QUT ePrints

Browse By Person: Peng, Kun

 Up a level
Export as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0 [feed] RSS 2.0
Group by: Item Type | Date
Number of items: 26.

Journal Article

Bao, Feng, Dawson, Ed, & Peng, Kun (2008) Correct, private, flexible and efficient range test. Journal of Research and Practice in Information Technology, 40(4), pp. 267-281.
Number of full-text downloads 25
Number of citations in Scopus 5
Number of citations in Web of Science® 3

Peng, Kun, Boyd, Colin, & Dawson, Edward (2007) Batch Zero-Knowledge Proof and Verification and Its Applications. ACM Transactions on Information and System Security, 10(2), pp. 1-28.
Number of citations in Scopus 14
Number of citations in Web of Science® 6

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Batch Verification of Validity of Bids in Homomorphic E-auction. Computer Communications, 29(15), pp. 2798-2805.
Number of full-text downloads 67
Number of citations in Scopus 12
Number of citations in Web of Science® 10

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) An Efficient and Verifiable Solution to the Millionaire Problem. Lecture Notes in Computer Science, pp. 51-66.
Number of full-text downloads 140
Number of citations in Scopus 3

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) A Multiplicative Homomorphic Sealed-Bid Auction-Based on Goldwasser-Micali Encryption. Lecture Notes in Computer Science- Information security, 3650, pp. 374-388.
Number of full-text downloads 112
Number of citations in Scopus 7
Number of citations in Web of Science® 5

Peng, Kun, Boyd, Colin A., & Dawson, Edward P. (2005) Simple and Efficient Shuffling with provable Correctness and ZK Privacy. Lecture Notes in Computer Science, pp. 188-204.
Number of full-text downloads 72
Number of citations in Web of Science® 20

Conference Paper

Peng, Kun & Dawson, Edward P. (2007) Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. In Dawson, Edward P. & Wong, Duncan S. (Eds.) Third International Conference, ISPEC 2007: Information Security Practice and Experience, May 7-9, 2007, Hong Kong, China.
Number of full-text downloads 71
Number of citations in Scopus 9
Number of citations in Web of Science® 8

Peng, Kun & Dawson, Edward P. (2007) A range test secure in the active adversary model. In Brankovic, L. & Steketee, C. (Eds.) Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), 30 January - 2 February 2007, Ballarat, Victoria.
Number of full-text downloads 51

Dawson, Edward, Desmedt, Yvo, Gonzalez Nieto, Juan, & Peng, Kun (2006) Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. In Rhee, M & Lee, B (Eds.) Information Security and Cryptology - ICISC 2006 (LNCS 4296), 30 November - 1 December 2006, Korea, Busan.
Number of full-text downloads 123
Number of citations in Scopus 1

Boyd, Colin, Dawson, Edward, Okamoto, Eiji, & Peng, Kun (2006) A Novel Range Test. In Batten, L & Safavi-Naini, R (Eds.) Information Security and Privacy (LNCS 4058), 3 - 5 July 2006, Australia, Victoria, Melbourne.
Number of full-text downloads 18
Number of citations in Scopus 2
Number of citations in Web of Science® 13

Boyd, Colin, Dawson, Edward, & Peng, Kun (2006) Sealed-Bid Micro Auctions. In Fischer-Hubner, S, Rannenberg, K, Yngstrom, L, & Lindskog, S (Eds.) Security and Privacy in Dynamic Environments, 22 - 24 May 2006, Sweden, Karlstad.
Number of full-text downloads 33

Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2005) Ciphertext Comparison, a New Solution to the Millionaire Problem. In Information and Communications Security, 10-13 December, 2005, China, Beijing.
Number of full-text downloads 157
Number of citations in Scopus 3
Number of citations in Web of Science® 5

Dawson, Edward, Gonzalez-Nieto, Juan, Lopez, Javier, Okamoto, Eiji, & Peng, Kun (2005) A Novel Method to Maintain Privacy in Mobile Agent Applications. In Desmedt, Y, Wang, H, Mu, Y, & Li, Y (Eds.) Cryptology and Network Security: 4th International Conference, CANS 2005, 14-16 December, 2005, Xiamen, China.
Number of full-text downloads 36
Number of citations in Scopus 3
Number of citations in Web of Science® 2

Boyd, Colin, Dawson, Edward, & Peng, Kun (2005) Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing. In Dawson, E & Vaudenay, S (Eds.) Progress in Cryptology - Mycrypt 2005, 28-30 September 2005, Malaysia, Kuala Lumpur.
Number of full-text downloads 67
Number of citations in Scopus 9
Number of citations in Web of Science® 6

Dawson, Edward, Peng, Kun, & Yao, Minna (2005) Using Fair Forfeit to Prevent Truncation Attacks on Mobile Agents. In Boyd, C & Gonzalez-Nieto, J (Eds.) Information Security and Privacy - ACISP 2005, 4-6 July 2005, Australia, Queensland, Brisbane.

