dblp.uni-trier.dewww.uni-trier.de

Lucas Chi Kwong Hui Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2008
65 Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings Springer 2008
64EEEric K. Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu: Authenticated Directed Diffusion. CANS 2008: 366-377
63EEZoe L. Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong: Chained Threshold Proxy Signature without and with Supervision. CSSE (3) 2008: 837-840
62EEZoe L. Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu: Improving Disk Sector Integrity Using K-Dimension Hashing. IFIP Int. Conf. Digital Forensics 2008: 87-98
2007
61EEZoe L. Jiang, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu, Pierre K. Y. Lai: Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. FGCN (2) 2007: 141-145
60EEYing Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui, H. W. Go: An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks. ICC 2007: 1241-1246
59EELucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu: Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). ISPEC 2007: 11-19
58EEMeiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, K. P. Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun: A Hybrid Approach for Authenticating MPEG-2 Streaming Data. MCAM 2007: 203-212
57 Dan T. F. Chan, Siu-Ming Yiu, Lucas Chi Kwong Hui: Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. Security and Management 2007: 559-565
56EEY. Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui: Providing distributed certificate authority service in cluster-based mobile ad hoc networks. Computer Communications 30(11-12): 2442-2452 (2007)
55EERichard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu: Delegation with supervision. Inf. Sci. 177(19): 4014-4030 (2007)
2006
54EEEric K. Wang, Joe C. K. Yau, Lucas Chi Kwong Hui, Zoe L. Jiang, Siu-Ming Yiu: A Key-Recovery System for Long-term Encrypted Documents. EDOC Workshops 2006: 52
53 Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. Chong, Lucas Chi Kwong Hui: An Efficient Bloom Filter Based Solution for Multiparty Private Matching. Security and Management 2006: 286-292
52EESherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow: Practical electronic lotteries with offline TTP. Computer Communications 29(15): 2830-2840 (2006)
51EEEric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, K. P. Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, S. K. Ip, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Siu-Ming Yiu, K. Y. Yu, W. Ju: Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed. IEEE Journal on Selected Areas in Communications 24(10): 1889-1900 (2006)
2005
50EESherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow: Two Improved Partially Blind Signature Schemes from Bilinear Pairings. ACISP 2005: 316-328
49EERichard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu: Role Activation Management in Role Based Access Control. ACISP 2005: 358-369
48EEH. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li: Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). ACM Southeast Regional Conference (2) 2005: 75-80
47EESherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui: Efficient Identity Based Ring Signature. ACNS 2005: 499-512
46EEJoe C. K. Yau, Lucas Chi Kwong Hui, Bruce S. N. Cheung, Siu-Ming Yiu, Yan Woo, K. W. Lau, Eric H. M. Li: Trustworthy Browsing - A Secure Web Accessing Model. EEE 2005: 542-547
45EESherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu: Identity Based Ring Signature: Why, How and What Next. EuroPKI 2005: 144-161
44EERichard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu: Secure Role Activation and Authorization in the Enterprise Environment. EuroPKI 2005: 22-35
43EESherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow: An e-Lottery Scheme Using Verifiable Random Function. ICCSA (3) 2005: 651-660
42EERichard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu: Supporting Efficient Authorization in Delegation with Supervision. ICPADS (2) 2005: 240-244
