Search the dblp DataBase
Kwok-Yan Lam :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Xun Yi , Kwok-Yan Lam A New Hash Function Based on Block Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:139-146 [Conf ] Xun Yi , Kwok-Yan Lam , Yongfei Han Differential Cryptanalysis of a Block Cipher. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:58-67 [Conf ] Xi-Bin Zhao , Kwok-Yan Lam , Siu Leung Chung , Ming Gu , Jia-Guang Sun Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:414-426 [Conf ] Huaxiong Wang , Kwok-Yan Lam , Guozhen Xiao , Huanhui Zhao On Multiplicative Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:342-351 [Conf ] Zhi Guo , Kwok-Yan Lam , Siu Leung Chung , Ming Gu , Jia-Guang Sun Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:63-75 [Conf ] Zong-Duo Dai , Dingfeng Ye , Kwok-Yan Lam Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:227-241 [Conf ] Chaoping Xing , Kwok-Yan Lam , Zhenghong Wei A Class of Explicit Perfect Multi-sequences. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:299-305 [Conf ] Tieyan Li , Kwok-Yan Lam An optimal location update and searching algorithm for tracking mobile agent. [Citation Graph (0, 0)][DBLP ] AAMAS, 2002, pp:639-646 [Conf ] Tieyan Li , Kwok-Yan Lam Detecting anomalous agents in mobile agent system: a preliminary approach. [Citation Graph (0, 0)][DBLP ] AAMAS, 2002, pp:655-656 [Conf ] Xing-Yun He , Kwok-Yan Lam , Siu Leung Chung , Chi-Hung Chi , Jia-Guang Sun Real-Time Emulation of Intrusion Victim in HoneyFarm. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:143-154 [Conf ] Jian-Ping Yong , Kwok-Yan Lam , Siu Leung Chung , Ming Gu , Jia-Guang Sun Enhancing the Scalability of the Community Authorization Service for Virtual Organizations. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:182-193 [Conf ] Guopei Qiao , Kwok-Yan Lam RSA Signature Algorithm for Microcontroller Implementation. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:353-356 [Conf ] Rynson W. H. Lau , Kwok-Yan Lam , Siu Leung Chung The Failure of Anti-Hacking Legislation: A Hong Kong Perspective. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:62-67 [Conf ] Xiao Feng Wang , Kwok-Yan Lam , Xun Yi , C. Q. Zhang , Eiji Okamoto Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce. [Citation Graph (0, 0)][DBLP ] CIA, 1999, pp:291-302 [Conf ] Mo Chen , Jian-Tao Sun , Hua-Jun Zeng , Kwok-Yan Lam A practical system of keyphrase extraction for web pages. [Citation Graph (0, 0)][DBLP ] CIKM, 2005, pp:277-278 [Conf ] Lucas Chi Kwong Hui , Kwok-Yan Lam Analysis and Experimentation on List Update Algorithms. [Citation Graph (0, 0)][DBLP ] COCOON, 1995, pp:576-581 [Conf ] Kwok-Yan Lam , San Ling , Lucas Chi Kwong Hui Efficient Generation of Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] COCOON, 1996, pp:411-416 [Conf ] Dingfeng Ye , Kwok-Yan Lam , Zong-Duo Dai Cryptanalysis of ``2 R'' Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:315-325 [Conf ] Xiao Feng Wang , Xun Yi , Kwok-Yan Lam , Eiji Okamoto Secure Information Gathering Agent for Internet Trading. [Citation Graph (0, 0)][DBLP ] DAI, 1998, pp:183-193 [Conf ] Arrianto Mukti Wibowo , Kwok-Yan Lam , Gary S. H. Tan Loyalty Program Scheme for Anonymous Payment System. [Citation Graph (0, 0)][DBLP ] EC-Web, 2000, pp:253-265 [Conf ] Kwok-Yan Lam , Thomas Beth Timely Authentication in Distributed Systems. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:293-303 [Conf ] Kwok-Yan Lam , Dieter Gollmann Freshness Assurance of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:261-272 [Conf ] Xi-Bin Zhao , Kwok-Yan Lam , Guimin Luo , Siu Leung Chung , Ming Gu Minimal Threshold Closure. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:145-155 [Conf ] Hong-Wei Sun , Kwok-Yan Lam , Siu Leung Chung , Ming Gu , Jia-Guang Sun Anomaly Detection in Grid Computing Based on Vector Quantization. [Citation Graph (0, 0)][DBLP ] GCC, 2004, pp:883-886 [Conf ] Qinghu Li , Jianmin Wang , Kwok-Yan Lam , Jia-Guang Sun GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas. [Citation Graph (0, 0)][DBLP ] ICADL, 2003, pp:639-642 [Conf ] Hong-Wei Sun , Kwok-Yan Lam , Siu Leung Chung , Ming Gu , Jia-Guang Sun An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:817-825 [Conf ] Guoliang Xie , Mingwei Xu , Kwok-Yan Lam , Qian Wu The Impact of Mobility Modeling in Mobile IP Multicast Research. [Citation Graph (0, 0)][DBLP ] ICCNMC, 2005, pp:295-304 [Conf ] Xiaoming Jin , Xinqiang Zuo , Kwok-Yan Lam , Jianmin Wang , Jia-Guang Sun Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams. [Citation Graph (0, 0)][DBLP ] ICDE, 2006, pp:113- [Conf ] Tie-Yan Li , Huafei Zhu , Kwok-Yan Lam A Novel Two-Level Trust Model for Grid. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:214-225 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang , Kwok-Yan Lam A New Approach to Robust Threshold RSA Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:184-196 [Conf ] Chi-Hung Chi , Chen Ding , Kwok-Yan Lam Context Query in Information Retrieval. [Citation Graph (0, 0)][DBLP ] ICTAI, 2002, pp:101-106 [Conf ] Chi-Hung Chi , Chen Ding , Kwok-Yan Lam Study for Fusion of Different Sources to Determine Relevance. [Citation Graph (0, 0)][DBLP ] ICTAI, 2002, pp:515-520 [Conf ] Chi-Hung Chi , John Sim , Kwok-Yan Lam Agent Warehouse: A New Paradigm for Mobile Agent Deployment. [Citation Graph (0, 0)][DBLP ] ICTAI, 2002, pp:455-462 [Conf ] Qinghu Li , Jianmin Wang , Kwok-Yan Lam , Jia-Guang Sun GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files. [Citation Graph (0, 0)][DBLP ] ICWL, 2003, pp:81-92 [Conf ] Xun Yi , Xiao Feng Wang , Kwok-Yan Lam A Secure Intelligent Trade Agent System. [Citation Graph (0, 0)][DBLP ] Trends in Distributed Systems for Electronic Commerce, 1998, pp:218-228 [Conf ] Tieyan Li , Kwok-Yan Lam A Secure Group Solution for Multi-Agent EC System. [Citation Graph (0, 0)][DBLP ] IPDPS, 2001, pp:169- [Conf ] Tieyan Li , Wai-Meng Chew , Kwok-Yan Lam Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. [Citation Graph (0, 0)][DBLP ] IPDPS, 2002, pp:- [Conf ] Sufatrio , Kwok-Yan Lam Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication. [Citation Graph (0, 0)][DBLP ] ISPAN, 1999, pp:364-369 [Conf ] Xun Yi , Kwok-Yan Lam , Shi Xin Cheng , Xiao Hu You A New Byte-Oriented Block Cipher. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:209-220 [Conf ] Chi-Hung Chi , Xiang Li , Kwok-Yan Lam Understanding the Object Retrieval Dependence of Web Page Access. [Citation Graph (0, 0)][DBLP ] MASCOTS, 2002, pp:413-420 [Conf ] Sufatrio , Kwok-Yan Lam Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework. [Citation Graph (0, 0)][DBLP ] MDA, 1999, pp:220-229 [Conf ] Jianying Zhou , Kwok-Yan Lam Undeniable Billing in Mobile Communication. [Citation Graph (0, 0)][DBLP ] MOBICOM, 1998, pp:284-290 [Conf ] Hong-Wei Sun , Kwok-Yan Lam , Ming Gu , Jia-Guang Sun An Efficient Algorithm for Fingercode-Based Biometric Identification. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:469-478 [Conf ] Jianying Zhou , Kwok-Yan Lam A Secure Pay-per View Scheme for Web-Based Video Service. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:315-326 [Conf ] Xiao Feng Wang , Kwok-Yan Lam , Xun Yi Secure Agent-Mediated Mobile Payment. [Citation Graph (0, 0)][DBLP ] PRIMA, 1998, pp:162-173 [Conf ] Tieyan Li , Chuk-Yang Seng , Kwok-Yan Lam A Secure Route Structure for Information Gathering Agent. [Citation Graph (0, 0)][DBLP ] PRIMA, 2000, pp:101-114 [Conf ] Hermann Strack , Kwok-Yan Lam Context-Dependent Access Control in Distributed Systems. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:137-155 [Conf ] Xun Yi , Xiao Feng Wang , Kwok-Yan Lam , Eiji Okamoto , D. Frank Hsu A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1998, pp:197-203 [Conf ] Bangyu Wu , Kwok-Yan Lam , Siu Leung Chung , Huaxiong Wang Secure Construction of Virtual Organizations in Grid Computing Systems. [Citation Graph (0, 0)][DBLP ] WINE, 2005, pp:959-968 [Conf ] Yi-Yuan Huang , Kwok-Yan Lam , Siu Leung Chung , Chi-Hung Chi , Jia-Guang Sun Application of Content Computing in Honeyfarm. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:211-222 [Conf ] Kwok-Yan Lam , Xi-Bin Zhao , Siu Leung Chung , Ming Gu , Jia-Guang Sun Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:42-54 [Conf ] Harald Niederreiter , Chaoping Xing , Kwok-Yan Lam A New Construction of Algebraic Geometry Codes. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 1999, v:9, n:5, pp:373-381 [Journal ] Kwok-Yan Lam Replay tolerance of authentication protocols. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1995, v:18, n:12, pp:988-992 [Journal ] Kwok-Yan Lam , Siu Leung Chung , Ming Gu , Jia-Guang Sun Lightweight security for mobile commerce transactions. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2003, v:26, n:18, pp:2052-2060 [Journal ] Kwok-Yan Lam , Lucas Chi Kwong Hui Designing a system infrastructure for distributed programs. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:9-10, pp:754-762 [Journal ] Kwok-Yan Lam , Lucas Chi Kwong Hui Efficient nearer-ancestor algorithm for network routing. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:12, pp:1014-1019 [Journal ] Jianying Zhou , Kwok-Yan Lam Securing digital signatures for non-repudiation. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:8, pp:710-716 [Journal ] Kwok-Yan Lam , Siu Leung Chung , Ming Gu , Jia-Guang Sun Security middleware for enhancing interoperability of Public Key Infrastructure. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:535-546 [Journal ] Kwok-Yan Lam , Francesco Sica The Weight Distribution of C5(1, n). [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2001, v:24, n:2, pp:181-191 [Journal ] Cunsheng Ding , Tor Helleseth , Kwok-Yan Lam Duadic sequences of prime lengths. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 2000, v:218, n:1-3, pp:33-49 [Journal ] Cunsheng Ding , Kwok-Yan Lam , Chaoping Xing Construction and Enumeration of All Binary Duadic Codes of Length pm . [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 1999, v:38, n:1-2, pp:149-161 [Journal ] Ning Cai , Kwok-Yan Lam On identification secret sharing schemes. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 2003, v:184, n:2, pp:298-310 [Journal ] Dingfeng Ye , Zongduo Dai , Kwok-Yan Lam Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2001, v:14, n:2, pp:137-150 [Journal ] Kwok-Yan Lam , Lucas Chi Kwong Hui , Siu Leung Chung A data reduction method for intrusion detection. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1996, v:33, n:1, pp:101-108 [Journal ] Kwok-Yan Lam , Lucas Chi Kwong Hui , Siu Leung Chung Multivariate data analysis software for enhancing system security. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1995, v:31, n:3, pp:267-275 [Journal ] Lucas Chi Kwong Hui , Kwok-Yan Lam , Chee Weng Chea Global Optimisation in Neural Network Training. [Citation Graph (0, 0)][DBLP ] Neural Computing and Applications, 1997, v:5, n:1, pp:58-64 [Journal ] Hongwei Sun , Kwok-Yan Lam , Siu Leung Chung , Wei-Ming Dong , Ming Gu , Jia-Guang Sun Efficient vector quantization using genetic algorithm. [Citation Graph (0, 0)][DBLP ] Neural Computing and Applications, 2005, v:14, n:3, pp:203-211 [Journal ] Kwok-Yan Lam An Implementation for Small Databases with High Availability. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1991, v:25, n:4, pp:77-87 [Journal ] Chunru Zhang , Kwok-Yan Lam , Sushil Jajodia Scalable Threshold Closure. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:185-206 [Journal ] Cunsheng Ding , Tor Helleseth , Kwok-Yan Lam Several classes of binary sequences with three-level autocorrelation. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2606-2612 [Journal ] Chaoping Xing , Kwok-Yan Lam Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1267-1270 [Journal ] Chaoping Xing , Harald Niederreiter , Kwok-Yan Lam Constructions of Algebraic-Geometry Codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1186-1193 [Journal ] Chaoping Xing , Harald Niederreiter , Kwok-Yan Lam A generalization of algebraic-geometry codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2498-2501 [Journal ] Chaoping Xing , Huaxiong Wang , Kwok-Yan Lam Constructions of authentication codes from algebraic curves over finite fields. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:886-892 [Journal ] Guozhen Xiao , Shimin Wei , Kwok-Yan Lam , Kyoki Imamura A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q). [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:6, pp:2203-2206 [Journal ] SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. [Citation Graph (, )][DBLP ] Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network. [Citation Graph (, )][DBLP ] Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions. [Citation Graph (, )][DBLP ] Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security. [Citation Graph (, )][DBLP ] Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks. [Citation Graph (, )][DBLP ] A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions. [Citation Graph (, )][DBLP ] Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network. [Citation Graph (, )][DBLP ] MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem. [Citation Graph (, )][DBLP ] On the efficient implementation of fair non-repudiation. [Citation Graph (, )][DBLP ] Search in 0.036secs, Finished in 0.040secs