The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

K. P. Chow: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Two Improved Partially Blind Signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:316-328 [Conf]
  2. Wai Wan Tsang, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Sam C. W. Tso
    Tuning the Collision Test for Power. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:23-30 [Conf]
  3. K. P. Chow, Tak Wah Tak Wah, Ka Hing Lee
    The Telephone Directory Enquiry System of Hong Kong. [Citation Graph (0, 0)][DBLP]
    APSEC, 1996, pp:268-0 [Conf]
  4. Lucas Chi Kwong Hui, K. P. Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan
    Risk Management of Corporate Confidential Information in Digital Form. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2004, pp:88-89 [Conf]
  5. Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. Chong, Lucas Chi Kwong Hui
    An Efficient Bloom Filter Based Solution for Multiparty Private Matching. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:286-292 [Conf]
  6. Yan Woo, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
    Dynamic Integrity Verification for Software Self-defense. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2005, pp:327-333 [Conf]
  7. Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong
    Delegation of signing and decryption rights using pki proxy memo. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering, 2004, pp:281-285 [Conf]
  8. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    An e-Lottery Scheme Using Verifiable Random Function. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2005, pp:651-660 [Conf]
  9. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Secure Hierarchical Identity Based Signature and Its Application. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:480-494 [Conf]
  10. Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow
    Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:352-369 [Conf]
  11. Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan
    Separable and Anonymous Identity-Based Key Issuing. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:275-279 [Conf]
  12. Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P. S. Chan, Samuel T. Chanson, Matthew M. H. Cheung, C. F. Chong, K. P. Chow, Albert K. T. Hui, Lucas Chi Kwong Hui, Luke C. K. Lam, W. C. Lau, Kevin K. H. Pun, Anthony Y. F. Tsang, Wai Wan Tsang, Sam C. W. Tso, Dit-Yan Yeung, K. Y. Yu
    IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks. [Citation Graph (0, 0)][DBLP]
    ISPAN, 2004, pp:581-586 [Conf]
  13. Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
    Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:11-19 [Conf]
  14. Xiaoyun Wang, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan
    Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:167-177 [Conf]
  15. K. P. Chow, C. F. Chong, Pierre K. Y. Lai, Lucas Chi Kwong Hui, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan
    Digital Evidence Search Kit. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:187-194 [Conf]
  16. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Practical electronic lotteries with offline TTP. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2830-2840 [Journal]
  17. Zichen Li, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Wai Wan Tsang, H. W. Chan
    Security of Tseng-Jan's group signature schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:75, n:5, pp:187-189 [Journal]
  18. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Richard W. C. Lui
    A generic anti-spyware solution by access control list at kernel level. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:227-234 [Journal]
  19. Jacky S-C. Yuk, Kwan-Yee Kenneth Wong, Ronald H-Y. Chung, K. P. Chow, Francis Y. L. Chin, Kenneth S-H. Tsang
    Object-Based Surveillance Video Retrieval System with Real-Time Indexing Methodology. [Citation Graph (0, 0)][DBLP]
    ICIAR, 2007, pp:626-637 [Conf]
  20. X. He, N. H. C. Yung, K. P. Chow, Francis Y. L. Chin, Ronald H. Y. Chung, Kwan-Yee Kenneth Wong, K. S. H. Tsang
    Watershed segmentation with boundary curvature ratio based merging criterion. [Citation Graph (0, 0)][DBLP]
    SIP, 2007, pp:7-12 [Conf]
  21. Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, K. P. Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun
    A Hybrid Approach for Authenticating MPEG-2 Streaming Data. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:203-212 [Conf]

  22. Efficient Block-based Motion Segmentation Method using Motion Vector Consistency. [Citation Graph (, )][DBLP]


  23. Consistency Issue on Live Systems Forensics. [Citation Graph (, )][DBLP]


  24. Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002