41EEAi Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan: Separable and Anonymous Identity-Based Key Issuing. ICPADS (2) 2005: 275-279
40EESherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu: Identity Based Delegation Network. Mycrypt 2005: 99-115
39EEK. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan: Digital Evidence Search Kit. SADFE 2005: 187-194
38 Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu: Signcryption in Hierarchical Identity Based Cryptosystem. SEC 2005: 443-457
37 Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo: A model to support fine-grained delegation of authorization. Security and Management 2005: 208-212
36 Yan Woo, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu: Dynamic Integrity Verification for Software Self-defense. Security and Management 2005: 327-333
35EESherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow: Forward-secure multisignature and blind signature schemes. Applied Mathematics and Computation 168(2): 895-908 (2005)
34EESherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Richard W. C. Lui: A generic anti-spyware solution by access control list at kernel level. Journal of Systems and Software 75(1-2): 227-234 (2005)
2004
33EEWai Wan Tsang, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Sam C. W. Tso: Tuning the Collision Test for Power. ACSC 2004: 23-30
32EELucas Chi Kwong Hui, K. P. Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan: Risk Management of Corporate Confidential Information in Digital Form. COMPSAC 2004: 88-89
31 Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong: Delegation of signing and decryption rights using pki proxy memo. IASTED Conf. on Software Engineering 2004: 281-285
30 Richard W. C. Lui, Lucas Chi Kwong Hui: A model for delegation of accountability. IASTED Conf. on Software Engineering 2004: 286-291
29 Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu: The Delegation Problem and Practical PKI-Based Solutions. ICEIS (3) 2004: 73-84
28EESherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow: Secure Hierarchical Identity Based Signature and Its Application. ICICS 2004: 480-494
27EESherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu: Identity Based Threshold Ring Signature. ICISC 2004: 218-232
26EEEric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, K. P. Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, K. Y. Yu: IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. ISPAN 2004: 581-586
25 H. W. Go, Y. Dong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li: Applying Forward Security and Threshold Cryptography in Ad Hoc Networks. International Conference on Wireless Networks 2004: 202-209
2003
24EESherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow: Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. ICISC 2003: 352-369
23EEB. Cheung, Lucas Chi Kwong Hui, J. Zhang, Siu-Ming Yiu: SmartTutor: An intelligent tutoring system in web-based adult education. Journal of Systems and Software 68(1): 11-25 (2003)
2001
22EEKarl R. P. H. Leung, Lucas Chi Kwong Hui: Handling signature purposes in workflow systems. Journal of Systems and Software 55(3): 245-259 (2001)
2000
21EEKarl R. P. H. Leung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Ricky W. M. Tang: Modeling Web Navigation by Statechart. COMPSAC 2000: 41-47
20EEKarl R. P. H. Leung, Lucas Chi Kwong Hui: Multiple Signature Handling in Workflow Systems. HICSS 2000
19 Xiaoyun Wang, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan: Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. Public Key Cryptography 2000: 167-177
18EEZichen Li, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Wai Wan Tsang, H. W. Chan: Security of Tseng-Jan's group signature schemes. Inf. Process. Lett. 75(5): 187-189 (2000)
1999
17 Lucas Chi Kwong Hui, Dik Lun Lee: Internet Applications, 5th International Computer Science Conference, ICSC'99, Hong Kong, China, December 13-15, 1999, Proceedings Springer 1999
16EEKarl R. P. H. Leung, Lucas Chi Kwong Hui: Signature Management in Workflow Systems. COMPSAC 1999: 424-429
