Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456 Feng Hao's' Home Page
About me
Feng is my first name. I obtained the PhD degree in 2007 under the
supervision of Prof Ross Anderson and John
Daugman.
Here is the PhD dissertation
that I managed to complete within the official timeline of nine
terms.
Publications
F. Hao, P. Ryan, "Password Authenticated Key Exchange by Juggling",
accepted by the 16th Workshop on Security Protocols, Cambridge, April
2008. [paper]
It proposes a crypto protocol called Password
Authenticated Key Exchange by Juggling (J-PAKE). The essence of design
inherits from my earlier work (with Piotr Zielinski) on solving the
Dining Cryptographers problem. Compared with EKE (patented by Lucent
Technologies) and SPEKE (patented by Phoenix Technologies), J-PAKE has
clear advantages in security with comparable efficiency. It is submitted
as a follow-on to the future extension of IEEE Standard P1363.2.
F. Hao, J. Daugman, P. Zielinski, "A fast search algorithm for a
large fuzzy database," to be published on IEEE Transactions on Information
Forensics and Security, June 2008. [Preprint]
It proposes an efficient search algorithm for iris recognition,
which achieves a substantial speed-up over exhaustive search with a
negligible loss of precision.
F. Hao, "Kish's key exchange scheme is insecure," IEE
Information Security, Vol. 153, No. 4, pp. 141--142, December 2006. [Paper]
It points out that a "totally secure" communication system, featured
in Science, is seriously flawed.
F. Hao, P. Zielinski, "The power of anonymous veto in public
discussion," [draft].
It's a journal version of the below paper.
F. Hao, P. Zielinski, "A 2-round anonymous veto protocol," 14th
International Workshop on Security Protocols, Cambridge (2006)[Paper] [Slides]
It proposes an efficient solution to the Dining Cryptographers
problem (Chaum, 1988), achieving the best efficiency among all
available solutions.
F. Hao, R. Anderson, J. Daugman, "Combining crypto with biometrics
effectively," IEEE Transactions on Computers, Vol. 55, No. 9,
pp. 1081--1088, Sept., 2006. [IEEE]
[report]
It proposes the first practical and secure way to integrate
the iris biometric into cryptographic applications.
F. Hao, "Combining crypto with biometrics: a new human-security
interface," [Transcript of
discussion] 13th International Workshop on Security Protocols,
LNCS 4631, pp. 133-138, 2005.
It presents a transcript of discussion on combining crypto with
biometrics.
F. Hao, C.W. Chan, "Online
signature verification using a new extreme points warping
technique," Pattern Recognition Letters, Vol 24, Issue 16,
2943-2951 (2003) [Paper]
It modifies the classic Dynamic Programming algorithm to better
suit the requirements of handwritten signature verification.
F. Hao, C.W. Chan, "Private
Key Generation from On-line Handwritten Signatures," Information
Management & Computer Security, Vol 10, Issue 4, 159-164 (2002)
[Paper]
It proposes to apply quantization to derive stable bits from handwritten signatures.
F. Hao, C.W. Chan, "A Novel
Usage of On-line Handwritten Signatures," Proceedings of the 6th
International Conference on Communication System, Computer and
Circuit, CSCC July 2002, Crete [paper]
A preliminary conference paper on deriving stable bits from handwritten
signatures.