dblp.uni-trier.dewww.uni-trier.de

Kwok-Yan Lam Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
85EEJinyang Shi, Kwok-Yan Lam: MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem. ISA 2009: 382-391
84EEMeng Ge, Kwok-Yan Lam: Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network. ISA 2009: 392-401
83EEMeng Ge, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, C. C. Chang, Jian-Bin Li: A robust certification service for highly dynamic MANET in emergency tasks. Int. J. Communication Systems 22(9): 1177-1197 (2009)
2008
82EEMeng Ge, Kwok-Yan Lam, Jian-Bin Li, Siu Leung Chung: Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. EUC (2) 2008: 312-317
81EEJinyang Shi, Zhiyang You, Ming Gu, Kwok-Yan Lam: Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions. ICPR 2008: 1-4
80EEHong-Wei Sun, Kwok-Yan Lam, Dieter Gollmann, Siu Leung Chung, Jian-Bin Li, Jia-Guang Sun: Efficient Fingercode Classification. IEICE Transactions 91-D(5): 1252-1260 (2008)
2007
79EEHaiyong Chen, Hongwei Sun, Kwok-Yan Lam: A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. SECURWARE 2007: 211-215
2006
78EEXibin Zhao, Kwok-Yan Lam, Guimin Luo, Siu Leung Chung, Ming Gu: Minimal Threshold Closure. ESORICS 2006: 145-155
77EEXiaoming Jin, Xinqiang Zuo, Kwok-Yan Lam, Jianmin Wang, Jia-Guang Sun: Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams. ICDE 2006: 113
76EEHong-Wei Sun, Kwok-Yan Lam, Ming Gu, Jia-Guang Sun: An Efficient Algorithm for Fingercode-Based Biometric Identification. OTM Workshops (1) 2006: 469-478
2005
75EEMo Chen, Jian-Tao Sun, Hua-Jun Zeng, Kwok-Yan Lam: A practical system of keyphrase extraction for web pages. CIKM 2005: 277-278
74EEGuoliang Xie, Mingwei Xu, Kwok-Yan Lam, Qian Wu: The Impact of Mobility Modeling in Mobile IP Multicast Research. ICCNMC 2005: 295-304
73EEHong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. ICCNMC 2005: 817-825
72EEBangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang: Secure Construction of Virtual Organizations in Grid Computing Systems. WINE 2005: 959-968
71EEChin-Chen Chang, Iuon-Chang Lin, Kwok-Yan Lam: An ID-based multisignature scheme without reblocking and predetermined signing order. Computer Standards & Interfaces 27(4): 407-413 (2005)
70EEHongwei Sun, Kwok-Yan Lam, Siu Leung Chung, Wei-Ming Dong, Ming Gu, Jia-Guang Sun: Efficient vector quantization using genetic algorithm. Neural Computing and Applications 14(3): 203-211 (2005)
2004
69 Chi-Hung Chi, Kwok-Yan Lam: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings Springer 2004
68EEXibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. ACISP 2004: 414-426
67EEXing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun: Real-Time Emulation of Intrusion Victim in HoneyFarm. AWCC 2004: 143-154
66EEJian-Ping Yong, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Enhancing the Scalability of the Community Authorization Service for Virtual Organizations. AWCC 2004: 182-193
65EEHong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Anomaly Detection in Grid Computing Based on Vector Quantization. GCC 2004: 883-886
64EEYi-Yuan Huang, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun: Application of Content Computing in Honeyfarm. WISA 2004: 211-222
2003
63EEZhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. ACNS 2003: 63-75
62EEQinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun: GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas. ICADL 2003: 639-642
