The SCEAS System
| |||||||

## Search the dblp DataBase
Kwok-Yan Lam:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Xun Yi, Kwok-Yan Lam
**A New Hash Function Based on Block Cipher.**[Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:139-146 [Conf] - Xun Yi, Kwok-Yan Lam, Yongfei Han
**Differential Cryptanalysis of a Block Cipher.**[Citation Graph (0, 0)][DBLP] ACISP, 1998, pp:58-67 [Conf] - Xi-Bin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
**Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.**[Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:414-426 [Conf] - Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao
**On Multiplicative Secret Sharing Schemes.**[Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:342-351 [Conf] - Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
**Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.**[Citation Graph (0, 0)][DBLP] ACNS, 2003, pp:63-75 [Conf] - Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam
**Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:227-241 [Conf] - Chaoping Xing, Kwok-Yan Lam, Zhenghong Wei
**A Class of Explicit Perfect Multi-sequences.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:299-305 [Conf] - Tieyan Li, Kwok-Yan Lam
**An optimal location update and searching algorithm for tracking mobile agent.**[Citation Graph (0, 0)][DBLP] AAMAS, 2002, pp:639-646 [Conf] - Tieyan Li, Kwok-Yan Lam
**Detecting anomalous agents in mobile agent system: a preliminary approach.**[Citation Graph (0, 0)][DBLP] AAMAS, 2002, pp:655-656 [Conf] - Xing-Yun He, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun
**Real-Time Emulation of Intrusion Victim in HoneyFarm.**[Citation Graph (0, 0)][DBLP] AWCC, 2004, pp:143-154 [Conf] - Jian-Ping Yong, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
**Enhancing the Scalability of the Community Authorization Service for Virtual Organizations.**[Citation Graph (0, 0)][DBLP] AWCC, 2004, pp:182-193 [Conf] - Guopei Qiao, Kwok-Yan Lam
**RSA Signature Algorithm for Microcontroller Implementation.**[Citation Graph (0, 0)][DBLP] CARDIS, 1998, pp:353-356 [Conf] - Rynson W. H. Lau, Kwok-Yan Lam, Siu Leung Chung
**The Failure of Anti-Hacking Legislation: A Hong Kong Perspective.**[Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1996, pp:62-67 [Conf] - Xiao Feng Wang, Kwok-Yan Lam, Xun Yi, C. Q. Zhang, Eiji Okamoto
**Secure Agent-Mediated Auctionlike Negotiation Protocol for Internet Retail Commerce.**[Citation Graph (0, 0)][DBLP] CIA, 1999, pp:291-302 [Conf] - Mo Chen, Jian-Tao Sun, Hua-Jun Zeng, Kwok-Yan Lam
**A practical system of keyphrase extraction for web pages.**[Citation Graph (0, 0)][DBLP] CIKM, 2005, pp:277-278 [Conf] - Lucas Chi Kwong Hui, Kwok-Yan Lam
**Analysis and Experimentation on List Update Algorithms.**[Citation Graph (0, 0)][DBLP] COCOON, 1995, pp:576-581 [Conf] - Kwok-Yan Lam, San Ling, Lucas Chi Kwong Hui
**Efficient Generation of Elliptic Curve Cryptosystems.**[Citation Graph (0, 0)][DBLP] COCOON, 1996, pp:411-416 [Conf] - Dingfeng Ye, Kwok-Yan Lam, Zong-Duo Dai
**Cryptanalysis of ``2 R'' Schemes.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:315-325 [Conf] - Xiao Feng Wang, Xun Yi, Kwok-Yan Lam, Eiji Okamoto
**Secure Information Gathering Agent for Internet Trading.**[Citation Graph (0, 0)][DBLP] DAI, 1998, pp:183-193 [Conf] - Arrianto Mukti Wibowo, Kwok-Yan Lam, Gary S. H. Tan
**Loyalty Program Scheme for Anonymous Payment System.**[Citation Graph (0, 0)][DBLP] EC-Web, 2000, pp:253-265 [Conf] - Kwok-Yan Lam, Thomas Beth
**Timely Authentication in Distributed Systems.