2009 |
32 | EE | Kun Peng:
A Hybrid E-Voting Scheme.
ISPEC 2009: 195-206 |
2008 |
31 | EE | Kun Peng,
Feng Bao:
Efficient Vote Validity Check in Homomorphic Electronic Voting.
ICISC 2008: 202-217 |
30 | EE | Kun Peng,
Feng Bao:
Batch ZK Proof and Verification of OR Logic.
Inscrypt 2008: 141-156 |
29 | EE | Kun Peng,
Feng Bao:
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling.
Inscrypt 2008: 425-437 |
2007 |
28 | EE | Kun Peng,
Ed Dawson:
A Range Test Secure in the Active Adversary Model.
ACSW Frontiers 2007: 159-162 |
27 | EE | Kun Peng:
Secure Multiparty Computation of DNF.
ICICS 2007: 254-268 |
26 | EE | Kun Peng,
Ed Dawson:
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction.
ISPEC 2007: 209-224 |
25 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Batch zero-knowledge proof and verification and its applications.
ACM Trans. Inf. Syst. Secur. 10(2): (2007) |
2006 |
24 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Eiji Okamoto:
A Novel Range Test.
ACISP 2006: 247-258 |
23 | EE | Kun Peng,
Juan Manuel González Nieto,
Yvo Desmedt,
Ed Dawson:
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network.
ICISC 2006: 296-309 |
22 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Sealed-Bid Micro Auctions.
SEC 2006: 246-257 |
21 | EE | Kun Peng,
Liming Chen,
Su Ruan:
A Smart Identification Card System Using Facial Biometric: From Architecture to Application.
UIC 2006: 61-70 |
20 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Batch verification of validity of bids in homomorphic e-auction.
Computer Communications 29(15): 2798-2805 (2006) |
2005 |
19 | EE | Ming Yao,
Kun Peng,
Ed Dawson:
Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents.
ACISP 2005: 158-169 |
18 | EE | Kun Peng,
Ed Dawson,
Juanma González Nieto,
Eiji Okamoto,
Javier Lopez:
A Novel Method to Maintain Privacy in Mobile Agent Applications.
CANS 2005: 247-260 |
17 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy.
CRYPTO 2005: 188-204 |
16 | EE | Kun Peng,
Liming Chen,
Su Ruan,
Georgy Kukharev:
A Robust and Efficient Algorithm for Eye Detection on Gray Intensity Face.
ICAPR (2) 2005: 302-308 |
15 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
Ciphertext Comparison, a New Solution to the Millionaire Problem.
ICICS 2005: 84-96 |
14 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.
ISC 2005: 374-388 |
13 | EE | Kun Peng,
Colin Boyd,
Ed Dawson:
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.
Mycrypt 2005: 84-98 |
2004 |
12 | EE | Riza Aditya,
Kun Peng,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
ACNS 2004: 494-508 |
11 | | Kun Peng,
Riza Aditya,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
A Secure and Efficient Mix-Network using Extended Binary Mixing Gate.
Cryptographic Algorithms and their Uses 2004: 57-71 |
10 | EE | Ming Yao,
Kun Peng,
Matthew Henricksen,
Ernest Foo,
Ed Dawson:
Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents.
EC-Web 2004: 164-173 |
9 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
An Efficient and Verifiable Solution to the Millionaire Problem.
ICISC 2004: 51-66 |
8 | EE | Kun Peng,
Riza Aditya,
Colin Boyd,
Ed Dawson,
Byoungcheon Lee:
Multiplicative Homomorphic E-Voting.
INDOCRYPT 2004: 61-72 |
7 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapalee Viswanathan:
A Correct, Private, and Efficient Mix Network.
Public Key Cryptography 2004: 439-454 |
2003 |
6 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Five Sealed-bid Auction Models.
ACSW Frontiers 2003: 77-86 |
5 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapalee Viswanathan:
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction.
WISA 2003: 244-256 |
4 | EE | Ming Yao,
Ernest Foo,
Kun Peng,
Ed Dawson:
An Improved Forward Integrity Protocol for Mobile Agents.
WISA 2003: 272-285 |
2002 |
3 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.
ICICS 2002: 147-159 |
2 | EE | Kun Peng,
Colin Boyd,
Ed Dawson,
Kapali Viswanathan:
Non-interactive Auction Schemewith Strong Privacy.
ICISC 2002: 407-420 |
2000 |
1 | | Pengjun Pei,
Guohua Cui,
Kun Peng:
On a Session Key Compromise Problem in [KC95] protocol.
Operating Systems Review 34(3): 16-18 (2000) |