Hsu and Xiaolong Jin and Francis C. M. Lau and Junfeng Xu}, title = {Analysing a Batch Range Proof to Address a Security Concern}, booktitle = {14th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2011, Dalian, China, August 24-26, 2011}, pages = {68--72}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSE.2011.26}, doi = {10.1109/CSE.2011.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/PengB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Peng11, author = {Kun Peng}, editor = {Aggelos Kiayias}, title = {A General, Flexible and Efficient Proof of Inclusion and Exclusion}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {33--48}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_3}, doi = {10.1007/978-3-642-19074-2\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Peng11, author = {Kun Peng}, editor = {Yingjiu Li}, title = {Verifiable Secret Sharing with Comprehensive and Efficient Public Verification}, booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP} {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6818}, pages = {217--230}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22348-8\_17}, doi = {10.1007/978-3-642-22348-8\_17}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/Peng11, author = {Kun Peng}, editor = {Liqun Chen}, title = {A Secure and Efficient Proof of Integer in an Interval Range}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {97--111}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_7}, doi = {10.1007/978-3-642-25516-8\_7}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/Peng11, author = {Kun Peng}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {A General, Flexible and Efficient Proof of Inclusion and Exclusion}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {168--183}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_12}, doi = {10.1007/978-3-642-32298-3\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/Peng11, author = {Kun Peng}, editor = {Sang{-}Soo Yeo and Binod Vaidya and George A. Papadopoulos}, title = {Investigation and Survey of Secret Sharing in Verifiable Distributed Systems}, booktitle = {12th International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2011, Gwangju, Korea, October 20-22, 2011}, pages = {342--347}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PDCAT.2011.47}, doi = {10.1109/PDCAT.2011.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/Peng11a, author = {Kun Peng}, editor = {Sang{-}Soo Yeo and Binod Vaidya and George A. Papadopoulos}, title = {Secure E-Commerce Based on Distributed Processing}, booktitle = {12th International Conference on Parallel and Distributed Computing, Applications and Technologies, {PDCAT} 2011, Gwangju, Korea, October 20-22, 2011}, pages = {406--411}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PDCAT.2011.74}, doi = {10.1109/PDCAT.2011.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/Peng11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/Peng11, author = {Kun Peng}, editor = {Claudio A. Ardagna and Jianying Zhou}, title = {Secure E-Auction for Mobile Users with Low-Capability Devices in Wireless Network}, booktitle = {Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication - 5th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6633}, pages = {351--360}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21040-2\_25}, doi = {10.1007/978-3-642-21040-2\_25}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/wistp/Peng11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-5449, author = {Kun Peng}, title = {Failure of {A} Mix Network}, journal = {CoRR}, volume = {abs/1101.5449}, year = {2011}, url = {http://arxiv.org/abs/1101.5449}, eprinttype = {arXiv}, eprint = {1101.5449}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-5449.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/PengB10, author = {Kun Peng and Feng Bao}, title = {Achieving High Efficiency in Membership Proof without Compromising or Weakening any Security Property}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {1044--1049}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.191}, doi = {10.1109/CIT.2010.191}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/PengB10, author = {Kun Peng and Feng Bao}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Batch Range Proof for Practical Small Ranges}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {114--130}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_8}, doi = {10.1007/978-3-642-12678-9\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/YingPRZ10, author = {Xianghua Ying and Kun Peng and Ren Ren and Hongbin Zha}, title = {Geometric properties of multiple reflections in catadioptric camera with two planar mirrors}, booktitle = {The Twenty-Third {IEEE} Conference on Computer Vision and Pattern Recognition, {CVPR} 2010, San Francisco, CA, USA, 13-18 June 2010}, pages = {1126--1132}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CVPR.2010.5540088}, doi = {10.1109/CVPR.2010.5540088}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/YingPRZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/PengB10, author = {Kun Peng and Feng Bao}, editor = {Sara Foresti and Sushil Jajodia}, title = {A Secure {RFID} Ticket System for Public Transport}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {350--357}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_27}, doi = {10.1007/978-3-642-13739-6\_27}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/PengHRYZ10, author = {Kun Peng and Lulu Hou and Ren Ren and Xianghua Ying and Hongbin Zha}, title = {Single View Metrology Along Orthogonal Directions}, booktitle = {20th International Conference on Pattern Recognition, {ICPR} 2010, Istanbul, Turkey, 23-26 August 2010}, pages = {1658--1661}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICPR.2010.410}, doi = {10.1109/ICPR.2010.410}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/PengHRYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvc/LiPYZ10, author = {Bo Li and Kun Peng and Xianghua Ying and Hongbin Zha}, editor = {George Bebis and Richard D. Boyle and Bahram Parvin and Darko Koracin and Ronald Chung and Riad I. Hammoud and Muhammad Hussain and Kar{-}Han Tan and Roger Crawfis and Daniel Thalmann and David L. Kao and Lisa Avila}, title = {Simultaneous Vanishing Point Detection and Camera Calibration from Single Images}, booktitle = {Advances in Visual Computing - 6th International Symposium, {ISVC} 2010, Las Vegas, NV, USA, November 29 - December 1, 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6454}, pages = {151--160}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17274-8\_15}, doi = {10.1007/978-3-642-17274-8\_15}, timestamp = {Thu, 16 Mar 2023 20:00:32 +0100}, biburl = {https://dblp.org/rec/conf/isvc/LiPYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/PengB10, author = {Kun Peng and Feng Bao}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Efficient Multiplicative Homomorphic E-Voting}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {381--393}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_32}, doi = {10.1007/978-3-642-18178-8\_32}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/PengB10, author = {Kun Peng and Feng Bao}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Efficient Proof of Validity of Votes in Homomorphic E-Voting}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {17--23}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.25}, doi = {10.1109/NSS.2010.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/PengB10, author = {Kun Peng and Feng Bao}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Formal and Precise Analysis of Soundness of Several Shuffling Schemes}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {133--143}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_9}, doi = {10.1007/978-3-642-16280-0\_9}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PengB10, author = {Kun Peng and Feng Bao}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Vulnerability of a Non-membership Proof Scheme}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {419--422}, publisher = {SciTePress}, year = {2010}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/PengB10, author = {Kun Peng and Feng Bao}, editor = {Reijo Savola and Masaru Takesue and Rainer Falk and Manuela Popescu}, title = {A Shuffling Scheme with Strict and Strong Security}, booktitle = {Fourth International Conference on Emerging Security Information Systems and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010}, pages = {201--206}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SECURWARE.2010.40}, doi = {10.1109/SECURWARE.2010.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securware/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/PengB10, author = {Kun Peng and Feng Bao}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {An Efficient Range Proof Scheme}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {826--833}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.125}, doi = {10.1109/SOCIALCOM.2010.125}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/PengB10, author = {Kun Peng and Feng Bao}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Miguel Soriano}, title = {Efficiency Improvement of Homomorphic E-Auction}, booktitle = {Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6264}, pages = {238--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15152-1\_21}, doi = {10.1007/978-3-642-15152-1\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/PengB09, author = {Kun Peng and Feng Bao}, editor = {Fabio Martinelli and Bart Preneel}, title = {Practicalization of a Range Test and Its Application to E-Auction}, booktitle = {Public Key Infrastructures, Services and Applications - 6th European Workshop, EuroPKI 2009, Pisa, Italy, September 10-11, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6391}, pages = {179--194}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16441-5\_12}, doi = {10.1007/978-3-642-16441-5\_12}, timestamp = {Sat, 19 Oct 2019 19:58:51 +0200}, biburl = {https://dblp.org/rec/conf/europki/PengB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Peng09, author = {Kun Peng}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {A Hybrid E-Voting Scheme}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {195--206}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_18}, doi = {10.1007/978-3-642-00843-6\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Peng09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/robio/YingPZ09, author = {Xianghua Ying and Kun Peng and Hongbin Zha}, title = {Walkthrough in large environments using concatenated panoramas}, booktitle = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO} 2009, December 19-13, 2009, Guilin, Guangxi, China}, pages = {286--291}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ROBIO.2009.5420659}, doi = {10.1109/ROBIO.2009.5420659}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/robio/YingPZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/PengB09, author = {Kun Peng and Feng Bao}, editor = {Peter Y. A. Ryan and Berry