**[Citation Graph (0, 0)][DBLP] ESORICS, 1992, pp:293-303 [Conf] - Kwok-Yan Lam, Dieter Gollmann
**Freshness Assurance of Authentication Protocols.**[Citation Graph (0, 0)][DBLP] ESORICS, 1992, pp:261-272 [Conf] - Xi-Bin Zhao, Kwok-Yan Lam, Guimin Luo, Siu Leung Chung, Ming Gu
**Minimal Threshold Closure.**[Citation Graph (0, 0)][DBLP] ESORICS, 2006, pp:145-155 [Conf] - Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
**Anomaly Detection in Grid Computing Based on Vector Quantization.**[Citation Graph (0, 0)][DBLP] GCC, 2004, pp:883-886 [Conf] - Qinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun
**GridFS: A Web-Based Data Grid with P2P Concepts and Writable Replicas.**[Citation Graph (0, 0)][DBLP] ICADL, 2003, pp:639-642 [Conf] - Hong-Wei Sun, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
**An Efficient Anomaly Detection Algorithm for Vector-Based Intrusion Detection Systems.**[Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:817-825 [Conf] - Guoliang Xie, Mingwei Xu, Kwok-Yan Lam, Qian Wu
**The Impact of Mobility Modeling in Mobile IP Multicast Research.**[Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:295-304 [Conf] - Xiaoming Jin, Xinqiang Zuo, Kwok-Yan Lam, Jianmin Wang, Jia-Guang Sun
**Efficient Discovery of Emerging Frequent Patterns in ArbitraryWindows on Data Streams.**[Citation Graph (0, 0)][DBLP] ICDE, 2006, pp:113- [Conf] - Tie-Yan Li, Huafei Zhu, Kwok-Yan Lam
**A Novel Two-Level Trust Model for Grid.**[Citation Graph (0, 0)][DBLP] ICICS, 2003, pp:214-225 [Conf] - Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam
**A New Approach to Robust Threshold RSA Signature Schemes.**[Citation Graph (0, 0)][DBLP] ICISC, 1999, pp:184-196 [Conf] - Chi-Hung Chi, Chen Ding, Kwok-Yan Lam
**Context Query in Information Retrieval.**[Citation Graph (0, 0)][DBLP] ICTAI, 2002, pp:101-106 [Conf] - Chi-Hung Chi, Chen Ding, Kwok-Yan Lam
**Study for Fusion of Different Sources to Determine Relevance.**[Citation Graph (0, 0)][DBLP] ICTAI, 2002, pp:515-520 [Conf] - Chi-Hung Chi, John Sim, Kwok-Yan Lam
**Agent Warehouse: A New Paradigm for Mobile Agent Deployment.**[Citation Graph (0, 0)][DBLP] ICTAI, 2002, pp:455-462 [Conf] - Qinghu Li, Jianmin Wang, Kwok-Yan Lam, Jia-Guang Sun
**GridFS: A Web-Based Data Grid for the Distributed Sharing of Educational Resource Files.**[Citation Graph (0, 0)][DBLP] ICWL, 2003, pp:81-92 [Conf] - Xun Yi, Xiao Feng Wang, Kwok-Yan Lam
**A Secure Intelligent Trade Agent System.**[Citation Graph (0, 0)][DBLP] Trends in Distributed Systems for Electronic Commerce, 1998, pp:218-228 [Conf] - Tieyan Li, Kwok-Yan Lam
**A Secure Group Solution for Multi-Agent EC System.**[Citation Graph (0, 0)][DBLP] IPDPS, 2001, pp:169- [Conf] - Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam
**Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture.**[Citation Graph (0, 0)][DBLP] IPDPS, 2002, pp:- [Conf] - Sufatrio, Kwok-Yan Lam
**Mobile IP Registration Protocol: A Security Attack and New Secure Minimal Public-Key Based Authentication.**[Citation Graph (0, 0)][DBLP] ISPAN, 1999, pp:364-369 [Conf] - Xun Yi, Kwok-Yan Lam, Shi Xin Cheng, Xiao Hu You
**A New Byte-Oriented Block Cipher.**[Citation Graph (0, 0)][DBLP] ISW, 1997, pp:209-220 [Conf] - Chi-Hung Chi, Xiang Li, Kwok-Yan Lam
**Understanding the Object Retrieval Dependence of Web Page Access.**[Citation Graph (0, 0)][DBLP] MASCOTS, 2002, pp:413-420 [Conf] - Sufatrio, Kwok-Yan Lam
**Internet Mobility Support Optimized for Client Access and its Scalable Authentication Framework.**[Citation Graph (0, 0)][DBLP] MDA, 1999, pp:220-229 [Conf] - Jianying Zhou, Kwok-Yan Lam
**Undeniable Billing in Mobile Communication.