Statements (71)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Person
|
gptkbp:affiliation |
gptkb:University_of_Science_and_Technology_of_China
|
gptkbp:awards |
Best Paper Award at conferences.
Outstanding Research Award. Research Excellence Award. |
gptkbp:birthPlace |
China.
|
gptkbp:birthYear |
1970s.
|
gptkbp:collaboratedWith |
Government agencies.
Industry partners. Various international researchers. |
gptkbp:community |
Cryptography and Information Security Group.
Cybersecurity_Research_Group. Information_Security_Research_Group. |
gptkbp:conference |
Annual Cryptography Symposium.
International_Conference_on_Cryptography. International_Symposium_on_Security. |
gptkbp:contribution |
Advancements in secure communication.
Developed cryptographic protocols. Developed secure communication protocols. Enhanced security in digital transactions. Improved digital signature schemes. Research on secure communication protocols. Research on secure voting systems. |
gptkbp:education |
PhD_in_Computer_Science.
|
gptkbp:field |
Information Security
Information Assurance. Applied_Cryptography. Data_Security. Theoretical_Cryptography. |
https://www.w3.org/2000/01/rdf-schema#label |
Feng Hao
|
gptkbp:influencedBy |
Advancements in technology.
Modern_Cryptography. Pioneers_in_Cryptography. |
gptkbp:investmentFocus |
International_Journal_of_Information_Security.
Journal_of_Cryptology. Journal_of_Information_Security. |
gptkbp:knownFor |
Cryptography
|
gptkbp:mentor |
Undergraduate students.
Master's students. PhD students. |
gptkbp:nationality |
Chinese
|
gptkbp:patentCitation |
Cryptographic devices.
Innovative cryptographic methods. Several patents in cryptography. |
gptkbp:profession |
Computer_Scientist
|
gptkbp:publishes |
Technical reports.
Numerous research papers. Books on cryptography. Conference proceedings. Research monographs. Journal_articles. |
gptkbp:researchInterest |
Public Key Cryptography
Blockchain Technology Cybersecurity. Cryptographic Algorithms. Cryptographic Protocols. Homomorphic Encryption. Network Security. Privacy-Preserving Computation. Secure Cloud Computing. Secure Data Sharing. Secure Multi-Party Computation. Secure Software. Security Protocols. Digital_Signatures Cryptographic_Hardware. Zero-Knowledge_Proofs. |
gptkbp:soundtrack |
Cryptography workshops.
Security conferences. Various international conferences. |
gptkbp:website |
Personal academic page.
|