The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

H. W. Chan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lucas Chi Kwong Hui, K. P. Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan
    Risk Management of Corporate Confidential Information in Digital Form. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2004, pp:88-89 [Conf]
  2. Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong
    Delegation of signing and decryption rights using pki proxy memo. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2004, pp:281-285 [Conf]
  3. Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan
    Separable and Anonymous Identity-Based Key Issuing. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:275-279 [Conf]
  4. Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, K. P. Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, K. Y. Yu
    IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:581-586 [Conf]
  5. John C. S. Lui, Cedric C. F. Fong, H. W. Chan
    Location Updates and Probabilistic Tracking Algorithms for Mobile Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1999, pp:432-437 [Conf]
  6. Xiaoyun Wang, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan
    Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:167-177 [Conf]
  7. K. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan
    Digital Evidence Search Kit. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:187-194 [Conf]
  8. Mario Gerla, H. W. Chan
    Window selection in flow controlled networks. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 1985, pp:84-92 [Conf]
  9. Zichen Li, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Wai Wan Tsang, H. W. Chan
    Security of Tseng-Jan's group signature schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:75, n:5, pp:187-189 [Journal]
  10. H. W. Chan, P. F. Lam
    Visualizing input and output analysis for simulation (VINOAS). [Citation Graph (0, 0)][DBLP]
    Simul. Pr. Theory, 1997, v:5, n:5, pp:425-453 [Journal]
  11. C. K. Ng, H. W. Chan
    Performance Modeling of Level Switching in Multitier Mobile Communication Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:4, pp:430-444 [Journal]
  12. C. K. Ng, H. W. Chan
    Enhanced Distance-Based Location Management of Mobile Communication Systems Using a Cell Coordinates Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2005, v:4, n:1, pp:41-55 [Journal]
  13. Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, K. P. Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun
    A Hybrid Approach for Authenticating MPEG-2 Streaming Data. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:203-212 [Conf]

  14. MIX-Crowds, an Anonymity Scheme for File Retrieval Systems. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.021secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002