61EETieyan Li, Huafei Zhu, Kwok-Yan Lam: A Novel Two-Level Trust Model for Grid. ICICS 2003: 214-225
60EEQinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun: GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files. ICWL 2003: 81-92
59EEKwok-Yan Lam, Xibin Zhao, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. WISA 2003: 42-54
58EEKwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Lightweight security for mobile commerce transactions. Computer Communications 26(18): 2052-2060 (2003)
57EEKwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun: Security middleware for enhancing interoperability of Public Key Infrastructure. Computers & Security 22(6): 535-546 (2003)
56EENing Cai, Kwok-Yan Lam: On identification secret sharing schemes. Inf. Comput. 184(2): 298-310 (2003)
2002
55EETieyan Li, Kwok-Yan Lam: An optimal location update and searching algorithm for tracking mobile agent. AAMAS 2002: 639-646
54EETieyan Li, Kwok-Yan Lam: Detecting anomalous agents in mobile agent system: a preliminary approach. AAMAS 2002: 655-656
53EEChi-Hung Chi, Chen Ding, Kwok-Yan Lam: Context Query in Information Retrieval. ICTAI 2002: 101-106
52EEChi-Hung Chi, John Sim, Kwok-Yan Lam: Agent Warehouse: A New Paradigm for Mobile Agent Deployment. ICTAI 2002: 455-462
51EEChi-Hung Chi, Chen Ding, Kwok-Yan Lam: Study for Fusion of Different Sources to Determine Relevance. ICTAI 2002: 515-520
50EETieyan Li, Wai-Meng Chew, Kwok-Yan Lam: Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. IPDPS 2002
49EEChi-Hung Chi, Xiang Li, Kwok-Yan Lam: Understanding the Object Retrieval Dependence of Web Page Access. MASCOTS 2002: 413-420
2001
48 Tieyan Li, Kwok-Yan Lam: A Secure Group Solution for Multi-Agent EC System. IPDPS 2001: 169
47 Kwok-Yan Lam, Francesco Sica: The Weight Distribution of C5(1, n). Des. Codes Cryptography 24(2): 181-191 (2001)
46EEDingfeng Ye, Zongduo Dai, Kwok-Yan Lam: Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions. J. Cryptology 14(2): 137-150 (2001)
2000
45 Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao: On Multiplicative Secret Sharing Schemes. ACISP 2000: 342-351
44EEArrianto Mukti Wibowo, Kwok-Yan Lam, Gary S. H. Tan: Loyalty Program Scheme for Anonymous Payment System. EC-Web 2000: 253-265
43EETieyan Li, Chuk-Yang Seng, Kwok-Yan Lam: A Secure Route Structure for Information Gathering Agent. PRIMA 2000: 101-114
42EECunsheng Ding, Tor Helleseth, Kwok-Yan Lam: Duadic sequences of prime lengths. Discrete Mathematics 218(1-3): 33-49 (2000)
41 Chaoping Xing, Huaxiong Wang, Kwok-Yan Lam: Constructions of authentication codes from algebraic curves over finite fields. IEEE Transactions on Information Theory 46(3): 886-892 (2000)
40 Guozhen Xiao, Shimin Wei, Kwok-Yan Lam, Kyoki Imamura: A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q). IEEE Transactions on Information Theory 46(6): 2203-2206 (2000)
1999
39 Kwok-Yan Lam, Eiji Okamoto, Chaoping Xing: Advances in Cryptology - ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings Springer 1999
38EEChaoping Xing, Kwok-Yan Lam, Zhenghong Wei: A Class of Explicit Perfect Multi-sequences. ASIACRYPT 1999: 299-305
37EEXiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto: Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. CIA 1999: 291-302
36EEDingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai: Cryptanalysis of ``2 R'' Schemes. CRYPTO 1999: 315-325