Schoenmakers}, title = {A Design of Secure Preferential E-Voting}, booktitle = {E-Voting and Identity, Second International Conference, VoteID 2009, Luxembourg, September 7-8, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5767}, pages = {141--156}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04135-8\_9}, doi = {10.1007/978-3-642-04135-8\_9}, timestamp = {Thu, 27 Feb 2020 13:11:16 +0100}, biburl = {https://dblp.org/rec/conf/voteid/PengB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PengB09, author = {Kun Peng and Feng Bao}, editor = {Heung Youl Youm and Moti Yung}, title = {Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and {ZK} Privacy}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {118--132}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_10}, doi = {10.1007/978-3-642-10838-9\_10}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PengB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/PengBD08, author = {Kun Peng and Feng Bao and Ed Dawson}, title = {Correct, Private, Flexible and Efficient Range Test}, journal = {J. Res. Pract. Inf. Technol.}, volume = {40}, number = {4}, pages = {275--289}, year = {2008}, url = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.4.275.pdf}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/PengBD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/PengB08, author = {Kun Peng and Feng Bao}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Batch {ZK} Proof and Verification of {OR} Logic}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {141--156}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_13}, doi = {10.1007/978-3-642-01440-6\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/PengB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/PengB08a, author = {Kun Peng and Feng Bao}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Correction, Optimisation and Secure and Efficient Application of {PBD} Shuffling}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {425--437}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_31}, doi = {10.1007/978-3-642-01440-6\_31}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/PengB08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengB08, author = {Kun Peng and Feng Bao}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {Efficient Vote Validity Check in Homomorphic Electronic Voting}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {202--217}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_13}, doi = {10.1007/978-3-642-00730-9\_13}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/PengBD07, author = {Kun Peng and Colin Boyd and Ed Dawson}, title = {Batch zero-knowledge proof and verification and its applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {2}, pages = {6}, year = {2007}, url = {https://doi.org/10.1145/1237500.1237502}, doi = {10.1145/1237500.1237502}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/PengBD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/PengD07, author = {Kun Peng and Ed Dawson}, editor = {Ljiljana Brankovic and Paul D. Coddington and John F. Roddick and Chris Steketee and James R. Warren and Andrew L. Wendelborn}, title = {A Range Test Secure in the Active Adversary Model}, booktitle = {{ACSW} Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) {(AISW} 2007), and the Australasian Workshop on Health Knowledge Management and Discovery {(HKMD} 2007). Proceedings, Ballarat, Victoria, Australia, January 30 - February 2, 2007}, series = {{CRPIT}}, volume = {68}, pages = {159--162}, publisher = {Australian Computer Society}, year = {2007}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV68Peng.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/PengD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Peng07, author = {Kun Peng}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {Secure Multiparty Computation of {DNF}}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {254--268}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_20}, doi = {10.1007/978-3-540-77048-0\_20}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/Peng07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/PengD07, author = {Kun Peng and Ed Dawson}, editor = {Ed Dawson and Duncan S. Wong}, title = {Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {209--224}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_17}, doi = {10.1007/978-3-540-72163-5\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/PengD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PengBD06, author = {Kun Peng and Colin Boyd and Ed Dawson}, title = {Batch verification of validity of bids in homomorphic e-auction}, journal = {Comput. Commun.}, volume = {29}, number = {15}, pages = {2798--2805}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2005.10.031}, doi = {10.1016/J.COMCOM.2005.10.031}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/PengBD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengBDO06, author = {Kun Peng and Colin Boyd and Ed Dawson and Eiji Okamoto}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {A Novel Range Test}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {247--258}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_21}, doi = {10.1007/11780656\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengBDO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengNDD06, author = {Kun Peng and Juan Manuel Gonz{\'{a}}lez Nieto and Yvo Desmedt and Ed Dawson}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Klein Bottle Routing: An Alternative to Onion Routing and Mix