15 Karl R. P. H. Leung, Lucas Chi Kwong Hui, Ricky W. M. Tang: Integrating Different Signature Purposes in Workflow Systems - A Case Study. ICSC 1999: 360-366
1997
14 Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea: Global Optimisation in Neural Network Training. Neural Computing and Applications 5(1): 58-64 (1997)
1996
13 Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui: Efficient Generation of Elliptic Curve Cryptosystems. COCOON 1996: 411-416
12 Lucas Chi Kwong Hui, Charles U. Martel: Randomized Competitive Algorithms for Successful and Unsuccessful Search. Comput. J. 39(5): 427-439 (1996)
11EEKwok-Yan Lam, Lucas Chi Kwong Hui: Efficient nearer-ancestor algorithm for network routing. Computer Communications 19(12): 1014-1019 (1996)
10EEKwok-Yan Lam, Lucas Chi Kwong Hui: Designing a system infrastructure for distributed programs. Computer Communications 19(9-10): 754-762 (1996)
9EELucas Chi Kwong Hui, Charles U. Martel: Analyzing Self-Adjusting Linear List Algorithms with Deletions and Unsuccessful Searches. Inf. Process. Lett. 58(5): 231-236 (1996)
8EEKwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: A data reduction method for intrusion detection. Journal of Systems and Software 33(1): 101-108 (1996)
1995
7 Lucas Chi Kwong Hui, Kwok-Yan Lam: Analysis and Experimentation on List Update Algorithms. COCOON 1995: 576-581
6EEKwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: Multivariate data analysis software for enhancing system security. Journal of Systems and Software 31(3): 267-275 (1995)
1994
5EELucas Chi Kwong Hui, Charles U. Martel: Analysing Deletions in Competitive Self-Adjusting Linear List. ISAAC 1994: 433-441
1993
4EELucas Chi Kwong Hui, Charles U. Martel: Randomized Competitive Algorithms for Successful and Unsuccessful Search on Self-adjusting Linear Lists. ISAAC 1993: 426-435
3 Lucas Chi Kwong Hui, Charles U. Martel: Unsuccessful Search in Self-Adjusting Data Structures. J. Algorithms 15(3): 447-481 (1993)
1992
2 Lucas Chi Kwong Hui: Color Set Size Problem with Application to String Matching. CPM 1992: 230-243
1EELucas Chi Kwong Hui, Charles U. Martel: On Efficient Unsuccessful Search. SODA 1992: 217-227

Coauthor Index

1Dan T. F. Chan [57]
2Eric Y. K. Chan [26] [51]
3H. W. Chan [18] [19] [26] [31] [32] [39] [41] [51] [58]
4K. M. Chan [26] [51]
5P. Y. Chan [48]
6Vivien P. S. Chan [26] [51]
7Samuel T. Chanson [26] [51]
8Chee Weng Chea [14]
9B. Cheung [23]
10Bruce S. N. Cheung [46]
11Matthew M. H. Cheung [26] [51]
12Venus L. S. Cheung [29] [31]
13C. F. Chong [18] [19] [26] [31] [32] [33] [39] [41] [51] [53] [58]
14K. P. Chow [18] [19] [24] [26] [28] [31] [32] [33] [34] [35] [36] [39] [41] [43] [50] [51] [52] [53] [58] [59] [61]
15Sherman S. M. Chow [24] [27] [28] [34] [35] [38] [40] [41] [42] [43] [45] [47] [49] [50] [52]
16Siu Leung Chung [6] [8]
17Y. Dong [25] [48] [56] [63]
18Ying Dong [60]
19Matthew K. Franklin [65]
20H. W. Go [25] [48] [60]
21Albert K. T. Hui [26] [51]
22S. K. Ip [51]
23Zoe L. Jiang [54] [61] [62] [63]
24W. Ju [51]
25Pierre K. Y. Lai [39] [53] [61]
26Kwok-Yan Lam [6] [7] [8] [10] [11] [13] [14]
27Luke C. K. Lam [26] [51]
28K. W. Lau [46]
29W. C. Lau [26] [51]
30Dik Lun Lee [17]
31Karl R. P. H. Leung [15] [16] [20] [21] [22]
32Eric H. M. Li [46]
33Lin Li [58]
34Victor O. K. Li [25] [48] [56] [60]
35Zichen Li [18]
36San Ling [13]
37Richard W. C. Lui [30] [34] [37] [40] [42] [44] [45] [49] [55]
38Charles U. Martel [1] [3] [4] [5] [9] [12]
39Kevin K. H. Pun [26] [31] [32] [39] [41] [51] [58]
40Ai Fen Sui [41] [48] [56] [60]
41Ricky W. M. Tang [15] [21]
42Anthony Y. F. Tsang [26] [51]
43Wai Wan Tsang [18] [19] [26] [31] [32] [33] [39] [41] [51] [58]
44Sam C. W. Tso [26] [33] [51]
45Eric K. Wang [54] [64]
46Meiqin Wang [58]
47Xiaoyun Wang [19]
48Duncan S. Wong [65]
49Starsky H. Y. Wong [63]
50Yan Woo [36] [37] [46]
51Joe C. K. Yau [46] [54]
52Dit-Yan Yeung [26] [51]
53Siu-Ming Yiu [21] [23] [24] [25] [27] [28] [29] [31] [32] [34] [35] [36] [37] [38] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] [61] [62] [63] [64]
54K. Y. Yu [26] [51]
55Tsz Hon Yuen [38]
56J. Zhang [23]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)