dblp.uni-trier.dewww.uni-trier.de

Kun Peng

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
32EEKun Peng: A Hybrid E-Voting Scheme. ISPEC 2009: 195-206
2008
31EEKun Peng, Feng Bao: Efficient Vote Validity Check in Homomorphic Electronic Voting. ICISC 2008: 202-217
30EEKun Peng, Feng Bao: Batch ZK Proof and Verification of OR Logic. Inscrypt 2008: 141-156
29EEKun Peng, Feng Bao: Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. Inscrypt 2008: 425-437
2007
28EEKun Peng, Ed Dawson: A Range Test Secure in the Active Adversary Model. ACSW Frontiers 2007: 159-162
27EEKun Peng: Secure Multiparty Computation of DNF. ICICS 2007: 254-268
26EEKun Peng, Ed Dawson: Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. ISPEC 2007: 209-224
25EEKun Peng, Colin Boyd, Ed Dawson: Batch zero-knowledge proof and verification and its applications. ACM Trans. Inf. Syst. Secur. 10(2): (2007)
2006
24EEKun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto: A Novel Range Test. ACISP 2006: 247-258
23EEKun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson: Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309
22EEKun Peng, Colin Boyd, Ed Dawson: Sealed-Bid Micro Auctions. SEC 2006: 246-257
21EEKun Peng, Liming Chen, Su Ruan: A Smart Identification Card System Using Facial Biometric: From Architecture to Application. UIC 2006: 61-70
20EEKun Peng, Colin Boyd, Ed Dawson: Batch verification of validity of bids in homomorphic e-auction. Computer Communications 29(15): 2798-2805 (2006)
2005
19EEMing Yao, Kun Peng, Ed Dawson: Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. ACISP 2005: 158-169
18EEKun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez: A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260
17EEKun Peng, Colin Boyd, Ed Dawson: Simple and Efficient Shuffling with Provable Correctness and ZK Privacy. CRYPTO 2005: 188-204
16EEKun Peng, Liming Chen, Su Ruan, Georgy Kukharev: A Robust and Efficient Algorithm for Eye Detection on Gray Intensity Face. ICAPR (2) 2005: 302-308
15EEKun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: Ciphertext Comparison, a New Solution to the Millionaire Problem. ICICS 2005: 84-96
14EEKun Peng, Colin Boyd, Ed Dawson: A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. ISC 2005: 374-388
13EEKun Peng, Colin Boyd, Ed Dawson: Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. Mycrypt 2005: 84-98
2004
12EERiza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. ACNS 2004: 494-508
11 Kun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee: A Secure and Efficient Mix-Network using Extended Binary Mixing Gate. Cryptographic Algorithms and their Uses 2004: 57-71
10EEMing Yao, Kun Peng, Matthew Henricksen, Ernest Foo, Ed Dawson: Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. EC-Web 2004: 164-173
9EEKun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee: An Efficient and Verifiable Solution to the Millionaire Problem. ICISC 2004: 51-66
8EEKun Peng, Riza Aditya, Colin Boyd, Ed Dawson, Byoungcheon Lee: Multiplicative Homomorphic E-Voting. INDOCRYPT 2004: 61-72
7EEKun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan: A Correct, Private, and Efficient Mix Network. Public Key Cryptography 2004: 439-454
2003
6EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Five Sealed-bid Auction Models. ACSW Frontiers 2003: 77-86
5EEKun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan: Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. WISA 2003: 244-256
4EEMing Yao, Ernest Foo, Kun Peng, Ed Dawson: An Improved Forward Integrity Protocol for Mobile Agents. WISA 2003: 272-285
2002
3EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. ICICS 2002: 147-159
2EEKun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan: Non-interactive Auction Schemewith Strong Privacy. ICISC 2002: 407-420
2000
1 Pengjun Pei, Guohua Cui, Kun Peng: On a Session Key Compromise Problem in [KC95] protocol. Operating Systems Review 34(3): 16-18 (2000)

Coauthor Index

1Riza Aditya [8] [11] [12]
2Feng Bao [29] [30] [31]
3Colin Boyd [2] [3] [5] [6] [7] [8] [9] [11] [12] [13] [14] [15] [17] [20] [22] [24] [25]
4Liming Chen [16] [21]
5Guohua Cui [1]
6Ed Dawson [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [17] [18] [19] [20] [22] [23] [24] [25] [26] [28]
7Yvo Desmedt [23]
8Ernest Foo [4] [10]
9Matthew Henricksen [10]
10Georgy Kukharev [16]
11Byoungcheon Lee [8] [9] [11] [12] [15]
12Javier Lopez [18]
13Juan Manuel González Nieto (Juanma González Nieto) [18] [23]
14Eiji Okamoto [18] [24]
15Pengjun Pei [1]
16Su Ruan [16] [21]
17Kapalee Viswanathan [5] [7]
18Kapali Viswanathan [2] [3] [6]
19Ming Yao [4] [10] [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)