**[Citation Graph (0, 0)][DBLP] MOBICOM, 1998, pp:284-290 [Conf] - Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, Jia-Guang Sun
**An Efficient Algorithm for Fingercode-Based Biometric Identification.**[Citation Graph (0, 0)][DBLP] OTM Workshops (1), 2006, pp:469-478 [Conf] - Jianying Zhou, Kwok-Yan Lam
**A Secure Pay-per View Scheme for Web-Based Video Service.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1999, pp:315-326 [Conf] - Xiao Feng Wang, Kwok-Yan Lam, Xun Yi
**Secure Agent-Mediated Mobile Payment.**[Citation Graph (0, 0)][DBLP] PRIMA, 1998, pp:162-173 [Conf] - Tieyan Li, Chuk-Yang Seng, Kwok-Yan Lam
**A Secure Route Structure for Information Gathering Agent.**[Citation Graph (0, 0)][DBLP] PRIMA, 2000, pp:101-114 [Conf] - Hermann Strack, Kwok-Yan Lam
**Context-Dependent Access Control in Distributed Systems.**[Citation Graph (0, 0)][DBLP] SEC, 1993, pp:137-155 [Conf] - Xun Yi, Xiao Feng Wang, Kwok-Yan Lam, Eiji Okamoto, D. Frank Hsu
**A Security Auction-Like Negotiation Protocol for Agent-Based Internet Trading.**[Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1998, pp:197-203 [Conf] - Bangyu Wu, Kwok-Yan Lam, Siu Leung Chung, Huaxiong Wang
**Secure Construction of Virtual Organizations in Grid Computing Systems.**[Citation Graph (0, 0)][DBLP] WINE, 2005, pp:959-968 [Conf] - Yi-Yuan Huang, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun
**Application of Content Computing in Honeyfarm.**[Citation Graph (0, 0)][DBLP] WISA, 2004, pp:211-222 [Conf] - Kwok-Yan Lam, Xi-Bin Zhao, Siu Leung Chung, Ming Gu, Jia-Guang Sun
**Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes.**[Citation Graph (0, 0)][DBLP] WISA, 2003, pp:42-54 [Conf] - Harald Niederreiter, Chaoping Xing, Kwok-Yan Lam
**A New Construction of Algebraic Geometry Codes.**[Citation Graph (0, 0)][DBLP] Appl. Algebra Eng. Commun. Comput., 1999, v:9, n:5, pp:373-381 [Journal] - Kwok-Yan Lam
**Replay tolerance of authentication protocols.**[Citation Graph (0, 0)][DBLP] Computer Communications, 1995, v:18, n:12, pp:988-992 [Journal] - Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
**Lightweight security for mobile commerce transactions.**[Citation Graph (0, 0)][DBLP] Computer Communications, 2003, v:26, n:18, pp:2052-2060 [Journal] - Kwok-Yan Lam, Lucas Chi Kwong Hui
**Designing a system infrastructure for distributed programs.**[Citation Graph (0, 0)][DBLP] Computer Communications, 1996, v:19, n:9-10, pp:754-762 [Journal] - Kwok-Yan Lam, Lucas Chi Kwong Hui
**Efficient nearer-ancestor algorithm for network routing.**[Citation Graph (0, 0)][DBLP] Computer Communications, 1996, v:19, n:12, pp:1014-1019 [Journal] - Jianying Zhou, Kwok-Yan Lam
**Securing digital signatures for non-repudiation.**[Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:8, pp:710-716 [Journal] - Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
**Security middleware for enhancing interoperability of Public Key Infrastructure.**[Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:6, pp:535-546 [Journal] - Kwok-Yan Lam, Francesco Sica
**The Weight Distribution of C5(1, n).**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2001, v:24, n:2, pp:181-191 [Journal] - Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam
**Duadic sequences of prime lengths.**[Citation Graph (0, 0)][DBLP] Discrete Mathematics, 2000, v:218, n:1-3, pp:33-49 [Journal] - Cunsheng Ding, Kwok-Yan Lam, Chaoping Xing
**Construction and Enumeration of All Binary Duadic Codes of Length p**[Citation Graph (0, 0)][DBLP]^{m}. Fundam. Inform., 1999, v:38, n:1-2, pp:149-161 [Journal] - Ning Cai, Kwok-Yan Lam
**On identification secret sharing schemes.