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. In Jakobsson, M, Yung, M, & Zhou, J (Eds.) Applied Cryptography and Network Security Second International Conference on Applied Cryptography and Network Security (LNCS 3089), 8 - 11 June 2004, Yellow Mountain, China.
Number of full-text downloads 125
Number of citations in Scopus 6
Number of citations in Web of Science® 11

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapali (2004) A Correct, Private and Efficient Mix Network. In Boa, F, Deng, R, & Zhou, J (Eds.) Publick Key Cryptography - PKC 2004. Seventh International Workshop on Theory and Practice in Public Key Cryptography., 1-4 March 2004, Singapore.
Number of full-text downloads 63
Number of citations in Scopus 14
Number of citations in Web of Science® 19

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapali (2004) Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. In Chae, K & Yung, M (Eds.) Information Security Applications. Fourth International Workshop, WISA 2003., 25-27 August 2003, Jeju Island, Korea.
Number of full-text downloads 51
Number of citations in Scopus 1

Dawson, Edward, Foo, Ernest, Peng, Kun, & Yao, Ming (2004) An Improved Forward Integrity Protocol for Mobile Agents. In Chae, K & Yung, M (Eds.) Information Security Applications. 4th International Workshop, WISA 2003, August 2003, Jeju Island, Korea.
Number of citations in Scopus 7

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) Multiplicative Homomorphic E-Voting. In Canteaut, A & Viswanathan, K (Eds.) Progress in Cryptology - INDOCRYPT 2004. 5th International Conference on Cryptology in India., 20-22 December 2004, Chennai, India.
Number of full-text downloads 443
Number of citations in Scopus 14
Number of citations in Web of Science® 12

Aditya, Riza, Boyd, Colin, Dawson, Edward, Lee, Byoungcheon, & Peng, Kun (2004) A Secure and Efficient Mix-Network Using Extended Binary Mixing Gate. In Dawson, E & Klemm, W (Eds.) Cryptographic Algorithms and Their Uses - 2004, 5-6 July 2004, Gold Coast, Australia.
Number of full-text downloads 24

Dawson, Edward, Foo, Ernest, Henricksen, Matthew, Peng, Kun, & Yao, Minna (2004) Using Recoverable Key Commitment to Defend Against Truncation Attacks in Mobile Agents. In Bauknecht, Kurt, Bichler, Martin, & Proll, Birgit (Eds.) E-Commerce and Web Technologies - EC-Web 2004. Fifth International Conference Proceedings., 31 August - 3 September 2004, Zaragoza, Spain.
Number of citations in Scopus 1
Number of citations in Web of Science® 3

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2003) Five Sealed-Bid Auction Models. In Johnson, C, Montague, P, & Steketee, C (Eds.) ACSW Frontiers 2003, February 2003, Adelaide, South Australia.
Number of full-text downloads 31

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2003) Non-Interactive Auction Scheme with Strong Privacy. In Lee, P & Lim, C (Eds.) Information Security and Cryptology - ICISC 2002, 28-29 November 2002, Seoul, Korea.
Number of full-text downloads 53
Number of citations in Scopus 3

Boyd, Colin, Dawson, Edward, Peng, Kun, & Viswanathan, Kapaleeswaran (2002) Robust, Privacy Protecting, and Publicly Verifiable Sealed-bid Auction. In Deng,, Qing,, Boo,, & Zhou, (Eds.) Information and Communications Security (ICICS'02), 9-12 December, 2002, Singapore.
Number of citations in Web of Science® 13

QUT Thesis

Peng, Kun (2004) Analysis and Design of Secure Sealed-Bid Auction. PhD thesis, Queensland University of Technology.
Number of full-text downloads 1,048

This list was generated on Sat Aug 30 08:15:30 2014 EST.