Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

Home Page

* | 2008 | |
---|---|---|

65 | Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings Springer 2008 | |

64 | EE | Eric K. Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu: Authenticated Directed Diffusion. CANS 2008: 366-377 |

63 | EE | Zoe L. Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong: Chained Threshold Proxy Signature without and with Supervision. CSSE (3) 2008: 837-840 |

62 | EE | Zoe L. Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu: Improving Disk Sector Integrity Using K-Dimension Hashing. IFIP Int. Conf. Digital Forensics 2008: 87-98 |

2007 | ||

61 | EE | Zoe L. Jiang, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu, Pierre K. Y. Lai: Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. FGCN (2) 2007: 141-145 |

60 | EE | Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui, H. W. Go: An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks. ICC 2007: 1241-1246 |

59 | EE | Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu: Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). ISPEC 2007: 11-19 |

58 | EE | Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, K. P. Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun: A Hybrid Approach for Authenticating MPEG-2 Streaming Data. MCAM 2007: 203-212 |

57 | Dan T. F. Chan, Siu-Ming Yiu, Lucas Chi Kwong Hui: Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. Security and Management 2007: 559-565 | |

56 | EE | Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui: Providing distributed certificate authority service in cluster-based mobile ad hoc networks. Computer Communications 30(11-12): 2442-2452 (2007) |

55 | EE | Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu: Delegation with supervision. Inf. Sci. 177(19): 4014-4030 (2007) |

2006 | ||

54 | EE | Eric K. Wang, Joe C. K. Yau, Lucas Chi Kwong Hui, Zoe L. Jiang, Siu-Ming Yiu: A Key-Recovery System for Long-term Encrypted Documents. EDOC Workshops 2006: 52 |

53 | Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. Chong, Lucas Chi Kwong Hui: An Efficient Bloom Filter Based Solution for Multiparty Private Matching. Security and Management 2006: 286-292 | |

52 | EE | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow: Practical electronic lotteries with offline TTP. Computer Communications 29(15): 2830-2840 (2006) |

51 | EE | Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, K. P. Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, S. K. Ip, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, Siu-Ming Yiu, K. Y. Yu, W. Ju: Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed. IEEE Journal on Selected Areas in Communications 24(10): 1889-1900 (2006) |

2005 | ||

50 | EE | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow: Two Improved Partially Blind Signature Schemes from Bilinear Pairings. ACISP 2005: 316-328 |

49 | EE | Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu: Role Activation Management in Role Based Access Control. ACISP 2005: 358-369 |

48 | EE | H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li: Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). ACM Southeast Regional Conference (2) 2005: 75-80 |

47 | EE | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui: Efficient Identity Based Ring Signature. ACNS 2005: 499-512 |

46 | EE | Joe C. K. Yau, Lucas Chi Kwong Hui, Bruce S. N. Cheung, Siu-Ming Yiu, Yan Woo, K. W. Lau, Eric H. M. Li: Trustworthy Browsing - A Secure Web Accessing Model. EEE 2005: 542-547 |

45 | EE | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu: Identity Based Ring Signature: Why, How and What Next. EuroPKI 2005: 144-161 |

44 | EE | Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu: Secure Role Activation and Authorization in the Enterprise Environment. EuroPKI 2005: 22-35 |

43 | EE | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow: An e-Lottery Scheme Using Verifiable Random Function. ICCSA (3) 2005: 651-660 |

42 | EE | Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu: Supporting Efficient Authorization in Delegation with Supervision. ICPADS (2) 2005: 240-244 |

41 | EE | Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan: Separable and Anonymous Identity-Based Key Issuing. ICPADS (2) 2005: 275-279 |

40 | EE | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu: Identity Based Delegation Network. Mycrypt 2005: 99-115 |

39 | EE | K. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan: Digital Evidence Search Kit. SADFE 2005: 187-194 |

38 | Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu: Signcryption in Hierarchical Identity Based Cryptosystem. SEC 2005: 443-457 | |

37 | Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo: A model to support fine-grained delegation of authorization. Security and Management 2005: 208-212 | |

36 | Yan Woo, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu: Dynamic Integrity Verification for Software Self-defense. Security and Management 2005: 327-333 | |

35 | EE | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow: Forward-secure multisignature and blind signature schemes. Applied Mathematics and Computation 168(2): 895-908 (2005) |

34 | EE | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Richard W. C. Lui: A generic anti-spyware solution by access control list at kernel level. Journal of Systems and Software 75(1-2): 227-234 (2005) |

2004 | ||

33 | EE | Wai Wan Tsang, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Sam C. W. Tso: Tuning the Collision Test for Power. ACSC 2004: 23-30 |

32 | EE | Lucas Chi Kwong Hui, K. P. Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan: Risk Management of Corporate Confidential Information in Digital Form. COMPSAC 2004: 88-89 |

31 | Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong: Delegation of signing and decryption rights using pki proxy memo. IASTED Conf. on Software Engineering 2004: 281-285 | |