35 Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam: A New Approach to Robust Threshold RSA Signature Schemes. ICISC 1999: 184-196
34EE Sufatrio, Kwok-Yan Lam: Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication. ISPAN 1999: 364-369
33EE Sufatrio, Kwok-Yan Lam: Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework. MDA 1999: 220-229
32EEJianying Zhou, Kwok-Yan Lam: A Secure Pay-per View Scheme for Web-Based Video Service. Public Key Cryptography 1999: 315-326
31EEHarald Niederreiter, Chaoping Xing, Kwok-Yan Lam: A New Construction of Algebraic Geometry Codes. Appl. Algebra Eng. Commun. Comput. 9(5): 373-381 (1999)
30EEJianying Zhou, Kwok-Yan Lam: Securing digital signatures for non-repudiation. Computer Communications 22(8): 710-716 (1999)
29 Cunsheng Ding, Kwok-Yan Lam, Chaoping Xing: Construction and Enumeration of All Binary Duadic Codes of Length pm. Fundam. Inform. 38(1-2): 149-161 (1999)
28 Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam: Constructions of Algebraic-Geometry Codes. IEEE Transactions on Information Theory 45(4): 1186-1193 (1999)
27 Chaoping Xing, Kwok-Yan Lam: Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields. IEEE Transactions on Information Theory 45(4): 1267-1270 (1999)
26 Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam: A generalization of algebraic-geometry codes. IEEE Transactions on Information Theory 45(7): 2498-2501 (1999)
25 Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam: Several classes of binary sequences with three-level autocorrelation. IEEE Transactions on Information Theory 45(7): 2606-2612 (1999)
24EEChunru Zhang, Kwok-Yan Lam, Sushil Jajodia: Scalable Threshold Closure. Theor. Comput. Sci. 226(1-2): 185-206 (1999)
1998
23EEXun Yi, Kwok-Yan Lam, Yongfei Han: Differential Cryptanalysis of a Block Cipher. ACISP 1998: 58-67
22EEZong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam: Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. ASIACRYPT 1998: 227-241
21 Guopei Qiao, Kwok-Yan Lam: RSA Signature Algorithm for Microcontroller Implementation. CARDIS 1998: 353-356
20 Xiao Feng Wang, Xun Yi, Kwok-Yan Lam, Eiji Okamoto: Secure Information Gathering Agent for Internet Trading. DAI 1998: 183-193
19EEJianying Zhou, Kwok-Yan Lam: Undeniable Billing in Mobile Communication. MOBICOM 1998: 284-290
18EEXiao Feng Wang, Kwok-Yan Lam, Xun Yi: Secure Agent-Mediated Mobile Payment. PRIMA 1998: 162-173
17 Xun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu: A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. SRDS 1998: 197-203
16EEXun Yi, Xiao Feng Wang, Kwok-Yan Lam: A Secure Intelligent Trade Agent System. Trends in Distributed Systems for Electronic Commerce 1998: 218-228
1997
15 Xun Yi, Kwok-Yan Lam: A New Hash Function Based on Block Cipher. ACISP 1997: 139-146
14 Xun Yi, Kwok-Yan Lam, Shi Xin Cheng, Xiao Hu You: A New Byte-Oriented Block Cipher. ISW 1997: 209-220
13 Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea: Global Optimisation in Neural Network Training. Neural Computing and Applications 5(1): 58-64 (1997)
1996
12EERynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung: The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. ACM Conference on Computer and Communications Security 1996: 62-67
11 Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui: Efficient Generation of Elliptic Curve Cryptosystems. COCOON 1996: 411-416
10EEKwok-Yan Lam, Lucas Chi Kwong Hui: Efficient nearer-ancestor algorithm for network routing. Computer Communications 19(12): 1014-1019 (1996)
9EEKwok-Yan Lam, Lucas Chi Kwong Hui: Designing a system infrastructure for distributed programs. Computer Communications 19(9-10): 754-762 (1996)
8EEKwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: A data reduction method for intrusion detection. Journal of Systems and Software 33(1): 101-108 (1996)
1995
7 Lucas Chi Kwong Hui, Kwok-Yan Lam: Analysis and Experimentation on List Update Algorithms. COCOON 1995: 576-581
6EEKwok-Yan Lam: Replay tolerance of authentication protocols. Computer Communications 18(12): 988-992 (1995)
5EEKwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung: Multivariate data analysis software for enhancing system security. Journal of Systems and Software 31(3): 267-275 (1995)
1993
4 Hermann Strack, Kwok-Yan Lam: Context-Dependent Access Control in Distributed Systems. SEC 1993: 137-155
1992
3EEKwok-Yan Lam, Dieter Gollmann: Freshness Assurance of Authentication Protocols. ESORICS 1992: 261-272
2EEKwok-Yan Lam, Thomas Beth: Timely Authentication in Distributed Systems. ESORICS 1992: 293-303
1991
1 Kwok-Yan Lam: An Implementation for Small Databases with High Availability. Operating Systems Review 25(4): 77-87 (1991)

Coauthor Index

1Thomas Beth [2]
2Ning Cai [56]
3C. C. Chang [83]
4Chin-Chen Chang [71]
5Chee Weng Chea [13]
6Haiyong Chen [79]
7Mo Chen [75]
8Shi Xin Cheng [14]
9Wai-Meng Chew [50]
10Chi-Hung Chi [49] [51] [52] [53] [64] [67] [69]
11Siu Leung Chung [5] [8] [12] [57] [58] [59] [63] [64] [65] [66] [67] [68] [70] [72] [73] [78] [80] [82] [83]
12Zongduo Dai (Zong-Duo Dai) [22] [36] [46]
13Chen Ding [51] [53]
14Cunsheng Ding [25] [29] [42]
15Wei-Ming Dong [70]
16Meng Ge [82] [83] [84]
17Dieter Gollmann [3] [80] [83]
18Ming Gu [57] [58] [59] [63] [65] [66] [68] [70] [73] [76] [78] [81]
19Zhi Guo [63]
20Yongfei Han [23]
21Xing-Yun He [67]
22Tor Helleseth [25] [42]
23D. Frank Hsu [17]
24Yi-Yuan Huang [64]
25Lucas Chi Kwong Hui [5] [7] [8] [9] [10] [11] [13]
26Kyoki Imamura [40]
27Sushil Jajodia [24]
28Xiaoming Jin [77]
29Rynson W. H. Lau [12]
30Jian-Bin Li [80] [82] [83]
31Qinghu Li [60] [62]
32Tieyan Li [43] [48] [50] [54] [55] [61]
33Xiang Li [49]
34Iuon-Chang Lin [71]
35San Ling [11]
36Guimin Luo [78]
37Harald Niederreiter [26] [28] [31]
38Eiji Okamoto [17] [20] [37] [39]
39Guopei Qiao [21]
40Reihaneh Safavi-Naini [35]
41Chuk-Yang Seng [43]
42Jinyang Shi [81] [85]
43Francesco Sica [47]
44John Sim [52]
45Hermann Strack [4]
46 Sufatrio [33] [34]
47Hong-Wei Sun [65] [73] [76] [80]
48Hongwei Sun [70] [79]
49Jia-Guang Sun (Jiaguang Sun) [57] [58] [59] [60] [62] [63] [64] [65] [66] [67] [68] [70] [73] [76] [77] [80]
50Jian-Tao Sun [75]
51Gary S. H. Tan [44]
52Huaxiong Wang [35] [41] [45] [72]
53Jianmin Wang [60] [62] [77]
54Xiao Feng Wang [16] [17] [18] [20] [37]
55Shimin Wei [40]
56Zhenghong Wei [38]
57Arrianto Mukti Wibowo [44]
58Bangyu Wu [72]
59Qian Wu [74]
60Guozhen Xiao [40] [45]
61Guoliang Xie [74]
62Chaoping Xing [26] [27] [28] [29] [31] [38] [39] [41]
63Mingwei Xu [74]
64Dingfeng Ye [22] [36] [46]
65Xun Yi [14] [15] [16] [17] [18] [20] [23] [37]
66Jian-Ping Yong [66]
67Xiao Hu You [14]
68Zhiyang You [81]
69Hua-Jun Zeng [75]
70C. Q. Zhang [37]
71Chunru Zhang [24]
72Huanhui Zhao [45]
73Xibin Zhao [59] [68] [78]
74Jianying Zhou [19] [30] [32]
75Huafei Zhu [61]
76Xinqiang Zuo [77]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)