Network}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {296--309}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_25}, doi = {10.1007/11927587\_25}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengNDD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PengBD06, author = {Kun Peng and Colin Boyd and Ed Dawson}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {Sealed-Bid Micro Auctions}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {246--257}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_21}, doi = {10.1007/0-387-33406-8\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PengBD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/PengCR06, author = {Kun Peng and Liming Chen and Su Ruan}, editor = {Jianhua Ma and Hai Jin and Laurence Tianruo Yang and Jeffrey J. P. Tsai}, title = {A Smart Identification Card System Using Facial Biometric: From Architecture to Application}, booktitle = {Ubiquitous Intelligence and Computing, Third International Conference, {UIC} 2006, Wuhan, China, September 3-6, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4159}, pages = {61--70}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11833529\_7}, doi = {10.1007/11833529\_7}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/uic/PengCR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YaoPD05, author = {Ming Yao and Kun Peng and Ed Dawson}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {158--169}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_14}, doi = {10.1007/11506157\_14}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YaoPD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/avss/PengCR05, author = {Kun Peng and Liming Chen and Su Ruan}, title = {A novel scheme of face verification using active appearance models}, booktitle = {Advanced Video and Signal Based Surveillance, 2005 {IEEE} International Conference on Video and Signal Based Surveillance (AVSS'05), 15-16 September 2005, Como, Italy}, pages = {247--252}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AVSS.2005.1577275}, doi = {10.1109/AVSS.2005.1577275}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/avss/PengCR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/PengDNOL05, author = {Kun Peng and Ed Dawson and Juanma Gonz{\'{a}}lez Nieto and Eiji Okamoto and Javier L{\'{o}}pez}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {A Novel Method to Maintain Privacy in Mobile Agent Applications}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {247--260}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_21}, doi = {10.1007/11599371\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/PengDNOL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PengBD05, author = {Kun Peng and Colin Boyd and Ed Dawson}, editor = {Victor Shoup}, title = {Simple and Efficient Shuffling with Provable Correctness and {ZK} Privacy}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {188--204}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_12}, doi = {10.1007/11535218\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PengBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icapr/PengCRK05, author = {Kun Peng and Liming Chen and Su Ruan and Georgy Kukharev}, editor = {Peng Wang and Maneesha Singh and Chidanand Apt{\'{e}} and Petra Perner}, title = {A Robust and Efficient Algorithm for Eye Detection on Gray Intensity Face}, booktitle = {Pattern Recognition and Image Analysis, Third International Conference on Advances in Pattern Recognition, {ICAPR} 2005, Bath, UK, August 22-25, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3687}, pages = {302--308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552499\_34}, doi = {10.1007/11552499\_34}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/icapr/PengCRK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PengBDL05, author = {Kun Peng and Colin Boyd and Ed Dawson and Byoungcheon Lee}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Ciphertext Comparison, a New Solution to the Millionaire Problem}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {84--96}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_8}, doi = {10.1007/11602897\_8}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/PengBDL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/PengBD05, author = {Kun Peng and Colin Boyd and Ed Dawson}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {374--388}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_27}, doi = {10.1007/11556992\_27}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/PengBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/PengBD05, author = {Kun Peng and Colin Boyd and Ed Dawson}, editor = {Ed Dawson and Serge Vaudenay}, title = {Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {84--98}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_7}, doi = {10.1007/11554868\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/PengBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PengBD05, author = {Kun Peng and Colin Boyd and Ed Dawson}, title = {Batch Verification of Validity of Bids in Homomorphic E-auction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2005}, url = {http://eprint.iacr.org/2005/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PengBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AdityaPBDL04, author = {Riza Aditya and Kun Peng and Colin Boyd and Ed Dawson and Byoungcheon Lee}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {494--508}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_36}, doi = {10.1007/978-3-540-24852-1\_36}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/AdityaPBDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cau/PengABDL04, author = {Kun Peng and Riza Aditya and Colin Boyd and Ed Dawson and Byoungcheon Lee}, editor = {Ed Dawson and Wolfgang Klemm}, title = {A Secure and Efficient Mix-Network using Extended Binary Mixing Gate}, booktitle = {Cryptographic Algorithms and their Uses - 2004, International Workshop, Gold Coast, Australia, July 5-6, 2004, Proceedings}, pages = {57--71}, publisher = {Queensland University of Technology}, year = {2004}, timestamp = {Fri, 16 Jul 2004 13:22:45 +0200}, biburl = {https://dblp.org/rec/conf/cau/PengABDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/YaoPHFD04, author = {Ming Yao and Kun Peng and Matthew Henricksen and Ernest Foo and Ed Dawson}, editor = {Kurt Bauknecht and Martin Bichler and Birgit Pr{\"{o}}ll}, title = {Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents}, booktitle = {E-Commerce and Web Technologies, 5th International Conference, EC-Web 2004, Zaragoza, Spain, August 31-September 3, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3182}, pages = {164--173}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30077-9\_17}, doi = {10.1007/978-3-540-30077-9\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/YaoPHFD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengBDL04, author = {Kun Peng and Colin Boyd and Ed Dawson and Byoungcheon Lee}, editor = {Choonsik Park and Seongtaek Chee}, title = {An Efficient and Verifiable Solution to the Millionaire Problem}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {51--66}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_6}, doi = {10.1007/11496618\_6}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengBDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PengABDL04, author = {Kun Peng and Riza Aditya and Colin Boyd and Ed Dawson and Byoungcheon Lee}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {Multiplicative Homomorphic E-Voting}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {61--72}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_6}, doi = {10.1007/978-3-540-30556-9\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PengABDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PengBDV04, author = {Kun Peng and Colin Boyd and Ed Dawson and Kapalee Viswanathan}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {A Correct, Private, and Efficient Mix Network}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {439--454}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_32}, doi = {10.1007/978-3-540-24632-9\_32}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PengBDV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/PengBDV03, author = {Kun Peng and Colin Boyd and Ed Dawson and Kapali Viswanathan}, editor = {Chris W. Johnson and Paul Montague and Chris Steketee}, title = {Five Sealed-bid Auction Models}, booktitle = {{ACSW} Frontiers 2003, 2003 {ACSW} Workshops - the Australasian Information Security Workshop {(AISW)} and the Workshop on Wearable, Invisible, Context-Aware, Ambient, Pervasive and Ubiquitous Computing (WICAPUC), Adelaide, South Australia, February 2003}, series = {{CRPIT}}, volume = {21}, pages = {77--86}, publisher = {Australian Computer Society}, year = {2003}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV21APeng.html}, timestamp = {Thu, 25 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/PengBDV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PengBDV03, author = {Kun Peng and Colin Boyd and Ed Dawson and Kapalee Viswanathan}, editor = {Kijoon Chae and Moti Yung}, title = {Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {244--256}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_19}, doi = {10.1007/978-3-540-24591-9\_19}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PengBDV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YaoFPD03, author = {Ming Yao and Ernest Foo and Kun Peng and Ed Dawson}, editor = {Kijoon Chae and Moti Yung}, title = {An Improved Forward Integrity Protocol for Mobile Agents}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {272--285}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_21}, doi = {10.1007/978-3-540-24591-9\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YaoFPD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PengBDV02, author = {Kun Peng and Colin Boyd and Ed Dawson and Kapali Viswanathan}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {147--159}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_13}, doi = {10.1007/3-540-36159-6\_13}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/PengBDV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengBDV02, author = {Kun Peng and Colin Boyd and Ed Dawson and Kapali Viswanathan}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Non-interactive Auction Schemewith Strong Privacy}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {407--420}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_28}, doi = {10.1007/3-540-36552-4\_28}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengBDV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/PeiCP00, author = {Pengjun Pei and Guohua Cui and Kun Peng}, title = {On a Session Key Compromise Problem in {[KC95]} protocol}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {34}, number = {3}, pages = {16--18}, year = {2000}, url = {https://doi.org/10.1145/506117.506120}, doi = {10.1145/506117.506120}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/PeiCP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.