30 | Richard W. C. Lui, Lucas Chi Kwong Hui: A model for delegation of accountability. IASTED Conf. on Software Engineering 2004: 286-291 | |

29 | Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu: The Delegation Problem and Practical PKI-Based Solutions. ICEIS (3) 2004: 73-84 | |

28 | EE | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow: Secure Hierarchical Identity Based Signature and Its Application. ICICS 2004: 480-494 |

27 | EE | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu: Identity Based Threshold Ring Signature. ICISC 2004: 218-232 |

26 | EE | Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, K. P. Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, K. Y. Yu: IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. ISPAN 2004: 581-586 |

25 | H. W. Go, Y. Dong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li: Applying Forward Security and Threshold Cryptography in Ad Hoc Networks. International Conference on Wireless Networks 2004: 202-209 | |

2003 | ||

24 | EE | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow: Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. ICISC 2003: 352-369 |

23 | EE | B. Cheung, Lucas Chi Kwong Hui, J. Zhang, Siu-Ming Yiu: SmartTutor: An intelligent tutoring system in web-based adult education. Journal of Systems and Software 68(1): 11-25 (2003) |

2001 | ||

22 | EE | Karl R. P. H. Leung, Lucas Chi Kwong Hui: Handling signature purposes in workflow systems. Journal of Systems and Software 55(3): 245-259 (2001) |

2000 | ||

21 | EE | Karl R. P. H. Leung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Ricky W. M. Tang: Modeling Web Navigation by Statechart. COMPSAC 2000: 41-47 |

20 | EE | Karl R. P. H. Leung, Lucas Chi Kwong Hui: Multiple Signature Handling in Workflow Systems. HICSS 2000 |

19 | Xiaoyun Wang, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan: Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. Public Key Cryptography 2000: 167-177 | |

18 | EE | Zichen Li, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Wai Wan Tsang, H. W. Chan: Security of Tseng-Jan's group signature schemes. Inf. Process. Lett. 75(5): 187-189 (2000) |

1999 | ||

17 | Lucas Chi Kwong Hui, Dik Lun Lee: Internet Applications, 5th International Computer Science Conference, ICSC'99, Hong Kong, China, December 13-15, 1999, Proceedings Springer 1999 | |

16 | EE | Karl R. P. H. Leung, Lucas Chi Kwong Hui: Signature Management in Workflow Systems. COMPSAC 1999: 424-429 |

15 | Karl R. P. H. Leung, Lucas Chi Kwong Hui, Ricky W. M. Tang: Integrating Different Signature Purposes in Workflow Systems - A Case Study. ICSC 1999: 360-366 | |

1997 | ||

14 | Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea: Global Optimisation in Neural Network Training. Neural Computing and Applications 5(1): 58-64 (1997) | |

1996 | ||

13 | Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui: Efficient Generation of Elliptic Curve Cryptosystems. COCOON 1996: 411-416 | |

12 | Lucas Chi Kwong Hui, Charles U. Martel: Randomized Competitive Algorithms for Successful and Unsuccessful Search. Comput. J. 39(5): 427-439 (1996) | |

11 | EE | Kwok-Yan Lam, Lucas Chi Kwong Hui: Efficient nearer-ancestor algorithm for network routing. Computer Communications 19(12): 1014-1019 (1996) |

10 | EE | Kwok-Yan Lam, Lucas Chi Kwong Hui: Designing a system infrastructure for distributed programs. Computer Communications 19(9-10): 754-762 (1996) |

9 | EE | Lucas Chi Kwong Hui, Charles U. Martel: Analyzing Self-Adjusting Linear List Algorithms with Deletions and Unsuccessful Searches. Inf. Process. Lett. 58(5): 231-236 (1996) |

8 | EE | Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: A data reduction method for intrusion detection. Journal of Systems and Software 33(1): 101-108 (1996) |

1995 | ||

7 | Lucas Chi Kwong Hui, Kwok-Yan Lam: Analysis and Experimentation on List Update Algorithms. COCOON 1995: 576-581 | |

6 | EE | Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: Multivariate data analysis software for enhancing system security. Journal of Systems and Software 31(3): 267-275 (1995) |

1994 | ||

5 | EE | Lucas Chi Kwong Hui, Charles U. Martel: Analysing Deletions in Competitive Self-Adjusting Linear List. ISAAC 1994: 433-441 |

1993 | ||

4 | EE | Lucas Chi Kwong Hui, Charles U. Martel: Randomized Competitive Algorithms for Successful and Unsuccessful Search on Self-adjusting Linear Lists. ISAAC 1993: 426-435 |

3 | Lucas Chi Kwong Hui, Charles U. Martel: Unsuccessful Search in Self-Adjusting Data Structures. J. Algorithms 15(3): 447-481 (1993) | |

1992 | ||

2 | Lucas Chi Kwong Hui: Color Set Size Problem with Application to String Matching. CPM 1992: 230-243 | |

1 | EE | Lucas Chi Kwong Hui, Charles U. Martel: On Efficient Unsuccessful Search. SODA 1992: 217-227 |