Feng

Results: 1237



#Item
991Chinese thought / Divination / Environmental design / Feng shui / Video game / Motivation / Role-playing video game / Game mechanics / Statistic / Games / Gaming / Aesthetics

This issue (14 pages): REVIEWS Cathay Arts, Feng Shui, Arcane and IMNOT AHEAD Computer Role-Playing

Add to Reading List

Source URL: www.firedrake.org

Language: English - Date: 2005-03-26 18:35:02
992Rokugan / Feng Shui / Shugenja / Statistic / Samurai / Bushido / Character creation / Tabletop role-playing game / Dice / Games / Legend of the Five Rings / Legend of the Five Rings Roleplaying Game

imazine ROLEGAMING MAGAZINE Issue 28 Autumn 1997 ISSN[removed]Editor: Paul Mason

Add to Reading List

Source URL: www.firedrake.org

Language: English - Date: 2005-03-26 18:35:25
993Search algorithms / Error detection and correction / Arrays / Data types / Primitive types / Iris recognition / Bit array / Locality-sensitive hashing / Nearest neighbor search / Computing / Information science / Information

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 2, JUNE[removed]A Fast Search Algorithm for a Large Fuzzy Database Feng Hao, John Daugman, and Piotr Zielin´ski

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2008-05-22 07:32:52
994Portable software / Password Authenticated Key Exchange by Juggling / Password-authenticated key agreement / Password / Google Chrome / Firefox / Dropbox / Crypt / Phishing / Software / Cryptographic protocols / Cryptography

How To Syn with Ali e 1 Feng Hao 1

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2011-06-15 13:41:44
995Password-authenticated key agreement / SPEKE / Password / Key-agreement protocol / Diffie–Hellman key exchange / Encrypted key exchange / Man-in-the-middle attack / Public-key cryptography / Salt / Cryptographic protocols / Cryptography / Password Authenticated Key Exchange by Juggling

J-PAKE: Authenticated Key Exchange without PKI Feng Hao1 and Peter Ryan2 1 2

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-12-17 06:46:52
996Dining cryptographers problem / Mathematics / Applied mathematics / Cryptography / Cryptographic protocols / Anonymous veto network

A 2-Round Anonymous Veto Protocol A new solution to the dining cryptographers problem Speaker: Feng Hao Computer Laboratory University of Cambridge

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2007-07-03 13:14:36
997Electoral systems / Electronic voting / Information society / Voting machine / Ballot / Help America Vote Act / Voting system / Election recount / Software independence / Politics / Elections / Election technology

Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting Feng Hao School of Computing Science Newcastle University, UK [removed] Abstract—This paper presents a new and complete cryptogr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-02-09 18:31:48
998Audience response / Electronic voting / Classroom Performance Systems / Voting system / Voting / E-learning / Politics / Education / Psephology / Elections

Veriable Classroom Voting: Where Cryptography Meets Pedagogy ⋆ Feng Hao, Dylan Clarke, Carlton Shepherd School of Computing Science Newcastle University

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2013-05-15 11:26:08
999Password-authenticated key agreement / Electronic commerce / Password / Two-factor authentication / Man-in-the-middle attack / Biometrics / Security token / RSA / Authentication / Cryptography / Security / Cryptographic protocols

Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol Feng Hao, Dylan Clarke School of Computing Science Newcastle University {feng.hao, dylan.clarke}@ncl.ac.uk

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2012-01-30 18:16:54
1000Anonymous veto network / Dining cryptographers problem / Secure multi-party computation / RSA / Transmission Control Protocol / Communications protocol / Cryptography / Cryptographic protocols / Public-key cryptography

The Power of Anonymous Veto in Public Discussion Feng Hao1 and Piotr Zieli´ nski2, 1

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2010-04-10 14:54:54
UPDATE