**[Citation Graph (0, 0)][DBLP] Inf. Comput., 2003, v:184, n:2, pp:298-310 [Journal] - Dingfeng Ye, Zongduo Dai, Kwok-Yan Lam
**Decomposing Attacks on Asymmetric Cryptography Based on Mapping Compositions.**[Citation Graph (0, 0)][DBLP] J. Cryptology, 2001, v:14, n:2, pp:137-150 [Journal] - Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung
**A data reduction method for intrusion detection.**[Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1996, v:33, n:1, pp:101-108 [Journal] - Kwok-Yan Lam, Lucas Chi Kwong Hui, Siu Leung Chung
**Multivariate data analysis software for enhancing system security.**[Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1995, v:31, n:3, pp:267-275 [Journal] - Lucas Chi Kwong Hui, Kwok-Yan Lam, Chee Weng Chea
**Global Optimisation in Neural Network Training.**[Citation Graph (0, 0)][DBLP] Neural Computing and Applications, 1997, v:5, n:1, pp:58-64 [Journal] - Hongwei Sun, Kwok-Yan Lam, Siu Leung Chung, Wei-Ming Dong, Ming Gu, Jia-Guang Sun
**Efficient vector quantization using genetic algorithm.**[Citation Graph (0, 0)][DBLP] Neural Computing and Applications, 2005, v:14, n:3, pp:203-211 [Journal] - Kwok-Yan Lam
**An Implementation for Small Databases with High Availability.**[Citation Graph (0, 0)][DBLP] Operating Systems Review, 1991, v:25, n:4, pp:77-87 [Journal] - Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia
**Scalable Threshold Closure.**[Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:185-206 [Journal] - Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam
**Several classes of binary sequences with three-level autocorrelation.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2606-2612 [Journal] - Chaoping Xing, Kwok-Yan Lam
**Sequences with Almost Perfect Linear Complexity Profiles and Curves Over Finite Fields.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1267-1270 [Journal] - Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam
**Constructions of Algebraic-Geometry Codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1186-1193 [Journal] - Chaoping Xing, Harald Niederreiter, Kwok-Yan Lam
**A generalization of algebraic-geometry codes.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:7, pp:2498-2501 [Journal] - Chaoping Xing, Huaxiong Wang, Kwok-Yan Lam
**Constructions of authentication codes from algebraic curves over finite fields.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:886-892 [Journal] - Guozhen Xiao, Shimin Wei, Kwok-Yan Lam, Kyoki Imamura
**A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q).**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:6, pp:2203-2206 [Journal] **SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.**[Citation Graph (, )][DBLP]**Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network.**[Citation Graph (, )][DBLP]**Biomapping: Privacy trustworthy biometrics using noninvertible and discriminable constructions.**[Citation Graph (, )][DBLP]**Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security.**[Citation Graph (, )][DBLP]**Towards Energy-Efficient Secure Communications Using Biometric Key Distribution in Wireless Biomedical Healthcare Networks.**[Citation Graph (, )][DBLP]**A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions.**[Citation Graph (, )][DBLP]**Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network.**[Citation Graph (, )][DBLP]**MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem.**[Citation Graph (, )][DBLP]**On the efficient implementation of fair non-repudiation.**[Citation Graph (, )][DBLP]
Search in 0.035secs, Finished in 0.039secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |